Key Management System

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 208029 Experts worldwide ranked by ideXlab platform

Aditya Sundararajan - One of the best experts on this subject based on the ideXlab platform.

  • securing metering infrastructure of smart grid a machine learning and localization based Key Management approach
    Energies, 2016
    Co-Authors: Imtiaz Parvez, Arif I Sarwat, Aditya Sundararajan
    Abstract:

    In smart cities, advanced metering infrastructure (AMI) of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based Key Management System for meter data encryption. Data are encrypted by the Key associated with the coordinate of the meter and a random Key index. The encryption Keys are managed and distributed by a trusted third party (TTP). Localization of the meter is proposed by a method based on received signal strength (RSS) using the maximum likelihood estimator (MLE). The received packets are decrypted at the control center with the Key mapped with the Key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN) algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.

Imtiaz Parvez - One of the best experts on this subject based on the ideXlab platform.

  • securing metering infrastructure of smart grid a machine learning and localization based Key Management approach
    Energies, 2016
    Co-Authors: Imtiaz Parvez, Arif I Sarwat, Aditya Sundararajan
    Abstract:

    In smart cities, advanced metering infrastructure (AMI) of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based Key Management System for meter data encryption. Data are encrypted by the Key associated with the coordinate of the meter and a random Key index. The encryption Keys are managed and distributed by a trusted third party (TTP). Localization of the meter is proposed by a method based on received signal strength (RSS) using the maximum likelihood estimator (MLE). The received packets are decrypted at the control center with the Key mapped with the Key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN) algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.

Mauro Conti - One of the best experts on this subject based on the ideXlab platform.

  • Key Management Systems for smart grid advanced metering infrastructure a survey
    IEEE Communications Surveys and Tutorials, 2019
    Co-Authors: Amrita Ghosal, Mauro Conti
    Abstract:

    Smart grids are evolving as the next generation power Systems that transform the traditional ways of functioning of present electrical grids. Advanced metering infrastructure (AMI) is one of the Key components in smart grids. An AMI comprises of Systems and networks, that are responsible for collecting and analyzing data received from smart meters. In addition, AMI also manages the different applications related with power and services based on the data collected from smart meters. Thus, AMI plays a significant role in the smooth functioning of smart grids. Malicious adversaries have immense opportunities for attacking the AMI, as it is made up of Systems that are highly vulnerable to such attacks. Providing security to AMI is necessary as adversaries can cause potential infrastructural damage and privacy threats in smart grid. One of the most effective and challenging topic’s identified, is the Key Management System (KMS), for sustaining the security concerns in AMI. Therefore, KMS seeks to be a promising research area for future development of AMI. To the best of our knowledge, this survey is the first to highlight the significance of KMS for the security point of view for AMI in smart grids. We believe that we have taken here the needed initiatives that will help understand the importance of Key Management in AMI security, and strengthen future research works carried out in this area. This survey highlights the Key security issues of AMIs and focuses on how Key Management techniques can be utilized for safeguarding AMI. At first, we discuss the main features of AMIs, the deployment scenario of smart grids and identify the relationship between smart grid and AMI. Then, we explore the main features of AMI, and also introduce the security issues and challenges. We also provide a discussion on the role of Key Management in AMI, and point out the differences between traditional electrical Systems and smart grids. We then classify and provide a review of the existing works in literature that deal with secure KMS in AMI. Finally, we summarize the possible future open research issues and challenges of KMS in AMI.

  • Key Management Systems for smart grid advanced metering infrastructure a survey
    arXiv: Cryptography and Security, 2018
    Co-Authors: Amrita Ghosal, Mauro Conti
    Abstract:

    Smart Grids are evolving as the next generation power Systems that involve changes in the traditional ways of generation, transmission and distribution of power. Advanced Metering Infrastructure (AMI) is one of the Key components in smart grids. An AMI comprises of Systems and networks, that collects and analyzes data received from smart meters. In addition, AMI also provides intelligent Management of various power-related applications and services based on the data collected from smart meters. Thus, AMI plays a significant role in the smooth functioning of smart grids. AMI is a privileged target for security attacks as it is made up of Systems that are highly vulnerable to such attacks. Providing security to AMI is necessary as adversaries can cause potential damage against infrastructures and privacy in smart grid. One of the most effective and challenging topic's identified, is the Key Management System (KMS), for sustaining the security concerns in AMI. Therefore, KMS seeks to be a promising research area for future development of AMI. This survey work highlights the Key security issues of advanced metering infrastructures and focuses on how Key Management techniques can be utilized for safeguarding AMI. First of all, we explore the main features of advanced metering infrastructures and identify the relationship between smart grid and AMI. Then, we introduce the security issues and challenges of AMI. We also provide a classification of the existing works in literature that deal with secure Key Management System in AMI. Finally, we identify possible future research directions of KMS in AMI.

Arif I Sarwat - One of the best experts on this subject based on the ideXlab platform.

  • securing metering infrastructure of smart grid a machine learning and localization based Key Management approach
    Energies, 2016
    Co-Authors: Imtiaz Parvez, Arif I Sarwat, Aditya Sundararajan
    Abstract:

    In smart cities, advanced metering infrastructure (AMI) of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based Key Management System for meter data encryption. Data are encrypted by the Key associated with the coordinate of the meter and a random Key index. The encryption Keys are managed and distributed by a trusted third party (TTP). Localization of the meter is proposed by a method based on received signal strength (RSS) using the maximum likelihood estimator (MLE). The received packets are decrypted at the control center with the Key mapped with the Key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN) algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.

Jean-pierre Hubaux - One of the best experts on this subject based on the ideXlab platform.

  • Self-organized public-Key Management for mobile ad hoc networks
    IEEE Transactions on Mobile Computing, 2003
    Co-Authors: Srdjan Capkun, Levente Buttyán, Jean-pierre Hubaux
    Abstract:

    In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-Key Management System that allows users to generate their public-private Key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the System initialization phase.