Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.9.2063

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments  

Lee, Young-Seok (Department of Telecommunication Engineering, Kunsan National University)
Abstract
Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.
Keywords
Smart Grid; SCADA; Key Management; Double Hash chain;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 NIST, "Smart Grid Cyber Security Strategy and Requirements", Draft NISTIR 7628, 02. 2010.
2 Y. G. Jung, et al, "Smart Grid Security Trend", Korea Institute of Information Security & Cryptology, Vol. 20, No. 4, pp. 66-79, Aug. 2010.
3 NIST smart grid, http://www.nist.gov/smartgrid/
4 NIST Special Publication 1108R2, "NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0", 2012. 2.
5 NISTIR 7628, "Guidelines for Smart Grid Cyber Security", 2010. 8.
6 R. D. Colin, C. Boyd, J. Manuel, and G. Nieto, "KMA-A key management architecture for SCADA systems," in Proc. 4th Australasian Inf. Security Workshop, Vol.54, pp. 138-192, 2006.
7 Information Technology - Security Techniques - Key Management - Part 2: Mechani는 Using Symmetric Techniques ISO/IEC 11770-2 International Standard, 1996.
8 D. Choi, H. Kim, D. Won, and S. Kim, "Advanced Key Management Architecture for Secure SCADA Communications", IEEE Transactions on Power Delivery, Vol.24, No.3, pp.1154-1163, 2009.   DOI   ScienceOn
9 D. Choi, S. Lee, D. Won, and S. Kim, "Efficient Secure Group Communications for SCADA", IEEE Transactions on Power Delivery, Vol.25 No.2, pp. 714-722, 2010.   DOI   ScienceOn
10 S. K. Eun, S.H. Oh, "Hash chain based Group Key Management Mechanism for Smart Grid Environments," Korea Institute of Information Security & Cryptology, Vol. 21, No. 4, pp. 149-160, Aug. 2011.
11 Yoon-Su Jeong, "A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node,"pp.569-643,2008.
12 NIST, "NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0", NIST Special Publication, 01. 2010.