Securing communications between smart grids and real users; providing a methodology based on user authentication
Smart power grid is a two-way interconnected network in which information plays a fundamental role in the process of energy transmission and distribution. The smart grid is based on combining ICT with the processing capabilities of computers and electrical systems to increase communication between u...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Elsevier
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/e9205688ba984d2a8a5dcaeb066284bc |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:e9205688ba984d2a8a5dcaeb066284bc |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:e9205688ba984d2a8a5dcaeb066284bc2021-11-28T04:34:05ZSecuring communications between smart grids and real users; providing a methodology based on user authentication2352-484710.1016/j.egyr.2021.08.125https://doaj.org/article/e9205688ba984d2a8a5dcaeb066284bc2021-11-01T00:00:00Zhttp://www.sciencedirect.com/science/article/pii/S2352484721007277https://doaj.org/toc/2352-4847Smart power grid is a two-way interconnected network in which information plays a fundamental role in the process of energy transmission and distribution. The smart grid is based on combining ICT with the processing capabilities of computers and electrical systems to increase communication between users. However, smart grids are exposed to a variety of malicious cyber-attacks that can lead to the destruction of basic infrastructure and disrupt communication between the grid and users. Meanwhile, by authenticating the authenticated users, cyber-security can be created in the smart grid. One of the main components of a smart power grid is smart meters. However, to maintain security in a communication, smart meter authentication alone is not enough and it must be ensured that the electricity company’s server is not forgery. Therefore, there is a need for two-way authentication between the smart meter on the home side and the electricity company server. The present work provides a key management layout (based on the elliptic curve cryptography) with two-way authentication for communication outside the home area network The proposed solution is two-way authentication among the smart meter and the security associate in the power company. In other words, the proposed methodology creates a solution to establish a connection between valid users and the smart grid. The proposed protocol evaluates the behavior of cyber-attacks on the smart grid. Attacks such as man-in the middle attacks and retransmission attacks are considered. It was found that, the proposed methodology improves the reliance between smart grid and authenticated users with the increase of secure communications. Moreover, the proposed protocol can prevent an extensive experiment attack. The results also showed that, as the false factor increases, the detection time by the proposed algorithm increases. As the false factor increases from 0.1 to 0.3, the detection time increases by 1.4 s.Tiansheng ChenXueli YinGuijie WangElsevierarticleSmart gridsCyber-securityReal usersSecuring communicationsAuthenticationElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENEnergy Reports, Vol 7, Iss , Pp 8042-8050 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Smart grids Cyber-security Real users Securing communications Authentication Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Smart grids Cyber-security Real users Securing communications Authentication Electrical engineering. Electronics. Nuclear engineering TK1-9971 Tiansheng Chen Xueli Yin Guijie Wang Securing communications between smart grids and real users; providing a methodology based on user authentication |
description |
Smart power grid is a two-way interconnected network in which information plays a fundamental role in the process of energy transmission and distribution. The smart grid is based on combining ICT with the processing capabilities of computers and electrical systems to increase communication between users. However, smart grids are exposed to a variety of malicious cyber-attacks that can lead to the destruction of basic infrastructure and disrupt communication between the grid and users. Meanwhile, by authenticating the authenticated users, cyber-security can be created in the smart grid. One of the main components of a smart power grid is smart meters. However, to maintain security in a communication, smart meter authentication alone is not enough and it must be ensured that the electricity company’s server is not forgery. Therefore, there is a need for two-way authentication between the smart meter on the home side and the electricity company server. The present work provides a key management layout (based on the elliptic curve cryptography) with two-way authentication for communication outside the home area network The proposed solution is two-way authentication among the smart meter and the security associate in the power company. In other words, the proposed methodology creates a solution to establish a connection between valid users and the smart grid. The proposed protocol evaluates the behavior of cyber-attacks on the smart grid. Attacks such as man-in the middle attacks and retransmission attacks are considered. It was found that, the proposed methodology improves the reliance between smart grid and authenticated users with the increase of secure communications. Moreover, the proposed protocol can prevent an extensive experiment attack. The results also showed that, as the false factor increases, the detection time by the proposed algorithm increases. As the false factor increases from 0.1 to 0.3, the detection time increases by 1.4 s. |
format |
article |
author |
Tiansheng Chen Xueli Yin Guijie Wang |
author_facet |
Tiansheng Chen Xueli Yin Guijie Wang |
author_sort |
Tiansheng Chen |
title |
Securing communications between smart grids and real users; providing a methodology based on user authentication |
title_short |
Securing communications between smart grids and real users; providing a methodology based on user authentication |
title_full |
Securing communications between smart grids and real users; providing a methodology based on user authentication |
title_fullStr |
Securing communications between smart grids and real users; providing a methodology based on user authentication |
title_full_unstemmed |
Securing communications between smart grids and real users; providing a methodology based on user authentication |
title_sort |
securing communications between smart grids and real users; providing a methodology based on user authentication |
publisher |
Elsevier |
publishDate |
2021 |
url |
https://doaj.org/article/e9205688ba984d2a8a5dcaeb066284bc |
work_keys_str_mv |
AT tianshengchen securingcommunicationsbetweensmartgridsandrealusersprovidingamethodologybasedonuserauthentication AT xueliyin securingcommunicationsbetweensmartgridsandrealusersprovidingamethodologybasedonuserauthentication AT guijiewang securingcommunicationsbetweensmartgridsandrealusersprovidingamethodologybasedonuserauthentication |
_version_ |
1718408352623493120 |