Abstract

The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS) matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.

Highlights

  • The concept of smart grid gained tremendous attention among researchers and utility providers in recent years

  • In order to decrypt a data block encrypted by smart meters with an access structure, data consumers need to process a proper set of secret keys

  • We focus on AttrGen() and we can generalize the performance of TRegister() from Table 5

Read more

Summary

A Secure and Scalable Data Communication Scheme in Smart Grids

Chunqiang Hu ,1,2,3 Hang Liu, Liran Ma, Yan Huo ,5 Arwa Alrawais, Xiuhua Li, Hong Li ,8 and Qingyu Xiong 1,2. The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. We present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS) matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost

Introduction
Related Work
Preliminaries
Architecture and Protocol
Performance Analysis
Conclusion
Duplicated Attributes in an AS
The Decentralized ABE Scheme Implemented
The Implement of Multiauthority ABS Scheme
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call