DOI:
https://doi.org/10.14483/22487638.9244Publicado:
2014-12-01Número:
Vol. 18 (2014): Special Edition DoctorateSección:
InvestigaciónAuthenticated encryption of pmu data
Palabras clave:
cyber security, symmetric cryptography, hash function, phasor measurement unit, smart grids. (en).Palabras clave:
cyber security, symmetric cryptography, hash function, phasor measurement unit, smart grids (es).Descargas
Resumen (en)
This paper presents the implementation of anencryption board in order to provide confidentiality, authenticity and integrity of data collected at any point in a power grid, as a potential solution to the Smart Grid cyber security issues. This board consists of a Freescale microcontroller which enables the connection between a PMU (Phasor Measurement Unit) and a ZigBee transmitter. Encryption is done using the SHA256, HMAC-SHA256, KDF-SHA256 and AES256-CBC algorithms. This architecture makes reading and transmission of voltage and currentphasors, energy consumption, frequency, power, power factor and power outages measurements and sendsthis information in real time to a data concentrator where display and subsequent storage are possible.
Referencias
Daernen, J., & Rijrnen, V. (2002). The Design of Rijndael, AES - The Advanced Encryption Standard. Springer.
DAI, J.-j., & YAN, M. (2010). The design and implementation of 128-bit AES encryption in PRIME. 2010 3rd International Conference on Computer Science and Information Technology, (págs. 345-348).
De Craemer, K., & Deconinck, G. (2010). Analysis of State-of-the-art Smart Metering Communication Standards.Obtenido de KU LEUVEN REPOSITORY: https://lirias.kuleuven.be/bitstream/123456789/265822/1/SmartMeteringC.
Easter, R., &Bryson, J. (2012). Security Requirements for Cryptographic Modules.Approved Security Functions for FIPS PUB 140-2.
Fan, Z., Kulkarni, P., Gormus, S., Efthymiou, C., Kalogridis, G., Sooriyabandara, M., . . . Chin, W. (2012). Smart Grid Communications : Overview of Research Activities. Communications Surveys & Tutorials, IEEE, 21 - 38.
Gangil, G., & Rakesh, N. (2013). Advanced Security Algorithm for Power Grid., (págs. 409-417).
Katz, J., & Lindell, Y. (2007). Introduction to Modern Cryptography. Chapman & Hall/.
Khalifa, T., Naik, K., & Nayak, A. (2011). A Survey of Communication Protocols for Automatic Meter Reading Applications.IEEE Communications Surveys & Tutorials, 168-182.
Khurana, H., Bobba, R., Yardley, T., Agarwal, P., & Heine, E. (2010). Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols. 2010 43rd Hawaii International Conference on System Sciences, 1-10.
Luan, S.-W., Teng, J.-H., Chan, S.-Y., & Hwang, L.-C. (2009). Development of a smart power meter for AMI based on ZigBee communication. 2009 International Conference on Power Electronics and Drive Systems (PEDS), 661-665.
NIST. (2001). ADVANCED ENCRYPTION STANDARD (AES) Federal. FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION FIPS PUB 197, (pág. 47).
NIST. (2007). Recommendation for Key Management. NIST Special Publication 800-57, (pág. 142).
NIST. (2008). The Keyed-Hash Message Authentication Code. FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION FIPS PUB 198-1, (pág. 8).
NIST. (Agosto de 2010). Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid.From the National Institute of Standardsand Technology: www.nist.gov
NIST. (2010). Nistir 7628 Guidelines for Smart Grid Cyber Security.Form The National Institute of Standards and Technology: http://csrc.nist.gov/publications/nistir/ir7628/introduction-to-nistir-7628.pdf
NIST. (2011). Recommendation for Existing Application-Specific Key Derivation Functions. FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION FIPS PUB 800-135.
NIST. (2012). Secure Hash Standard ( SHS ). FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION FIPS PUB 180-4.
Peng, Z., Elkeelany, O., & Layton, M. (2010). An implementation of secured Smart Grid Ethernet communications using AES. Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), (págs. 394-397).
Seshabhattar, S., Priyanka, Y., Krier, P., & Engels, D. (2011). Hummingbird Key Establishment Protocol For Low- Power ZigBee.IEEE Consumer Communications and Network, (págs. 447-451).
Stallings, W. (2011). NETWORK S ECURITY E SSENTIALS : APPLICATIONS AND STANDARDS.
Cómo citar
APA
ACM
ACS
ABNT
Chicago
Harvard
IEEE
MLA
Turabian
Vancouver
Descargar cita
Licencia
Todos los textos incluidos en la Revista Tecnura están protegidos por derechos de autor. Conforme a la ley, está prohibida su reproducción por cualquier medio, mecánico o electrónico, sin permiso escrito del Comité Editorial. Los textos completos de los artículos son de acceso abierto, es decir, se pueden leer, descargar, copiar, distribuir, imprimir, buscar o vincular. Las opiniones expresadas en los artículos publicados son las de los autores y no coinciden necesariamente con las del Comité Editorial ni las de la administración de la Facultad.