Cryptanalysis and Improvement of Secure Key Distribution for the Smart Grid

Article Preview

Abstract:

The smart grid is a network of computers and power infrastructures that monitor and manage energy usage and uses intelligent transmission and distribution networks to deliver electricity for improving the electric system's reliability and efficiency. With grid controls, energy transmission management could be enhanced and resilience to control-system failures would be increased. Although deploying the smart grid has numerous social and technical benefits, several security concerns arise. In 2012, Xia and Wang proposed a secure key distribution for the smart grid. They claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Xia and Wang's protocol. More precisely, we show that once the smart meter generates a session key with the service provider, the smart meter could easily forge the new legitimate session key without the service provider's participation. In order to remedy the security flaw, we propose a simple and secure improvement of Xia and Wang's protocol. Our protocol is secure and fair to generate the session key between the smart meter and the service provider.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

651-655

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Energy Information Administration, Annual Energy Outlook 2010 (2010), pp.65-69.

Google Scholar

[2] P. McDaniel and S. McLaughlin, IEEE Security and Privacy, 7, 75 (2009).

Google Scholar

[3] H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, IEEE Security and Privacy, 8, 81 (2010).

Google Scholar

[4] A. R. Metke and R. L. Ekl, IEEE Transactions on Smart Grid, 1, 99 (2010).

Google Scholar

[5] Z. Yang, S. Yu, W. Lou, and C. Liu, IEEE Transactions on Smart Grid, 2, 4 (2011).

Google Scholar

[6] H. R. Tseng, A secure and privacy-preserving communication protocol for V2G networks, IEEE Wireless Communications and Networking Conference (WCNC), Paris, France, IEEE Press (2012), pp.2706-2711.

DOI: 10.1109/wcnc.2012.6214259

Google Scholar

[7] H. R. Tseng, A robust aggregated message authentication protocol for vehicle-to-grid networks, The 19th World Congress on Intelligent Transport Systems, Vienna, Austria (2012).

Google Scholar

[8] H. R. Tseng and T. H. Chueh, Applied Mathematics and Information Sciences, In Press (2013).

Google Scholar

[9] T. H. Chueh and H. R. Tseng, Applied Mechanics and Materials, 145 (2012), pp.364-368.

Google Scholar

[10] H. R. Tseng, Applied Mechanics and Materials, 284-287 (2013), pp.3380-3384.

Google Scholar

[11] H. R. Tseng, Privacy-preserving key management scheme for vehicle-to-grid networks, The 20th World Congress on Intelligent Transport Systems, Tokyo, Japan (2013).

Google Scholar

[12] D. Wu and C. Zhou, IEEE Transactions on Smart Grid, 2, 2 (2011), pp.375-381.

Google Scholar

[13] J. Xia and Y. Wang, IEEE Transactions on Smart Grid, 3, 3 (2012), pp.1437-1443.

Google Scholar

[14] D. R. Stinson, Cryptography: Theory and practice, Chapman & Hall/CRC, Boca Raton, FL, (2006).

Google Scholar