Title :
A secure way of exchanging the secret keys in advanced metering infrastructure
Author :
Thomas, Mini S. ; Ali, Imran ; Gupta, Neeraj
Author_Institution :
Jamia Millia Islamia, New Delhi, India
fDate :
Oct. 30 2012-Nov. 2 2012
Abstract :
Advanced metering infrastructure (AMI) security has become a challenging issue now days because of its integration with the external networks, remote system, and internet world. Today´s metering infrastructure employs computer based monitoring and control operations to enable application of one network to exchange data with other application of different network. Communication protocol, network topologies, and computerization plays crucial roles to make the metering infrastructure advanced and further make a grid smarter. On the other hand, cyber attacks already associated with such computer networks and communication protocol can easily affect the communication of AMI applications. Therefore, from trespasser point of view, in this paper, we explore the various possible types of undesirable security threats followed by desirable security attributes required for the AMI. The paper further describes and implements a signature based station-to-station protocol for exchanging the secret shared keys among the AMI applications to get rid from undesirable security threats.
Keywords :
Internet; computer network security; protocols; telecommunication network topology; telemetry; AMI security; Internet world; advanced metering infrastructure security; communication protocol; external networks; network topologies; remote system; secret keys; signature based station-to-station protocol; Encryption; Indexes; Servers; AMI; Digital Signature; Encryption/Decryption; Key Management; Message Digest; Smart Grid; Station-to-Station Protocol;
Conference_Titel :
Power System Technology (POWERCON), 2012 IEEE International Conference on
Conference_Location :
Auckland
Print_ISBN :
978-1-4673-2868-5
DOI :
10.1109/PowerCon.2012.6401418