DOI:
https://doi.org/10.14483/22487638.9244Publicado:
2014-12-01Número:
Vol. 18 (2014): Special Edition DoctorateSección:
InvestigaciónAuthenticated encryption of pmu data
Palabras clave:
cyber security, symmetric cryptography, hash function, phasor measurement unit, smart grids. (en).Palabras clave:
cyber security, symmetric cryptography, hash function, phasor measurement unit, smart grids (es).Descargas
Resumen (en)
This paper presents the implementation of anencryption board in order to provide confidentiality, authenticity and integrity of data collected at any point in a power grid, as a potential solution to the Smart Grid cyber security issues. This board consists of a Freescale microcontroller which enables the connection between a PMU (Phasor Measurement Unit) and a ZigBee transmitter. Encryption is done using the SHA256, HMAC-SHA256, KDF-SHA256 and AES256-CBC algorithms. This architecture makes reading and transmission of voltage and currentphasors, energy consumption, frequency, power, power factor and power outages measurements and sendsthis information in real time to a data concentrator where display and subsequent storage are possible.
Referencias
Daernen, J., & Rijrnen, V. (2002). The Design of Rijndael, AES - The Advanced Encryption Standard. Springer.
DAI, J.-j., & YAN, M. (2010). The design and implementation of 128-bit AES encryption in PRIME. 2010 3rd International Conference on Computer Science and Information Technology, (págs. 345-348).
De Craemer, K., & Deconinck, G. (2010). Analysis of State-of-the-art Smart Metering Communication Standards.Obtenido de KU LEUVEN REPOSITORY: https://lirias.kuleuven.be/bitstream/123456789/265822/1/SmartMeteringC.
Easter, R., &Bryson, J. (2012). Security Requirements for Cryptographic Modules.Approved Security Functions for FIPS PUB 140-2.
Fan, Z., Kulkarni, P., Gormus, S., Efthymiou, C., Kalogridis, G., Sooriyabandara, M., . . . Chin, W. (2012). Smart Grid Communications : Overview of Research Activities. Communications Surveys & Tutorials, IEEE, 21 - 38.
Gangil, G., & Rakesh, N. (2013). Advanced Security Algorithm for Power Grid., (págs. 409-417).
Katz, J., & Lindell, Y. (2007). Introduction to Modern Cryptography. Chapman & Hall/.
Khalifa, T., Naik, K., & Nayak, A. (2011). A Survey of Communication Protocols for Automatic Meter Reading Applications.IEEE Communications Surveys & Tutorials, 168-182.
Khurana, H., Bobba, R., Yardley, T., Agarwal, P., & Heine, E. (2010). Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols. 2010 43rd Hawaii International Conference on System Sciences, 1-10.
Luan, S.-W., Teng, J.-H., Chan, S.-Y., & Hwang, L.-C. (2009). Development of a smart power meter for AMI based on ZigBee communication. 2009 International Conference on Power Electronics and Drive Systems (PEDS), 661-665.
NIST. (2001). ADVANCED ENCRYPTION STANDARD (AES) Federal. FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION FIPS PUB 197, (pág. 47).
NIST. (2007). Recommendation for Key Management. NIST Special Publication 800-57, (pág. 142).
NIST. (2008). The Keyed-Hash Message Authentication Code. FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION FIPS PUB 198-1, (pág. 8).
NIST. (Agosto de 2010). Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid.From the National Institute of Standardsand Technology: www.nist.gov
NIST. (2010). Nistir 7628 Guidelines for Smart Grid Cyber Security.Form The National Institute of Standards and Technology: http://csrc.nist.gov/publications/nistir/ir7628/introduction-to-nistir-7628.pdf
NIST. (2011). Recommendation for Existing Application-Specific Key Derivation Functions. FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION FIPS PUB 800-135.
NIST. (2012). Secure Hash Standard ( SHS ). FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION FIPS PUB 180-4.
Peng, Z., Elkeelany, O., & Layton, M. (2010). An implementation of secured Smart Grid Ethernet communications using AES. Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon), (págs. 394-397).
Seshabhattar, S., Priyanka, Y., Krier, P., & Engels, D. (2011). Hummingbird Key Establishment Protocol For Low- Power ZigBee.IEEE Consumer Communications and Network, (págs. 447-451).
Stallings, W. (2011). NETWORK S ECURITY E SSENTIALS : APPLICATIONS AND STANDARDS.
Cómo citar
APA
ACM
ACS
ABNT
Chicago
Harvard
IEEE
MLA
Turabian
Vancouver
Descargar cita
Licencia
Esta licencia permite a otros remezclar, adaptar y desarrollar su trabajo incluso con fines comerciales, siempre que le den crédito y concedan licencias para sus nuevas creaciones bajo los mismos términos. Esta licencia a menudo se compara con las licencias de software libre y de código abierto “copyleft”. Todos los trabajos nuevos basados en el tuyo tendrán la misma licencia, por lo que cualquier derivado también permitirá el uso comercial. Esta es la licencia utilizada por Wikipedia y se recomienda para materiales que se beneficiarían al incorporar contenido de Wikipedia y proyectos con licencias similares.