Attacks on Authentication and Authorization Models in Smart Grid

  • Trupil Limbasiya
  • Aakriti Arya
Part of the Advances in Information Security book series (ADIS, volume 71)


The evolution of a conventional electric grid infrastructure can be dated back to 1880s when the outstanding sources of energy were based on hydraulics and gas energy. But one cannot only depend upon the classic electric grid system in today’s digital world. However, the smart grid and smart micro grid provide electric power in many efficient and measured ways, which are helpful in the technology-enabled market. Accordingly, in this chapter, we explain structure of the smart grid and discuss various authentication schemes associated with it. We have described different security parameters and varied attacks, which should be considered for successful and secure usage of the smart grid system.


Authentication Data Security Smart Gird 



We are grateful to the anonymous reviewers for their noteworthy time and effort in suggesting their exceptional views on the chapter in the review process. In addition, we are thankful to editors for the handling of this book. This work is partially supported by NIIT University, Neemrana, India.


  1. 1.
    Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), pp. 770–772.CrossRefGoogle Scholar
  2. 2.
    Hamlyn, A., Cheung, H., Mander, T., Wang, L., Yang, C., & Cheung, R. (2008). Computer network security management and authentication of smart grids operations. In Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, IEEE, pp. 1–7.Google Scholar
  3. 3.
    Xu, K., Ma, X., & Liu, C. (2008). A hash tree based authentication scheme in SIP applications. In Communications, ICC’08. IEEE International Conference on, pp. 1510–1514.CrossRefGoogle Scholar
  4. 4.
    Kaplan, S. M. (2009). Electric power transmission: background and policy issues. US Congressional Research Service, April, 14, pp. 4–5.Google Scholar
  5. 5.
    Bobba, R., Khurana, H., AlTurki, M., & Ashraf, F. (2009). PBES: a policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th ACM international symposium on information, computer, and communications security, pp. 262–275.Google Scholar
  6. 6.
    Valli, C. (2009). The not so smart, smart grid: Potential security risks associated with the deployment of smart grid technologies. In Proceedings of the 7th Australian Digital Forensics Conference, pp. 19–23.Google Scholar
  7. 7.
    Quinn, E. L. Privacy and the new energy infrastructure, (2009).Google Scholar
  8. 8.
    Cavoukian, A., Polonetsky, J., & Wolf, C. (2010). Smart privacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society, 3(2), pp. 275–294.CrossRefGoogle Scholar
  9. 9.
    Metke, A. R., & Ekl, R. L.(2010). Security technology for smart grid networks. IEEE Transactions on Smart Grid, 1(1), pp. 99–107.CrossRefGoogle Scholar
  10. 10.
    Wei, D., Lu, Y., Jafari, M., Skare, P., & Rohde, K. (2010). An integrated security system of protecting smart grid against cyber attacks. In Proceedings of IEEE Innovative Smart Grid Technologies, pp. 1–7.Google Scholar
  11. 11.
    Bennett, C., & Wicker, S. B. (2010). Decreased time delay and security enhancement recommendations for AMI smart meter networks. In Proceedings of IEEE Innovative Smart Grid Technologies, pp. 1–6.Google Scholar
  12. 12.
    Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1), 13.CrossRefGoogle Scholar
  13. 13.
    Li, Q., & Cao, G. (2011). Multi-cast authentication in the smart grid with one-time signature. IEEE Transactions Smart Grid, 2(4), pp. 686–696.CrossRefGoogle Scholar
  14. 14.
    Nicanfar, H., Jokar, P., & Leung, V. C. (2011). Smart grid authentication and key management for unicast and multicast communications. In Proceedings of IEEE Innovative Smart Grid Technologies Asia, pp. 1–8.Google Scholar
  15. 15.
    Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. S. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), pp. 675–685.CrossRefGoogle Scholar
  16. 16.
    Nicanfar, H., & Leung, V. C. (2012). Smart grid multilayer consensus password-authenticated key exchange protocol. In Communications (ICC), 2012 IEEE International Conference on, pp. 6716–6720.CrossRefGoogle Scholar
  17. 17.
    Fang, X, Mistra, S., Xue, G., & Yang, D. (2012). Smart Grid - The new and improved power grid: A survey. IEEE communications surveys & tutorials, 14(4), pp. 944–980.CrossRefGoogle Scholar
  18. 18.
    Kim, Y. S., & Heo, J. (2012). Device authentication protocol for smart grid systems using homomorphic hash. Journal of Communications and Networks, 14(6), pp. 606–613.CrossRefGoogle Scholar
  19. 19.
    Nicanfar, H., & Leung, V. C. (2013). Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system. IEEE Transactions on Smart Grid, 4(1), pp. 253–264.CrossRefGoogle Scholar
  20. 20.
    Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), pp. 1344–1371.CrossRefGoogle Scholar
  21. 21.
    Zeadally, S., Pathan, A. S. K., Alcaraz, C., & Badra, M. (2013). Towards privacy protection in smart grid. Wireless personal communications, 73(1), pp. 23–50.CrossRefGoogle Scholar
  22. 22.
    Bari, A., Jiang, J., Saad, W., & Jaekel, A. (2014). Challenges in the smart grid applications: an overview. International Journal of Distributed Sensor Networks, 10(2), pp. 1–11.CrossRefGoogle Scholar
  23. 23.
    Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2014). An efficient merkle-tree-based authentication scheme for smart grid. IEEE Systems Journal, 8(2), pp. 655–663.CrossRefGoogle Scholar
  24. 24.
    Saxena, N., & Choi, B. J. (2015). State of the art authentication, access control, and secure integration in smart grid. Energies, 8(10), pp. 11883–11915.CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Trupil Limbasiya
    • 1
  • Aakriti Arya
    • 2
  1. 1.Birla Institute of Technology & Science (BITS), PilaniGoaIndia
  2. 2.NIIT UniversityNeemranaIndia

Personalised recommendations