Secret Share Based Program Access Authorization Protocol for Smart Metering
نویسندگان
چکیده
Varieties of data security protection technologies have been developed in smart metering. However, there are almost no researches focusing on the security of smart meter parameters. In fact, smart meter parameters, such as the total/sharp/peak/flat/valley period time, can be written locally or remotely by power companies or users through sending programming commands. Modifying smart meter parameters arbitrarily may lead to the non-authenticity of users’ energy bills. This paper first considers the security of smart meter parameters and proposes a novel secret share based program access authorization protocol. The protocol introduces a program lock key which is used to lock the smart meter parameter modifying program. At least t participants (i.e. one user and t − 1 power companies) jointly can have the authorization to obtain the program lock key. We describe the security and efficiency analysis through theory and experiments.
منابع مشابه
Selective Release of Smart Metering Data in Multi-domain Smart Grids
In the context of energy efficiency, smart metering solutions are receiving growing attention as they support the automatic collection of (fine-grained) consumption data of appliances. While the capability of a stakeholder (such as a consumer, an utility, or a third-party service) to access smart metering data can give rise to innovative services for users, it makes the control of data release ...
متن کاملMitigation of P2P Overlay Attacks in the Automatic Metering Infrastructure of Smart Grids‡
Measurements gathered by Smart Meters and collected through the Automatic Metering Infrastructure of Smart Grids can be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring. Therefore, to prevent the disclosure of personal information through the analysis of energy consumption patterns, the metering data must be securely handled. Peer-to-peer (P...
متن کاملA protocol for metering data pseudonymization in smart grids
A tradeoff between data collection needs and user privacy is of paramount importance in the Smart Grid. This paper proposes a pseudonymization protocol for data gathered by the Smart Meters, which relies on a network infrastructure and a dedicated set of nodes, called Privacy Preserving Nodes (PPNs). The network privacy is enforced by a separation of duties: the PPNs perform data pseudonymizati...
متن کاملDECENTRALIZED AUTHORIZATIONWITH ECDSA ON A JAVA SMART CARD A Software Implementation
Traditionally, smart cards have been used as secure tokens in identity based access control. That is, a smart card has been used as an intelligent storage of protected cryptographic information, such as a shared secret or a private key in a public key system. The cryptographic information is then used to prove the possession of the card in a secure way either locally or remotely over telecommun...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016