Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2015

01-11-2015

EAPA: An efficient authentication protocol against pollution attack for smart grid

Authors: Mi Wen, Jingsheng Lei, Zhongqin Bi, Jing Li

Published in: Peer-to-Peer Networking and Applications | Issue 6/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The development of smart grid depends on increased deployment of two-way communication to improve its efficiency and reliability of power delivery. However, this additional dependency also expands the risk from pollution attacks, which consist of injecting malicious packets in the network. The pollution attacks are amplified by the network coding process, resulting in a greater damage to the state estimation and decision making. In this paper, we address this issue by designing an efficient authentication protocol, named EAPA, for the smart grid communication. The proposed scheme allows not only recipient nodes, but also intermediate nodes, to verify the integrity and origin of the packets received without having to decode, and thus detect and discard the malicious packets in transit that fail the verification. By this means, the pollution is canceled out before reaching the destinations. Security analysis demonstrates that the EAPA can be resilient to data/tag pollution attacks and replay attacks. Performance evaluation results show that our EAPA can reduce much more communication overhead than Wu’s scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef
2.
go back to reference Zeng R, Jiang Y, Lin C, Shen X (2012) Dependability analysis of control center networks in smart grid. IIEEE Trans Parallel Distrib Syst 23(9):1721–1730CrossRef Zeng R, Jiang Y, Lin C, Shen X (2012) Dependability analysis of control center networks in smart grid. IIEEE Trans Parallel Distrib Syst 23(9):1721–1730CrossRef
3.
go back to reference Abur A, Exposito AG (2004) Power system state estimation: theory and implementation. CRC Press Abur A, Exposito AG (2004) Power system state estimation: theory and implementation. CRC Press
4.
go back to reference Li H, Lu R, Zhou L, Yang B, Shen X (2013) An efficient merkle tree based authentication scheme for Smart Grid. IEEE Syst J 99:1–9 Li H, Lu R, Zhou L, Yang B, Shen X (2013) An efficient merkle tree based authentication scheme for Smart Grid. IEEE Syst J 99:1–9
5.
go back to reference Lai C, Li H, Lu R, Shen X (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57:3492–3510CrossRef Lai C, Li H, Lu R, Shen X (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57:3492–3510CrossRef
6.
go back to reference Esmalifalak M, Han Z, Song L (2012) Effect of stealthy bad data injection on network congestion in market based power system. In: WCNC, pp 2468–2472 Esmalifalak M, Han Z, Song L (2012) Effect of stealthy bad data injection on network congestion in market based power system. In: WCNC, pp 2468–2472
7.
go back to reference Huang Y, Esmalifalak M, Nguyen H, Zheng R et al (2013) Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun Mag 51(1):27–33CrossRef Huang Y, Esmalifalak M, Nguyen H, Zheng R et al (2013) Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun Mag 51(1):27–33CrossRef
8.
go back to reference Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):1–13CrossRef Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):1–13CrossRef
9.
go back to reference Xie L, Mo Y, Sinopoli B (2010) False data injection attacks in electricity markets. In: Smart Grid Comm, pp 226–231 Xie L, Mo Y, Sinopoli B (2010) False data injection attacks in electricity markets. In: Smart Grid Comm, pp 226–231
10.
go back to reference Yu Z, Guan Y, Zhuang W, Shen XS (2005) A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In: IPSN, pp 261–268 Yu Z, Guan Y, Zhuang W, Shen XS (2005) A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In: IPSN, pp 261–268
11.
go back to reference Wu X, Xu Y, Yuen C, Xiang L (2014) A tag encoding scheme against pollution attack to linear network coding. IEEE Trans Parallel Distrib Syst 25(1):33–42CrossRef Wu X, Xu Y, Yuen C, Xiang L (2014) A tag encoding scheme against pollution attack to linear network coding. IEEE Trans Parallel Distrib Syst 25(1):33–42CrossRef
12.
go back to reference Wang Y, Gu D, Wen M, Xu J, Li H (2010) Denial of service detection with hybrid fuzzy set based feed forward neural network. In: ISNN, pp 576–585 Wang Y, Gu D, Wen M, Xu J, Li H (2010) Denial of service detection with hybrid fuzzy set based feed forward neural network. In: ISNN, pp 576–585
13.
go back to reference Agrawal S, Boneh D (2009) Homomorphic MACs: MAC-based integrity for network coding. Applied cryptography and network security, Springer book, 292–305 Agrawal S, Boneh D (2009) Homomorphic MACs: MAC-based integrity for network coding. Applied cryptography and network security, Springer book, 292–305
14.
go back to reference Wen M, Zheng Y, Li H, Chen K (2007) A hierarchical composition of LU matrix-based key distribution scheme for sensor networks. In: SSDU, pp 608–620 Wen M, Zheng Y, Li H, Chen K (2007) A hierarchical composition of LU matrix-based key distribution scheme for sensor networks. In: SSDU, pp 608–620
15.
go back to reference Blake I, Seroussi G, Smart N, Cassels J (2005) Advances in elliptic curve cryptography London Mathematical Society Lecture Note Series. Cambridge University Press Blake I, Seroussi G, Smart N, Cassels J (2005) Advances in elliptic curve cryptography London Mathematical Society Lecture Note Series. Cambridge University Press
16.
go back to reference Jaggi S, Langberg M, Katti S, Ho T, Katabi D, Medard M, Effros M (2008) Resilient network coding in the presence of Byzantine adversaries. IEEE Trans Inf Theory 54(6):2596–2603MathSciNetCrossRef Jaggi S, Langberg M, Katti S, Ho T, Katabi D, Medard M, Effros M (2008) Resilient network coding in the presence of Byzantine adversaries. IEEE Trans Inf Theory 54(6):2596–2603MathSciNetCrossRef
17.
go back to reference Koetter R, Kschischang FR (2008) Coding for errors and erasures in random network coding. IEEE Trans Inf Theory 54(8):3579–3591MathSciNetCrossRef Koetter R, Kschischang FR (2008) Coding for errors and erasures in random network coding. IEEE Trans Inf Theory 54(8):3579–3591MathSciNetCrossRef
18.
go back to reference Le A, Markopoulou A (2011) TESLA-based defense against pollution attacks in P2P systems with network coding. In: EEE NetCod 1–7 Le A, Markopoulou A (2011) TESLA-based defense against pollution attacks in P2P systems with network coding. In: EEE NetCod 1–7
19.
go back to reference Le A, Markopoulou A (2012) Cooperative defense against pollution attacks in network coding using SpaceMac. IEEE JSAC Coop Netw Chall Appl 30(2):442–449 Le A, Markopoulou A (2012) Cooperative defense against pollution attacks in network coding using SpaceMac. IEEE JSAC Coop Netw Chall Appl 30(2):442–449
20.
go back to reference Li H, Zheng Y, Chen K, Wen M (2006) A locally group key management with revocation capability for sensor networks. ICSNC Li H, Zheng Y, Chen K, Wen M (2006) A locally group key management with revocation capability for sensor networks. ICSNC
21.
go back to reference Yang Y, Li H, Wen M, Luo H, Lu R Achieving ranked range query in smart grid auction market. ICC 2014, Sydney, Australia, to appear Yang Y, Li H, Wen M, Luo H, Lu R Achieving ranked range query in smart grid auction market. ICC 2014, Sydney, Australia, to appear
22.
go back to reference Liu D, Li H, Yang Y, Yang H Achieving multi-authority access control with efficient attribute revocation in smart grid. ICC 2014, Sydney, Australia, to appear Liu D, Li H, Yang Y, Yang H Achieving multi-authority access control with efficient attribute revocation in smart grid. ICC 2014, Sydney, Australia, to appear
23.
go back to reference Boneh D, Freeman D, Katz J, Waters B (2009) Signing a linear subspace: signature schemes for network coding. In: PKC, pp 68–87 Boneh D, Freeman D, Katz J, Waters B (2009) Signing a linear subspace: signature schemes for network coding. In: PKC, pp 68–87
24.
go back to reference Jiang Y, Zhu H, Shi M, Shen X, Lin C (2010) An efficient dynamic identity based signatur scheme for secure network coding. Comput Netw 54(1):28–40CrossRefMATH Jiang Y, Zhu H, Shi M, Shen X, Lin C (2010) An efficient dynamic identity based signatur scheme for secure network coding. Comput Netw 54(1):28–40CrossRefMATH
25.
go back to reference Zhang P, Jiang Y, Lin C, Yao H, Wasef A, Shen XS (2011) Padding for orthogonality: efficient subspace authentication for network coding. In: INFOCOM, pp 261–268 Zhang P, Jiang Y, Lin C, Yao H, Wasef A, Shen XS (2011) Padding for orthogonality: efficient subspace authentication for network coding. In: INFOCOM, pp 261–268
26.
go back to reference Liang M, Kan H (2013) An efficient hybrid cryptographic scheme for wireless sensor network with network coding. IEICE Trans Fundam E96-A(9):1889–1894CrossRef Liang M, Kan H (2013) An efficient hybrid cryptographic scheme for wireless sensor network with network coding. IEICE Trans Fundam E96-A(9):1889–1894CrossRef
Metadata
Title
EAPA: An efficient authentication protocol against pollution attack for smart grid
Authors
Mi Wen
Jingsheng Lei
Zhongqin Bi
Jing Li
Publication date
01-11-2015
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2015
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-014-0283-1

Other articles of this Issue 6/2015

Peer-to-Peer Networking and Applications 6/2015 Go to the issue

Premium Partner