2019
DOI: 10.1016/j.cose.2018.09.014
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight integrity protection scheme for low latency smart grid applications

Abstract: The substation communication protocol used in smart grid allows the transmission of messages without integrity protection for applications that require very low communication latency. This leaves the real-time measurements taken by phasor measurement units (PMUs) vulnerable to man-in-the-middle attacks, and hence makes high voltage to medium voltage (HV/MV) substations vulnerable to cyber-attacks. In this paper, a lightweight and secure integrity protection algorithm has been proposed to maintain the integrity… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 33 publications
0
11
0
Order By: Relevance
“…The size of the window varies depending on the data dynamics, and the system adaptively decides about it. Utility: We measure the utility of the output data using the sum of squared errors (SSE) [26].…”
Section: Formal Analysismentioning
confidence: 99%
“…The size of the window varies depending on the data dynamics, and the system adaptively decides about it. Utility: We measure the utility of the output data using the sum of squared errors (SSE) [26].…”
Section: Formal Analysismentioning
confidence: 99%
“…TABLE I lists the notations used in this section. As pointed out in [20], the device to device communication between ICD and controller (D2D link) is insecure and vulnerable to data integrity attacks [21]. In the following, we discuss a 'blind therapy override' attack scenario.…”
Section: A Attack Modelmentioning
confidence: 99%
“…This range specifies the most common values of energy (in joules) used by ICD for therapies [18]. The values are taken as 25, 28, 20,32,22,18,23,30,40,25,21,19,30,25,26,35. The calculations for the sample mean are performed on these values.…”
Section: Algorithm 1: Detection Of An External Command and Its Classimentioning
confidence: 99%
“…This matrix is then encrypted and sent to the RSU to which this leader is subscribed. In [5], we have proposed a lightweight, permutation-only encryption scheme for use in transmitting smart-grid protection messages that are normally not encrypted due to high latency associated with normal encryption mechanisms. In this paper, we propose a simple variant of such an algorithm for encrypting D t , which we henceforth call as messages.…”
Section: A Potential Security Approachmentioning
confidence: 99%
“…Our algorithm was tested on a 48-MHz ARM Cortex-M0 microcontroller along with other popular schemes such as AES-128-CCM, AES-128-EAX, AES-128-GCM, Chaskey, MD5, and ChaCha20-Poly1305 on the same platform [7]. The detailed performance is discussed in [5]. It is clear that our method is much faster than all of the competitors and is suitable for real-time use.…”
Section: A Performance Analysismentioning
confidence: 99%