Skip to main content

An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids

  • Conference paper
  • First Online:
Book cover Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

The concept of Smart Grid gains tremendous attention amongst researchers and utility providers in recent years. One of the challenges is to establish a secure communication architecture among smart meters, utility companies, and third-party service providers, whilst address the prevalent security and privacy concerns. In this paper, we propose a communication architecture for smart grids, and design a scheme to secure the data communications among smart meters, utility companies, and third-party service providers by employing Decentralized Ciphertext-Policy Attribute Based Encryption (CP_ABE) to store the data in ciphertext format, hence ensuring data security. The architecture we proposed is high scalable since the decentralized feature. Also, our architecture achieves an role-based access control by employing an access control LSSS matrix that describes the attributes required to access the data. We analyze the proposed scheme, and argue that it provides message authenticity and collusion resistance, and is efficient and feasible.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, Q., Cao, G.: Multicast authentication in the smart grid with one-time signature. IEEE Trans. Smart Grid 2(4), 686–696 (2011)

    Article  Google Scholar 

  2. Ipakchi, A., Albuyeh, F.: Grid of the future. IEEE Power Energy Magazine 7(2), 52–62 (2009)

    Article  Google Scholar 

  3. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13:1–13:33 (2011)

    Article  Google Scholar 

  4. Hu, C., Cheng, X., Tian, Z., Yu, J., Akkaya, K., Sun, L.: An attribute-based signcryption scheme to secure attribute-defined multicast communications. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) SecureComm 2015. LNICSSITE, vol. 164, pp. 418–437. Springer, Cham (2015). doi:10.1007/978-3-319-28865-9_23

    Chapter  Google Scholar 

  5. Chunqiang, H., Liao, X., Cheng, X.: Verifiable multi-secret sharing based on LFSR sequences. Theoret. Comput. Sci. 445, 52–62 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  6. Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data (2017). doi:10.1109/TBDATA.2016.2621106

  7. Rongxing, L., Xiaohui Liang, X., Li, X.L., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)

    Article  Google Scholar 

  8. Li, D., Aung, Z., Williams, J.R., Sanchez, A.: Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis. In: 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), pp. 1–8. IEEE (2012)

    Google Scholar 

  9. Cai, A., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. (2016). doi:10.1109/TDSC.2016.2613521

  10. Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manag. 13(2), 335–348 (2016)

    Article  Google Scholar 

  11. Ruj, S., Nayak, A., Stojmenovic, I.: A security architecture for data aggregation and access control in smart grids. arxiv preprint arXiv:1111.2619 (2011)

  12. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20465-4_31

    Chapter  Google Scholar 

  13. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  14. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  15. Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 255–271. Springer, Heidelberg (2003). doi:10.1007/3-540-39200-9_16

    Chapter  Google Scholar 

  16. Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_14

    Chapter  Google Scholar 

  17. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27

    Chapter  Google Scholar 

  18. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)

    Google Scholar 

  19. Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: INFOCOM. IEEE (2017)

    Google Scholar 

  20. Hu, C., Huo, Y.: Efficient privacy-preserving dot-product computation for mobile big data. IET Commun. 11(5), 704–712 (2017)

    Article  Google Scholar 

  21. Liu, J., Xiao, Y., Li, S., Liang, W., Chen, P.C.L.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutor. 14(4), 981–997 (2012)

    Article  Google Scholar 

  22. Zhongwei, S., Sitian, H., Yaning, M., Fengjie, S.: Security mechanism for smart distribution grid using ethernet passive optical network. In: 2010 2nd International Conference on Advanced Computer Control (ICACC), vol. 3, pp. 246–250. IEEE (2010)

    Google Scholar 

  23. Chunqiang, H., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)

    Article  Google Scholar 

  24. Chunqiang, H., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-Scale Comput. Syst. 2(2), 94–107 (2016)

    Article  Google Scholar 

  25. Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)

    Google Scholar 

  26. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE (2007)

    Google Scholar 

Download references

Acknowledgement

We are very grateful to all reviewers who have helped improve the quality of this paper. This research was partially supported by the National Science Foundation of the US under grants CNS-1624485, and the National Natural Science Foundation of China under grants 61471028 and 61672119, and the Fundamental Research Funds for the Central Universities (Grant No. 2016JBZ003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunqiang Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hu, C., Huo, Y., Ma, L., Liu, H., Deng, S., Feng, L. (2017). An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics