Skip to main content

2016 | OriginalPaper | Buchkapitel

Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid

verfasst von : Sérgio Câmara, Dhananjay Anand, Victoria Pillitteri, Luiz Carmo

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf-TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf-TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82 % and 47.29 % in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Greer, C., et al.: NIST Framework and Roadmap for Smart Grid Interoperability Standards. Technical report, NIST (2014) Greer, C., et al.: NIST Framework and Roadmap for Smart Grid Interoperability Standards. Technical report, NIST (2014)
2.
Zurück zum Zitat Anderson, R., Bergadano, F., Crispo, B., Lee, J.H., Manifavas, C., Needham, R.: A new family of authentication protocols. ACM SIGOPS Operat. Syst. Rev. 32, 9–20 (1998)CrossRef Anderson, R., Bergadano, F., Crispo, B., Lee, J.H., Manifavas, C., Needham, R.: A new family of authentication protocols. ACM SIGOPS Operat. Syst. Rev. 32, 9–20 (1998)CrossRef
3.
Zurück zum Zitat Barker, E., Roginsky, A.: Recommendation for transitioning the use of cryptographic algorithms and key lengths. In: SP 800–131A Transitions (2011) Barker, E., Roginsky, A.: Recommendation for transitioning the use of cryptographic algorithms and key lengths. In: SP 800–131A Transitions (2011)
5.
Zurück zum Zitat International Electrotechnical Commission: IEC TS 62351-1 Power systems management and associated information exchange - Data and communications - Part 1:Communication network and system security-Introduction to security issues (2007) International Electrotechnical Commission: IEC TS 62351-1 Power systems management and associated information exchange - Data and communications - Part 1:Communication network and system security-Introduction to security issues (2007)
6.
7.
Zurück zum Zitat Law, Y.W., Gong, Z., Luo, T., Marusic, S., Palaniswami, M.: Comparative study of multicast authentication schemes with application to wide-area measurement system. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, p. 287 (2013) Law, Y.W., Gong, Z., Luo, T., Marusic, S., Palaniswami, M.: Comparative study of multicast authentication schemes with application to wide-area measurement system. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, p. 287 (2013)
8.
Zurück zum Zitat Li, Q., Cao, G.: Multicast authentication in the smart grid with one-time signature. IEEE Trans. Smart Grid 2, 686–696 (2011)CrossRef Li, Q., Cao, G.: Multicast authentication in the smart grid with one-time signature. IEEE Trans. Smart Grid 2, 686–696 (2011)CrossRef
9.
Zurück zum Zitat Liscouski, B., Elliot, W.: Final report on the August 14, 2003 blackout in the United States and Canada: Causes and recommendations. A report to US Department of Energy 40(4) (2004) Liscouski, B., Elliot, W.: Final report on the August 14, 2003 blackout in the United States and Canada: Causes and recommendations. A report to US Department of Energy 40(4) (2004)
10.
Zurück zum Zitat Liu, D., Ning, P.: Multilevel \(\mu \)TESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3, 800–836 (2004)CrossRef Liu, D., Ning, P.: Multilevel \(\mu \)TESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3, 800–836 (2004)CrossRef
11.
Zurück zum Zitat Patel, M., Aivaliotis, S., Ellen, E.: Real-time application of synchrophasors for improving reliability. NERC Report, October 2010 Patel, M., Aivaliotis, S., Ellen, E.: Real-time application of synchrophasors for improving reliability. NERC Report, October 2010
12.
Zurück zum Zitat Perrig, A.: The BiBa one-time signature and broadcast authentication protocol. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, p. 28 (2001) Perrig, A.: The BiBa one-time signature and broadcast authentication protocol. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, p. 28 (2001)
13.
Zurück zum Zitat Perrig, A., Canetti, R., Song, D.: Efficient and secure source authentication for multicast. In: Proceedings of the Internet Society Network and Distributed System Security Symposium, pp. 35–46 (2001) Perrig, A., Canetti, R., Song, D.: Efficient and secure source authentication for multicast. In: Proceedings of the Internet Society Network and Distributed System Security Symposium, pp. 35–46 (2001)
14.
Zurück zum Zitat Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. Proc. IEEE Symp. Secur. Priv. 28913, 56–73 (2000) Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. Proc. IEEE Symp. Secur. Priv. 28913, 56–73 (2000)
15.
Zurück zum Zitat Perrig, A., Canetti, R., Tygar, J., Song, D.: The TESLA broadcast authentication protocol. CryptoBytes Summer/Fall 5, 2–13 (2002) Perrig, A., Canetti, R., Tygar, J., Song, D.: The TESLA broadcast authentication protocol. CryptoBytes Summer/Fall 5, 2–13 (2002)
16.
Zurück zum Zitat Perrig, A., Song, D., Canetti, R., Tygar, J., Briscoe, B.: Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction. Int. Soci. RFC 4082, 1–22 (2005) Perrig, A., Song, D., Canetti, R., Tygar, J., Briscoe, B.: Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction. Int. Soci. RFC 4082, 1–22 (2005)
17.
Zurück zum Zitat Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.E.: Spins: Security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)CrossRefMATH Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.E.: Spins: Security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)CrossRefMATH
18.
Zurück zum Zitat Reyzin, L., Reyzin, N.: Better than BiBa: Short one-time signatures with fast signing and verifying. Inf. Secur. Priv. 2384, 1–47 (2002)MathSciNetCrossRefMATH Reyzin, L., Reyzin, N.: Better than BiBa: Short one-time signatures with fast signing and verifying. Inf. Secur. Priv. 2384, 1–47 (2002)MathSciNetCrossRefMATH
19.
Zurück zum Zitat Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11, 574–588 (2009)CrossRef Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11, 574–588 (2009)CrossRef
20.
Zurück zum Zitat Tuffner, F.: Phasor Measurement Unit Application Data Requirements. Technical report, Pacific Northwest National Laboratory (2014) Tuffner, F.: Phasor Measurement Unit Application Data Requirements. Technical report, Pacific Northwest National Laboratory (2014)
21.
Zurück zum Zitat UCTE: Final Report of the Investigation Committee on the 28 September 2003Blackout in Italy. Technical Report April, Union for the Coordination of the Transmission of Electricity (2004) UCTE: Final Report of the Investigation Committee on the 28 September 2003Blackout in Italy. Technical Report April, Union for the Coordination of the Transmission of Electricity (2004)
22.
Zurück zum Zitat Ugus, O., Westhoff, D., Bohli, J.M.: A rom-friendly secure code update mechanism for wsns using a stateful-verifier \(\tau \)-time signature scheme. In: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 29–40. ACM (2009) Ugus, O., Westhoff, D., Bohli, J.M.: A rom-friendly secure code update mechanism for wsns using a stateful-verifier \(\tau \)-time signature scheme. In: Proceedings of the Second ACM Conference on Wireless Network Security, pp. 29–40. ACM (2009)
23.
Zurück zum Zitat Wang, Q., Khurana, H., Huang, Y., Nahrstedt, K.: Time valid one-time signature for time-critical multicast data authentication. In: Proceedings - IEEE INFOCOM, pp. 1233–1241 (2009) Wang, Q., Khurana, H., Huang, Y., Nahrstedt, K.: Time valid one-time signature for time-critical multicast data authentication. In: Proceedings - IEEE INFOCOM, pp. 1233–1241 (2009)
24.
Zurück zum Zitat Wang, W., Lu, Z.: Cyber security in the Smart Grid: Survey and challenges. Comput. Netw. 57(5), 1344–1371 (2013)CrossRef Wang, W., Lu, Z.: Cyber security in the Smart Grid: Survey and challenges. Comput. Netw. 57(5), 1344–1371 (2013)CrossRef
25.
Zurück zum Zitat Zhu, K., Nordstrom, L., Al-Hammouri, A.: Examination of data delay and packet loss for wide-area monitoring and control systems. In: 2012 IEEE International Energy Conference and Exhibition (ENERGYCON), pp. 927–934, Sept 2012 Zhu, K., Nordstrom, L., Al-Hammouri, A.: Examination of data delay and packet loss for wide-area monitoring and control systems. In: 2012 IEEE International Energy Conference and Exhibition (ENERGYCON), pp. 927–934, Sept 2012
Metadaten
Titel
Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid
verfasst von
Sérgio Câmara
Dhananjay Anand
Victoria Pillitteri
Luiz Carmo
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-33630-5_3

Premium Partner