Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

A key management architecture and protocols for secure smart grid communications

Long, X and Tipper, D and Qian, Y (2016) A key management architecture and protocols for secure smart grid communications. Security and Communication Networks, 9 (16). 3602 - 3617. ISSN 1939-0114

[img]
Preview
PDF
Available under License : See the attached license file.

Download (1MB) | Preview
[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)

Abstract

Copyright © 2016 John Wiley & Sons, Ltd. Providing encrypted communications among power grid components is expected to be a basic requirement of smart grid systems in the future. Here, we propose a key management architecture and associated protocols tailored to support encrypted smart grid communications. The architecture consists of two levels structured around the grid control system hierarchy. At the top level, which consist of control centers and regional coordinators, a bottom-up key structure is adopted using hash chaining and a logical key hierarchy. The lower level of the architecture consists of the regional coordinators (i.e., substations and distribution systems) and remote ends (e.g., meters and pole-top sensors) and utilizes a top-down key management approach built on an inverse element method. The proposed key management schema supports the hierarchical structure of the smart grid control mechanisms, and it takes the resource and electronic/physical security differences of the control levels into account. We define a set of protocols utilizing the architecture to provide secure unicast, multicast, and broadcast communications. Furthermore, we illustrate how the architecture is flexible enough to easily handle power grid nodes joining and leaving the system at the different levels. Lastly, we compare the proposed schema with existing ones and show that our architecture can achieve efficient key management to provide secure communications. Copyright © 2016 John Wiley & Sons, Ltd.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: Article
Status: Published
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Long, Xxul10@pitt.eduXUL10
Tipper, Ddtipper@pitt.eduDTIPPER
Qian, Y
Date: 10 November 2016
Date Type: Publication
Journal or Publication Title: Security and Communication Networks
Volume: 9
Number: 16
Page Range: 3602 - 3617
DOI or Unique Handle: 10.1002/sec.1564
Schools and Programs: School of Information Sciences > Telecommunications
Refereed: Yes
ISSN: 1939-0114
Date Deposited: 30 Jun 2017 15:05
Last Modified: 13 Oct 2017 19:55
URI: http://d-scholarship.pitt.edu/id/eprint/32582

Metrics

Monthly Views for the past 3 years

Plum Analytics

Altmetric.com


Actions (login required)

View Item View Item