Key Establishment Scheme for Distribution Automation System Using Logical Key Hierarchy Approach

Article Preview

Abstract:

Ethernet Passive Optical Networks (EPONs) are promising communication technologies for distribution automation system (DAS). However, EPONs have very specific security requirements, due to the broadcast character of the transmission medium. Based on the identity-based cryptography (IBC), and utilizing logical key hierarchy (LKH) approach, this paper presents an efficient key establishment scheme for distribution automation system using EPON. And the analysis results are also given in the paper.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 383-390)

Pages:

1246-1249

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] V.C. Gungor, F.C. Lambert. A survey on communication networks for electric system automation. Computer Networks, 2006, 50(3): 877–897.

DOI: 10.1016/j.comnet.2006.01.005

Google Scholar

[2] D. Bassett, K. Clinard, J. Grainger, S. Purucker, and D. Ward. Tutorial course: distribution automation. IEEE Tutorial Publ. 88EH0280-8-PWR, (1988).

Google Scholar

[3] M. P. McGarry, M. Maier, and M. Reisslein. Ethernet PONs: A survey of dynamic bandwidth allocation (DBA) algorithms. IEEE Commun. Mag., 2004, 42, pp. S8–S15.

DOI: 10.1109/mcom.2004.1321381

Google Scholar

[4] M. Hajduczenia, H. J. A. d. Silva, and P. P. Monteiro. EPON versus APON and GPON: a detailed performance comparison, " OSA J. Opt. Net., 2006, 5(2): 298–319.

DOI: 10.1364/jon.5.000298

Google Scholar

[5] F. Effenberger,T. S. El-Bawab. Passive Optical Networks (PONs): Past, present, and future. Optical Switching and Networking, 2009, 6(2)143-150.

DOI: 10.1016/j.osn.2009.02.001

Google Scholar

[6] S.S. Roh, S. -H. Kim. Security Model and Authentication Protocol in EPON-based Optical Access Network. IEEE ICTON 2003, pp.99-102.

DOI: 10.1109/icton.2003.1264588

Google Scholar

[7] Y. Meng, T. Jiang, D. Xiao. Analysis and solutions of security issue in Ethernet PON. Proceedings of SPIE, 2005, v. 5626, pp.391-399.

Google Scholar

[8] M. Hajduczenia, P. R. M. Inacio, H. J. A. Da Silva, M. M. Freire, P. Monteiro. On EPON Security Issues. IEEE Communications Surveys, 2007, 9(1): 68-83.

DOI: 10.1109/comst.2007.358972

Google Scholar

[9] L. Chen, Z. Cheng, N.P. Smart, Identity-based key agreement protocols from pairings, Int. J. Inform. Security. 2007, 6 (4)213–241.

DOI: 10.1007/s10207-006-0011-9

Google Scholar

[10] D. Boneh and M. Franklin. Identify-based encryption from the weil pairing. SIAM Journal of Computing, 2003, 32(3): 586–615.

DOI: 10.1137/s0097539701398521

Google Scholar

[11] Y. Challal, H. Seba. Group key management protocols: A novel taxonomy. International Journal of Information. Technology, 2005, 2(1): 105-117.

Google Scholar

[12] S. Rafaeli, D. Hutchison. A survey of key management for secure group communication. ACM Computing Surveys, 35(3): 309–329.

DOI: 10.1145/937503.937506

Google Scholar

[13] H. Harney, C. Muckenhirn, Group key management protocol(GKMP) architecture, RFC 2094, (1999).

DOI: 10.17487/rfc2094

Google Scholar

[14] C.K. Wong et al., Secure group communications using key graphs, IEEE/ACM Transactions on Networking. 2000, 8 (1): 16–30.

DOI: 10.1109/90.836475

Google Scholar

[15] McGrew, A.T. Sherman, Key establishment in large dynamic groups using one-way function trees, IEEE Transaction on Software Engineering. 2003, 29 (5): 444–458.

DOI: 10.1109/tse.2003.1199073

Google Scholar

[16] R. Mukherjee, J.W. Atwood. Scalable solutions for secure group communications. Computer Networks, 2007, 51(12): 3525-3548.

DOI: 10.1016/j.comnet.2007.02.002

Google Scholar