A Novel Authentication Management for the Data Security of Smart Grid
Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encr...
Gespeichert in:
Veröffentlicht in: | IEEE open access journal of power and energy 2024-01, Vol.11 (1), p.218-230 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 230 |
---|---|
container_issue | 1 |
container_start_page | 218 |
container_title | IEEE open access journal of power and energy |
container_volume | 11 |
creator | Parvez, Imtiaz Aghili, Maryamossadat Riggs, Hugo Sundararajan, Aditya Sarwat, Arif I. Srivastava, Anurag K. |
description | Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme. |
doi_str_mv | 10.1109/OAJPE.2024.3393971 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10508893</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10508893</ieee_id><doaj_id>oai_doaj_org_article_7ab606687eff4ebe926b448b980029b8</doaj_id><sourcerecordid>3053297275</sourcerecordid><originalsourceid>FETCH-LOGICAL-c384t-bebe35441a8ea519a38b670372fe5a295d9ae22fbef5bd67a59e54be4b07b9023</originalsourceid><addsrcrecordid>eNpNUU1LAzEUXERBUf-AeAh6bs3nJjkWrV-oFdRzSNIXTakbzaZC_72pK-LpPV5mJjNM0xwRPCYE67PZ5PZxOqaY8jFjmmlJtpo92io5kprg7X_7bnPY9wuMMRWECE33mukEPaQvWKLJqrxBV6K3JaYO3dvOvsJ7vaCQMqpv6MIWi57Ar3Isa5QCenq3uaCrHOcHzU6wyx4Of-d-83I5fT6_Ht3Nrm7OJ3cjzxQvIwcOmOCcWAVWEG2Zcq3ETNIAwlIt5toCpcFBEG7eSis0CO6AOyydxpTtNzeD7jzZhfnIsTpYm2Sj-Tmk_GqqpeiXYKR1LW5rcAiB1381bR3nymlV02unqtbJoJX6Ek3vYwH_5lPXgS-GMkEwJxV0OoA-cvpcQV_MIq1yVzMahgWjWlIpKooOKJ9T32cIf9YINpuKzE9FZlOR-a2oko4HUgSAfwSBldKMfQNTVoq_</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3053297275</pqid></control><display><type>article</type><title>A Novel Authentication Management for the Data Security of Smart Grid</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Parvez, Imtiaz ; Aghili, Maryamossadat ; Riggs, Hugo ; Sundararajan, Aditya ; Sarwat, Arif I. ; Srivastava, Anurag K.</creator><creatorcontrib>Parvez, Imtiaz ; Aghili, Maryamossadat ; Riggs, Hugo ; Sundararajan, Aditya ; Sarwat, Arif I. ; Srivastava, Anurag K. ; Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)</creatorcontrib><description>Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme.</description><identifier>ISSN: 2687-7910</identifier><identifier>EISSN: 2687-7910</identifier><identifier>EISSN: 2644-1314</identifier><identifier>DOI: 10.1109/OAJPE.2024.3393971</identifier><identifier>CODEN: IOAJBC</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Advanced Metering Infrastructure (AMI) ; Algorithms ; artifical intelliigence ; Authentication ; Control centres ; Data communication ; Data encryption ; Data exchange ; data security ; Data transmission ; Encryption ; MATHEMATICS AND COMPUTING ; Meters ; Nodes ; Packet transmission ; POWER TRANSMISSION AND DISTRIBUTION ; Security ; Servers ; Smart grid ; Smart grids ; Smart meters ; Support vector machines ; Trusted third parties ; Wireless communications</subject><ispartof>IEEE open access journal of power and energy, 2024-01, Vol.11 (1), p.218-230</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c384t-bebe35441a8ea519a38b670372fe5a295d9ae22fbef5bd67a59e54be4b07b9023</cites><orcidid>0000-0003-3577-8544 ; 0000-0002-5134-3797 ; 0000-0003-1179-438X ; 0000000335778544 ; 0000000251343797 ; 000000031179438X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10508893$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>230,314,777,781,861,882,2096,27614,27905,27906,54914</link.rule.ids><backlink>$$Uhttps://www.osti.gov/servlets/purl/2351041$$D View this record in Osti.gov$$Hfree_for_read</backlink></links><search><creatorcontrib>Parvez, Imtiaz</creatorcontrib><creatorcontrib>Aghili, Maryamossadat</creatorcontrib><creatorcontrib>Riggs, Hugo</creatorcontrib><creatorcontrib>Sundararajan, Aditya</creatorcontrib><creatorcontrib>Sarwat, Arif I.</creatorcontrib><creatorcontrib>Srivastava, Anurag K.</creatorcontrib><creatorcontrib>Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)</creatorcontrib><title>A Novel Authentication Management for the Data Security of Smart Grid</title><title>IEEE open access journal of power and energy</title><addtitle>OAJPE</addtitle><description>Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme.</description><subject>Advanced Metering Infrastructure (AMI)</subject><subject>Algorithms</subject><subject>artifical intelliigence</subject><subject>Authentication</subject><subject>Control centres</subject><subject>Data communication</subject><subject>Data encryption</subject><subject>Data exchange</subject><subject>data security</subject><subject>Data transmission</subject><subject>Encryption</subject><subject>MATHEMATICS AND COMPUTING</subject><subject>Meters</subject><subject>Nodes</subject><subject>Packet transmission</subject><subject>POWER TRANSMISSION AND DISTRIBUTION</subject><subject>Security</subject><subject>Servers</subject><subject>Smart grid</subject><subject>Smart grids</subject><subject>Smart meters</subject><subject>Support vector machines</subject><subject>Trusted third parties</subject><subject>Wireless communications</subject><issn>2687-7910</issn><issn>2687-7910</issn><issn>2644-1314</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1LAzEUXERBUf-AeAh6bs3nJjkWrV-oFdRzSNIXTakbzaZC_72pK-LpPV5mJjNM0xwRPCYE67PZ5PZxOqaY8jFjmmlJtpo92io5kprg7X_7bnPY9wuMMRWECE33mukEPaQvWKLJqrxBV6K3JaYO3dvOvsJ7vaCQMqpv6MIWi57Ar3Isa5QCenq3uaCrHOcHzU6wyx4Of-d-83I5fT6_Ht3Nrm7OJ3cjzxQvIwcOmOCcWAVWEG2Zcq3ETNIAwlIt5toCpcFBEG7eSis0CO6AOyydxpTtNzeD7jzZhfnIsTpYm2Sj-Tmk_GqqpeiXYKR1LW5rcAiB1381bR3nymlV02unqtbJoJX6Ek3vYwH_5lPXgS-GMkEwJxV0OoA-cvpcQV_MIq1yVzMahgWjWlIpKooOKJ9T32cIf9YINpuKzE9FZlOR-a2oko4HUgSAfwSBldKMfQNTVoq_</recordid><startdate>20240101</startdate><enddate>20240101</enddate><creator>Parvez, Imtiaz</creator><creator>Aghili, Maryamossadat</creator><creator>Riggs, Hugo</creator><creator>Sundararajan, Aditya</creator><creator>Sarwat, Arif I.</creator><creator>Srivastava, Anurag K.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7ST</scope><scope>7U6</scope><scope>8FD</scope><scope>C1K</scope><scope>F28</scope><scope>FR3</scope><scope>OIOZB</scope><scope>OTOTI</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-3577-8544</orcidid><orcidid>https://orcid.org/0000-0002-5134-3797</orcidid><orcidid>https://orcid.org/0000-0003-1179-438X</orcidid><orcidid>https://orcid.org/0000000335778544</orcidid><orcidid>https://orcid.org/0000000251343797</orcidid><orcidid>https://orcid.org/000000031179438X</orcidid></search><sort><creationdate>20240101</creationdate><title>A Novel Authentication Management for the Data Security of Smart Grid</title><author>Parvez, Imtiaz ; Aghili, Maryamossadat ; Riggs, Hugo ; Sundararajan, Aditya ; Sarwat, Arif I. ; Srivastava, Anurag K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c384t-bebe35441a8ea519a38b670372fe5a295d9ae22fbef5bd67a59e54be4b07b9023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Advanced Metering Infrastructure (AMI)</topic><topic>Algorithms</topic><topic>artifical intelliigence</topic><topic>Authentication</topic><topic>Control centres</topic><topic>Data communication</topic><topic>Data encryption</topic><topic>Data exchange</topic><topic>data security</topic><topic>Data transmission</topic><topic>Encryption</topic><topic>MATHEMATICS AND COMPUTING</topic><topic>Meters</topic><topic>Nodes</topic><topic>Packet transmission</topic><topic>POWER TRANSMISSION AND DISTRIBUTION</topic><topic>Security</topic><topic>Servers</topic><topic>Smart grid</topic><topic>Smart grids</topic><topic>Smart meters</topic><topic>Support vector machines</topic><topic>Trusted third parties</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Parvez, Imtiaz</creatorcontrib><creatorcontrib>Aghili, Maryamossadat</creatorcontrib><creatorcontrib>Riggs, Hugo</creatorcontrib><creatorcontrib>Sundararajan, Aditya</creatorcontrib><creatorcontrib>Sarwat, Arif I.</creatorcontrib><creatorcontrib>Srivastava, Anurag K.</creatorcontrib><creatorcontrib>Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Environment Abstracts</collection><collection>Sustainability Science Abstracts</collection><collection>Technology Research Database</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>OSTI.GOV - Hybrid</collection><collection>OSTI.GOV</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE open access journal of power and energy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Parvez, Imtiaz</au><au>Aghili, Maryamossadat</au><au>Riggs, Hugo</au><au>Sundararajan, Aditya</au><au>Sarwat, Arif I.</au><au>Srivastava, Anurag K.</au><aucorp>Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Authentication Management for the Data Security of Smart Grid</atitle><jtitle>IEEE open access journal of power and energy</jtitle><stitle>OAJPE</stitle><date>2024-01-01</date><risdate>2024</risdate><volume>11</volume><issue>1</issue><spage>218</spage><epage>230</epage><pages>218-230</pages><issn>2687-7910</issn><eissn>2687-7910</eissn><eissn>2644-1314</eissn><coden>IOAJBC</coden><abstract>Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/OAJPE.2024.3393971</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3577-8544</orcidid><orcidid>https://orcid.org/0000-0002-5134-3797</orcidid><orcidid>https://orcid.org/0000-0003-1179-438X</orcidid><orcidid>https://orcid.org/0000000335778544</orcidid><orcidid>https://orcid.org/0000000251343797</orcidid><orcidid>https://orcid.org/000000031179438X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2687-7910 |
ispartof | IEEE open access journal of power and energy, 2024-01, Vol.11 (1), p.218-230 |
issn | 2687-7910 2687-7910 2644-1314 |
language | eng |
recordid | cdi_ieee_primary_10508893 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
subjects | Advanced Metering Infrastructure (AMI) Algorithms artifical intelliigence Authentication Control centres Data communication Data encryption Data exchange data security Data transmission Encryption MATHEMATICS AND COMPUTING Meters Nodes Packet transmission POWER TRANSMISSION AND DISTRIBUTION Security Servers Smart grid Smart grids Smart meters Support vector machines Trusted third parties Wireless communications |
title | A Novel Authentication Management for the Data Security of Smart Grid |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T05%3A52%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Authentication%20Management%20for%20the%20Data%20Security%20of%20Smart%20Grid&rft.jtitle=IEEE%20open%20access%20journal%20of%20power%20and%20energy&rft.au=Parvez,%20Imtiaz&rft.aucorp=Oak%20Ridge%20National%20Laboratory%20(ORNL),%20Oak%20Ridge,%20TN%20(United%20States)&rft.date=2024-01-01&rft.volume=11&rft.issue=1&rft.spage=218&rft.epage=230&rft.pages=218-230&rft.issn=2687-7910&rft.eissn=2687-7910&rft.coden=IOAJBC&rft_id=info:doi/10.1109/OAJPE.2024.3393971&rft_dat=%3Cproquest_ieee_%3E3053297275%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3053297275&rft_id=info:pmid/&rft_ieee_id=10508893&rft_doaj_id=oai_doaj_org_article_7ab606687eff4ebe926b448b980029b8&rfr_iscdi=true |