Abstract

Smart metering technology plays a key role in Advanced Metering Infrastructure (AMI) in Smart Grid (SG). Smart Meters (SM) measure Power Consumption Data (PCD) of household devices and send it to DSO (Distributed System Operator) for further processing. DSO utilizes PCD for different applications such as monthly billing, demand response and other applications related to power system operation and energy markets. Secure communication between SM and DSO is of paramount importance. Certificate-based authentication is a de facto mechanism in ensuring legitimacy of communicating parties. But it incurs more computational delay as it involves intensive processes such as certificate management, revocation, and verification. ID-based authentication eliminates the risks associated with certificate management. A key agreement protocol based on ID-based authentication mechanism is proposed and analyzed for computational performance. This paper analyzes and evaluates both authentication mechanisms: certificate and ID-based mechanism based on computational times for suitability in AMI network. The experimental results show that ID-based authentication and key agreement mechanism are suitable for securing communication in AMI network.

Highlights

  • Smart grid is considered as generation power system

  • In order to evaluate the performances of certificate based authentication scheme and the proposed ID based authentication and key agreement scheme, a realistic scenario of Smart meter (SM) and Distributed System Operator (DSO) communication over a Wide Area Network (WAN) is considered

  • Advanced Metering Infrastructure (AMI) network plays a crucial role at consumer side that enables many applications like demand response, power consumption billing and energy market trading

Read more

Summary

INTRODUCTION

Smart grid is considered as generation power system. It performs real time monitoring, control and protection operations. Smart meter (SM) plays a key role in AMI which communicates with Distributed System Operator (DSO) and performs a set of operations such as demand response, dynamic pricing and energy management [2], [3] It communicates with household equipment and collects Power Consumption Data (PCD) sends it to DSO. Authors in [13] proposed Merkle-tree based authentication in AMI to mitigate false injection attack and replay attack These techniques may not be suitable for smart meters with limited computing power and limited bandwidth. Multiple entities analyze data for real time grid monitoring and energy management This communication should be between the two legitimate entities, any security attack such as Man In The Middle (MITM), may lead to severe issues and economic loss. Hacker is able to modify the PCD and send hacked data to DSO which may lead to false analysis results

CERTIFICATE-BASED AUTHENTICATION SCHEME FOR SECURING COMMUNICATION IN AMI
ID-BASED AUTHENTICATION SCHEME FOR SECURING COMMUNICATION IN AMI
ID-BASED AUTHENTICATION KEY AGREEMENT PROTOCOL
IMPLEMENTATION RESULTS
Performance evaluation of Certificate based authentication
Performance evaluation of ID based authentication and key agreement mechanism
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call