Paper Title:
Research on the Application of IBE in IEC61850 Substation Automation System
  Abstract

In order to reap the benefits promised by the Smart Grid, communications between the IEDs in IEC 61850 Substation Automation System (SAS) will need to be made much more secure.Traditional security solutions based on Public Key Infrastructure (PKI) are calculation intensive and introduces latency that will be difficult to meet substation environmental and electrical requirements, so they are not well suited for IEC 61850 SAS. Identity based encryption (IBE) schemes, introduced by Shamir in 1984 [5] are based on the idea to use participant’s unique identities as public key and public key directories are unnecessary. Thus, utilizing IBE in IEC 61850 SAS is a reasonable choice. This paper briefly introduces the features of IEC 61850 SAS communication security and IBE and then propose an IBE-based Self Private Key Generated (SPKG) encryption scheme to establish encryption system in IEC 61850 SAS. Advantages of this SPKG Scheme are also discussed in the paper.

  Info
Periodical
Edited by
Han Zhao
Pages
2805-2808
DOI
10.4028/www.scientific.net/AMM.130-134.2805
Citation
S. P. Yin, "Research on the Application of IBE in IEC61850 Substation Automation System", Applied Mechanics and Materials, Vols. 130-134, pp. 2805-2808, 2012
Online since
October 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

  | Authors: Xiu Ying Yu, Da Ke He
Chapter 3: Computational Methods for Engineering
Abstract:Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based...
198
Authors: Shivendu Mishra, Ritika Yaduvanshi, Anjani Kumar Rai, Nagendra Pratap Singh
Chapter 7: Machining
Abstract:In an ID-Based cryptosystem, identity of users are used to generate their public and private keys. In this system private key is generated by...
929
Authors: Bao Yuan Kang
Chapter 1: Mechatronics
Abstract:A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext...
914
Authors: Hong Zhen Du, Mei Juan Huang
Chapter 18: Computer Applications in Industry and Engineering
Abstract:We construct an efficient and novel identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and...
2870
Authors: Erl Huei Lu, Henry Ker Chang Chang, Shu Hwang Liaw, Pin Chang Su
Chapter 12: Computer and Information Technologies
Abstract:Recently bilinear pairings have found various applications in cryptosystems. However, a natural open question is to construct a secure and...
3522