A Novel Authentication Management for the Data Security of Smart Grid
Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encr...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Open Access Journal of Power and Energy |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10508893/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832592868035788800 |
---|---|
author | Imtiaz Parvez Maryamossadat Aghili Hugo Riggs Aditya Sundararajan Arif I. Sarwat Anurag K. Srivastava |
author_facet | Imtiaz Parvez Maryamossadat Aghili Hugo Riggs Aditya Sundararajan Arif I. Sarwat Anurag K. Srivastava |
author_sort | Imtiaz Parvez |
collection | DOAJ |
description | Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme. |
format | Article |
id | doaj-art-7ab606687eff4ebe926b448b980029b8 |
institution | Kabale University |
issn | 2687-7910 |
language | English |
publishDate | 2024-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Open Access Journal of Power and Energy |
spelling | doaj-art-7ab606687eff4ebe926b448b980029b82025-01-21T00:03:16ZengIEEEIEEE Open Access Journal of Power and Energy2687-79102024-01-011121823010.1109/OAJPE.2024.339397110508893A Novel Authentication Management for the Data Security of Smart GridImtiaz Parvez0https://orcid.org/0000-0002-5134-3797Maryamossadat Aghili1Hugo Riggs2Aditya Sundararajan3https://orcid.org/0000-0003-3577-8544Arif I. Sarwat4https://orcid.org/0000-0003-1179-438XAnurag K. Srivastava5Department of Computer Science, Utah Valley University, Orem, UT, USADepartment of Electrical and Computer Engineering, Florida International University, Miami, FL, USADepartment of Electrical and Computer Engineering, Florida International University, Miami, FL, USAOak Ridge National Laboratory, Oak Ridge, TN, USADepartment of Electrical and Computer Engineering, Florida International University, Miami, FL, USADepartment of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV, USABidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme.https://ieeexplore.ieee.org/document/10508893/Advanced Metering Infrastructure (AMI)artifical intelliigencedata securityauthenticationsmart grids |
spellingShingle | Imtiaz Parvez Maryamossadat Aghili Hugo Riggs Aditya Sundararajan Arif I. Sarwat Anurag K. Srivastava A Novel Authentication Management for the Data Security of Smart Grid IEEE Open Access Journal of Power and Energy Advanced Metering Infrastructure (AMI) artifical intelliigence data security authentication smart grids |
title | A Novel Authentication Management for the Data Security of Smart Grid |
title_full | A Novel Authentication Management for the Data Security of Smart Grid |
title_fullStr | A Novel Authentication Management for the Data Security of Smart Grid |
title_full_unstemmed | A Novel Authentication Management for the Data Security of Smart Grid |
title_short | A Novel Authentication Management for the Data Security of Smart Grid |
title_sort | novel authentication management for the data security of smart grid |
topic | Advanced Metering Infrastructure (AMI) artifical intelliigence data security authentication smart grids |
url | https://ieeexplore.ieee.org/document/10508893/ |
work_keys_str_mv | AT imtiazparvez anovelauthenticationmanagementforthedatasecurityofsmartgrid AT maryamossadataghili anovelauthenticationmanagementforthedatasecurityofsmartgrid AT hugoriggs anovelauthenticationmanagementforthedatasecurityofsmartgrid AT adityasundararajan anovelauthenticationmanagementforthedatasecurityofsmartgrid AT arifisarwat anovelauthenticationmanagementforthedatasecurityofsmartgrid AT anuragksrivastava anovelauthenticationmanagementforthedatasecurityofsmartgrid AT imtiazparvez novelauthenticationmanagementforthedatasecurityofsmartgrid AT maryamossadataghili novelauthenticationmanagementforthedatasecurityofsmartgrid AT hugoriggs novelauthenticationmanagementforthedatasecurityofsmartgrid AT adityasundararajan novelauthenticationmanagementforthedatasecurityofsmartgrid AT arifisarwat novelauthenticationmanagementforthedatasecurityofsmartgrid AT anuragksrivastava novelauthenticationmanagementforthedatasecurityofsmartgrid |