A Key Management Scheme for Smart Grid Wireless Terminals

Article Preview

Abstract:

With the large-scale construction of smart grid, smart grid terminals widely using wireless access technology to communicate to the power systems. For ensuring the communication security, pair-wise key pre-distribution scheme is widely used, however, which introduces the complexity of key management, and insufficient security problems. According to the smart grid terminals wireless communication features, proposes an intelligent grid wireless terminal online key management scheme, which is based on the t rank binary symmetric polynomial and fully homomorphic encryption algorithm. This scheme make the communication key could be established with a few parameters between the communicating parties, which reduces the complexity of key predistribution and the amount of calculation. Moreover, the whole process of the key generation is encrypted by fully homomorphic encryption algorithm, effectively enhances the security of the scheme.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

501-506

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] State Grid Corporation of China. The twelfth five-year special plan for the development of smart grid, Beijing, China, (2012).

Google Scholar

[2] Yang De-chang, Li Yong and C. Rehtanz. Study on the structure and development planning of smart grid in china, Power system technology. 20 (2009) 13-20.

Google Scholar

[3] Wu Jia-wei. Research on application of wireless sensor network technology in smart grid, Transmission & Distribution. 4 (2010) 14-21.

Google Scholar

[4] Dai Jing-guo, Yi Ye-qing, Liu Yun-ru and Yang Si-qing, et al. Researches on algorithm of establishment of pair-wise key based on grid hypercube model on wireless sensor networks, journal of syste simulation, 15 (2007) 3441-3472.

Google Scholar

[5] Chen Hang-zhe, Wang Xiao-ming. Improved pre-distribution key management scheme for WSN, Journal of computer applications, 11 (2009) 2981-2983.

DOI: 10.3724/sp.j.1087.2009.02980

Google Scholar

[6] Deng Song, Lin Wei-min, Zhang Tao. Research on power terminal access security technology based on TNC, Telecommunications for electric power system. 231 (2012) 78-81.

Google Scholar

[7] Blundo C, Santis A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences, Advances in Cryptology-CRYPTO'92. (1993) 471-486.

DOI: 10.1007/3-540-48071-4_33

Google Scholar

[8] Boneh Dan, Gentr Y. A fully homomorphic encryption scheme, Stanford university. (2009).

Google Scholar

[9] Gentr Y. Fully homomorphic encryption using ideal lattices, Proc of the 41st ACM symposium on theory of computing. (2009) 169-178.

DOI: 10.1145/1536414.1536440

Google Scholar

[10] Stehle D, Steinfeld R. Faster fully homorphic encryption, Proc of international conference on the theory and application of cryptology and information security. (2010) 377-394.

Google Scholar