Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters
نویسندگان
چکیده
We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملA Classical Key-Distribution System based on Johnson (like) noise – How Secure?
Abstract: We present a comprehensive analysis of the Johnson (like) noise based classical key-distribution scheme presented by Kish [1]. We suggest two passive attack strategies that enable an adversary to gain complete knowledge of the exchanged key. The first approach exploits the transient response of the voltage in the transmission line after the resistors are switched and the second one ex...
متن کاملSpeckle Noise Reduction for the Enhancement of Retinal Layers in Optical Coherence Tomography Images
Introduction One of the most important pre-processing steps in optical coherence tomography (OCT) is reducing speckle noise, resulting from multiple scattering of tissues, which degrades the quality of OCT images. Materials and Methods The present study focused on speckle noise reduction and edge detection techniques. Statistical filters with different masks and noise variances were applied on ...
متن کاملTowards Secure Targeted Broadcast in Smart Grid
Significant research efforts have recently been directed towards materializing smart grid for the purpose of transforming the aging power grid into an efficient and intelligent electric power distribution system. Conceptually, smart grid can be regarded as a fusion of different advanced technologies, i.e., electrical power engineering meets sensing, control, digital communication, and network i...
متن کامل