Securing communications between smart grids and real users; providing a methodology based on user authentication

Smart power grid is a two-way interconnected network in which information plays a fundamental role in the process of energy transmission and distribution. The smart grid is based on combining ICT with the processing capabilities of computers and electrical systems to increase communication between u...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Tiansheng Chen, Xueli Yin, Guijie Wang
Formato: article
Lenguaje:EN
Publicado: Elsevier 2021
Materias:
Acceso en línea:https://doaj.org/article/e9205688ba984d2a8a5dcaeb066284bc
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:e9205688ba984d2a8a5dcaeb066284bc
record_format dspace
spelling oai:doaj.org-article:e9205688ba984d2a8a5dcaeb066284bc2021-11-28T04:34:05ZSecuring communications between smart grids and real users; providing a methodology based on user authentication2352-484710.1016/j.egyr.2021.08.125https://doaj.org/article/e9205688ba984d2a8a5dcaeb066284bc2021-11-01T00:00:00Zhttp://www.sciencedirect.com/science/article/pii/S2352484721007277https://doaj.org/toc/2352-4847Smart power grid is a two-way interconnected network in which information plays a fundamental role in the process of energy transmission and distribution. The smart grid is based on combining ICT with the processing capabilities of computers and electrical systems to increase communication between users. However, smart grids are exposed to a variety of malicious cyber-attacks that can lead to the destruction of basic infrastructure and disrupt communication between the grid and users. Meanwhile, by authenticating the authenticated users, cyber-security can be created in the smart grid. One of the main components of a smart power grid is smart meters. However, to maintain security in a communication, smart meter authentication alone is not enough and it must be ensured that the electricity company’s server is not forgery. Therefore, there is a need for two-way authentication between the smart meter on the home side and the electricity company server. The present work provides a key management layout (based on the elliptic curve cryptography) with two-way authentication for communication outside the home area network The proposed solution is two-way authentication among the smart meter and the security associate in the power company. In other words, the proposed methodology creates a solution to establish a connection between valid users and the smart grid. The proposed protocol evaluates the behavior of cyber-attacks on the smart grid. Attacks such as man-in the middle attacks and retransmission attacks are considered. It was found that, the proposed methodology improves the reliance between smart grid and authenticated users with the increase of secure communications. Moreover, the proposed protocol can prevent an extensive experiment attack. The results also showed that, as the false factor increases, the detection time by the proposed algorithm increases. As the false factor increases from 0.1 to 0.3, the detection time increases by 1.4 s.Tiansheng ChenXueli YinGuijie WangElsevierarticleSmart gridsCyber-securityReal usersSecuring communicationsAuthenticationElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENEnergy Reports, Vol 7, Iss , Pp 8042-8050 (2021)
institution DOAJ
collection DOAJ
language EN
topic Smart grids
Cyber-security
Real users
Securing communications
Authentication
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Smart grids
Cyber-security
Real users
Securing communications
Authentication
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Tiansheng Chen
Xueli Yin
Guijie Wang
Securing communications between smart grids and real users; providing a methodology based on user authentication
description Smart power grid is a two-way interconnected network in which information plays a fundamental role in the process of energy transmission and distribution. The smart grid is based on combining ICT with the processing capabilities of computers and electrical systems to increase communication between users. However, smart grids are exposed to a variety of malicious cyber-attacks that can lead to the destruction of basic infrastructure and disrupt communication between the grid and users. Meanwhile, by authenticating the authenticated users, cyber-security can be created in the smart grid. One of the main components of a smart power grid is smart meters. However, to maintain security in a communication, smart meter authentication alone is not enough and it must be ensured that the electricity company’s server is not forgery. Therefore, there is a need for two-way authentication between the smart meter on the home side and the electricity company server. The present work provides a key management layout (based on the elliptic curve cryptography) with two-way authentication for communication outside the home area network The proposed solution is two-way authentication among the smart meter and the security associate in the power company. In other words, the proposed methodology creates a solution to establish a connection between valid users and the smart grid. The proposed protocol evaluates the behavior of cyber-attacks on the smart grid. Attacks such as man-in the middle attacks and retransmission attacks are considered. It was found that, the proposed methodology improves the reliance between smart grid and authenticated users with the increase of secure communications. Moreover, the proposed protocol can prevent an extensive experiment attack. The results also showed that, as the false factor increases, the detection time by the proposed algorithm increases. As the false factor increases from 0.1 to 0.3, the detection time increases by 1.4 s.
format article
author Tiansheng Chen
Xueli Yin
Guijie Wang
author_facet Tiansheng Chen
Xueli Yin
Guijie Wang
author_sort Tiansheng Chen
title Securing communications between smart grids and real users; providing a methodology based on user authentication
title_short Securing communications between smart grids and real users; providing a methodology based on user authentication
title_full Securing communications between smart grids and real users; providing a methodology based on user authentication
title_fullStr Securing communications between smart grids and real users; providing a methodology based on user authentication
title_full_unstemmed Securing communications between smart grids and real users; providing a methodology based on user authentication
title_sort securing communications between smart grids and real users; providing a methodology based on user authentication
publisher Elsevier
publishDate 2021
url https://doaj.org/article/e9205688ba984d2a8a5dcaeb066284bc
work_keys_str_mv AT tianshengchen securingcommunicationsbetweensmartgridsandrealusersprovidingamethodologybasedonuserauthentication
AT xueliyin securingcommunicationsbetweensmartgridsandrealusersprovidingamethodologybasedonuserauthentication
AT guijiewang securingcommunicationsbetweensmartgridsandrealusersprovidingamethodologybasedonuserauthentication
_version_ 1718408352623493120