[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1815396.1815666acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

Securing RDS broadcast messages for smart grid applications

Published: 28 June 2010 Publication History

Abstract

Efforts to reduce peak electrical demand has led to the introduction of demand response (DR) programs for residences. The RDS network is a strong candidate for delivering DR messages due to its low-cost nature and ubiquitous coverage. However, security concerns arise due to the wireless nature of the communication channel. We present evaluations of cryptographic methods that could be employed to offer source authentication over the RDS network. Simulations are used to determine the impact on the network performance by employing three digital signature protocols (BiBa, HORSE, and ECDSA). The simulation results show that, up to a distance of 90 km, all authentication schemes do not affect message reception by the receivers. ECDSA and HORSE outperform BiBa in terms of message reception beyond 90 km. ECDSA offers higher security than HORSE and BiBa but at the cost of increased computational complexity, in particular at the receivers. In addition, ECDSA has the highest bandwidth overhead.

References

[1]
E. W. Gunther, "Reference Design for Programmable Communicating Thermostats Compliant with Title-24," CEC PIER PCT Reference Design, Mar. 2007.
[2]
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. on Selected Areas in Communications, pp. 381--394, Feb. 2006.
[3]
T. Mander et al., "Communication Security Architecture for Smart Distribution System Operations," IEEE Electrical Power Conference, pp. 411--416, Oct. 2007.
[4]
A. Perrig, "The BiBa One-time Signature and Broadcast Authentication Protocol," 8th ACM Conf. on Computer and Communications Security, pp. 28--37, Nov. 2001.
[5]
W. Neumann, "HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification," Int. Conf. Information Technology: Coding and Computing, pp. 129--134, Apr. 2004.
[6]
D. Johnson et al., "The Elliptic Curve Digital Signature Algorithm ECDSA," Int. Journal on Inf. Sec., pp. 36--63, July 2001.
[7]
A. Liu and P. Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," Int. Conf. Information Proc. in Sensor Networks, pp. 245--256, Apr. 2008.
[8]
N. Gura et al., "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Cryptographic Hardware and Embedded Systems, pp. 119--132, 2004.
[9]
H. Toshio et al., "A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer," in 1st Int. Workshop on Practice and Theory in Public Key Cryptography, pp. 182--194, 1998.
[10]
T. Wollinger et al., "Cryptography in Embedded Systems: An Overview," Embedded World Exhibition and Conference, pp. 735--744, Feb. 2003.

Cited By

View all
  • (2020)Authentication Methodology for Securing Machine-to-Machine Communication in Smart GridCombating Security Challenges in the Age of Big Data10.1007/978-3-030-35642-2_9(189-213)Online publication date: 27-May-2020
  • (2018)An early warning system against malicious activities for smart grid communicationsIEEE Network: The Magazine of Global Internetworking10.1109/MNET.2011.603303625:5(50-55)Online publication date: 28-Dec-2018
  • (2017)Fast Real-Time Authentication Scheme for Smart GridsProceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations10.1145/3084030.3084033(1-7)Online publication date: 10-Jul-2017
  • Show More Cited By

Index Terms

  1. Securing RDS broadcast messages for smart grid applications

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
    June 2010
    1371 pages
    ISBN:9781450300629
    DOI:10.1145/1815396
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Computer and Information Society

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 June 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. BiBa
    2. DR programs
    3. ECDSA
    4. HORSE
    5. RDS
    6. authentication

    Qualifiers

    • Research-article

    Conference

    IWCMC '10
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Authentication Methodology for Securing Machine-to-Machine Communication in Smart GridCombating Security Challenges in the Age of Big Data10.1007/978-3-030-35642-2_9(189-213)Online publication date: 27-May-2020
    • (2018)An early warning system against malicious activities for smart grid communicationsIEEE Network: The Magazine of Global Internetworking10.1109/MNET.2011.603303625:5(50-55)Online publication date: 28-Dec-2018
    • (2017)Fast Real-Time Authentication Scheme for Smart GridsProceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations10.1145/3084030.3084033(1-7)Online publication date: 10-Jul-2017
    • (2017)Demand side management in residential areas using geographical information system2017 IEEE Conference on Energy Internet and Energy System Integration (EI2)10.1109/EI2.2017.8245766(1-6)Online publication date: Nov-2017
    • (2015)Security Challenge in the Smart GridEvolution of Smart Grids10.1007/978-3-319-25391-6_8(77-90)Online publication date: 14-Nov-2015
    • (2015)Challenges in Smart GridEvolution of Smart Grids10.1007/978-3-319-25391-6_3(17-23)Online publication date: 14-Nov-2015
    • (2013)Secure and Efficient Report Protocol for Networked Smart Grid Systems Using Linear MapIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.E96.A.886E96.A:5(886-895)Online publication date: 2013
    • (2013)A Decentralized Security Framework for Data Aggregation and Access Control in Smart GridsIEEE Transactions on Smart Grid10.1109/TSG.2012.22243894:1(196-205)Online publication date: Mar-2013
    • (2011)A Lightweight Message Authentication Scheme for Smart Grid CommunicationsIEEE Transactions on Smart Grid10.1109/TSG.2011.21606612:4(675-685)Online publication date: Dec-2011
    • (2011)Towards a light-weight message authentication mechanism tailored for Smart Grid communications2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFCOMW.2011.5928776(1018-1023)Online publication date: Apr-2011

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media