Nothing Special   »   [go: up one dir, main page]

Skip to main content

Attacks on Authentication and Authorization Models in Smart Grid

  • Chapter
  • First Online:
Smart Micro-Grid Systems Security and Privacy

Part of the book series: Advances in Information Security ((ADIS,volume 71))

Abstract

The evolution of a conventional electric grid infrastructure can be dated back to 1880s when the outstanding sources of energy were based on hydraulics and gas energy. But one cannot only depend upon the classic electric grid system in today’s digital world. However, the smart grid and smart micro grid provide electric power in many efficient and measured ways, which are helpful in the technology-enabled market. Accordingly, in this chapter, we explain structure of the smart grid and discuss various authentication schemes associated with it. We have described different security parameters and varied attacks, which should be considered for successful and secure usage of the smart grid system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook
USD 15.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), pp. 770–772.

    Article  Google Scholar 

  2. Hamlyn, A., Cheung, H., Mander, T., Wang, L., Yang, C., & Cheung, R. (2008). Computer network security management and authentication of smart grids operations. In Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, IEEE, pp. 1–7.

    Google Scholar 

  3. Xu, K., Ma, X., & Liu, C. (2008). A hash tree based authentication scheme in SIP applications. In Communications, ICC’08. IEEE International Conference on, pp. 1510–1514.

    Chapter  Google Scholar 

  4. Kaplan, S. M. (2009). Electric power transmission: background and policy issues. US Congressional Research Service, April, 14, pp. 4–5.

    Google Scholar 

  5. Bobba, R., Khurana, H., AlTurki, M., & Ashraf, F. (2009). PBES: a policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th ACM international symposium on information, computer, and communications security, pp. 262–275.

    Google Scholar 

  6. Valli, C. (2009). The not so smart, smart grid: Potential security risks associated with the deployment of smart grid technologies. In Proceedings of the 7th Australian Digital Forensics Conference, pp. 19–23.

    Google Scholar 

  7. Quinn, E. L. Privacy and the new energy infrastructure, (2009).

    Google Scholar 

  8. Cavoukian, A., Polonetsky, J., & Wolf, C. (2010). Smart privacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society, 3(2), pp. 275–294.

    Article  Google Scholar 

  9. Metke, A. R., & Ekl, R. L.(2010). Security technology for smart grid networks. IEEE Transactions on Smart Grid, 1(1), pp. 99–107.

    Article  Google Scholar 

  10. Wei, D., Lu, Y., Jafari, M., Skare, P., & Rohde, K. (2010). An integrated security system of protecting smart grid against cyber attacks. In Proceedings of IEEE Innovative Smart Grid Technologies, pp. 1–7.

    Google Scholar 

  11. Bennett, C., & Wicker, S. B. (2010). Decreased time delay and security enhancement recommendations for AMI smart meter networks. In Proceedings of IEEE Innovative Smart Grid Technologies, pp. 1–6.

    Google Scholar 

  12. Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1), 13.

    Article  Google Scholar 

  13. Li, Q., & Cao, G. (2011). Multi-cast authentication in the smart grid with one-time signature. IEEE Transactions Smart Grid, 2(4), pp. 686–696.

    Article  Google Scholar 

  14. Nicanfar, H., Jokar, P., & Leung, V. C. (2011). Smart grid authentication and key management for unicast and multicast communications. In Proceedings of IEEE Innovative Smart Grid Technologies Asia, pp. 1–8.

    Google Scholar 

  15. Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. S. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), pp. 675–685.

    Article  Google Scholar 

  16. Nicanfar, H., & Leung, V. C. (2012). Smart grid multilayer consensus password-authenticated key exchange protocol. In Communications (ICC), 2012 IEEE International Conference on, pp. 6716–6720.

    Chapter  Google Scholar 

  17. Fang, X, Mistra, S., Xue, G., & Yang, D. (2012). Smart Grid - The new and improved power grid: A survey. IEEE communications surveys & tutorials, 14(4), pp. 944–980.

    Article  Google Scholar 

  18. Kim, Y. S., & Heo, J. (2012). Device authentication protocol for smart grid systems using homomorphic hash. Journal of Communications and Networks, 14(6), pp. 606–613.

    Article  Google Scholar 

  19. Nicanfar, H., & Leung, V. C. (2013). Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system. IEEE Transactions on Smart Grid, 4(1), pp. 253–264.

    Article  Google Scholar 

  20. Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), pp. 1344–1371.

    Article  Google Scholar 

  21. Zeadally, S., Pathan, A. S. K., Alcaraz, C., & Badra, M. (2013). Towards privacy protection in smart grid. Wireless personal communications, 73(1), pp. 23–50.

    Article  Google Scholar 

  22. Bari, A., Jiang, J., Saad, W., & Jaekel, A. (2014). Challenges in the smart grid applications: an overview. International Journal of Distributed Sensor Networks, 10(2), pp. 1–11.

    Article  Google Scholar 

  23. Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2014). An efficient merkle-tree-based authentication scheme for smart grid. IEEE Systems Journal, 8(2), pp. 655–663.

    Article  Google Scholar 

  24. Saxena, N., & Choi, B. J. (2015). State of the art authentication, access control, and secure integration in smart grid. Energies, 8(10), pp. 11883–11915.

    Article  Google Scholar 

Download references

Acknowledgements

We are grateful to the anonymous reviewers for their noteworthy time and effort in suggesting their exceptional views on the chapter in the review process. In addition, we are thankful to editors for the handling of this book. This work is partially supported by NIIT University, Neemrana, India.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Limbasiya, T., Arya, A. (2018). Attacks on Authentication and Authorization Models in Smart Grid. In: Kayem, A., Wolthusen, S., Meinel, C. (eds) Smart Micro-Grid Systems Security and Privacy. Advances in Information Security, vol 71. Springer, Cham. https://doi.org/10.1007/978-3-319-91427-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91427-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91426-8

  • Online ISBN: 978-3-319-91427-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics