DocumentCode :
3198531
Title :
Key management for substations: Symmetric keys, public keys or no keys?
Author :
Fuloria, Shailendra ; Anderson, Ross ; Alvarez, Fernando ; McGrath, Kevin
Author_Institution :
Comput. Lab., Univ. of Cambridge, Cambridge, UK
fYear :
2011
fDate :
20-23 March 2011
Firstpage :
1
Lastpage :
6
Abstract :
In this paper, we discuss symmetric-key and public-key protocols for key management in electricity transmission and distribution substations-both for communication within substations, and between substations and the network control center. Key management in the electricity network is widely regarded as a challenging problem, not only because of the scale, but also due to the fact that any mechanism must be implemented in resource-constrained environments. NISTIR 7628, the foundation document for the architecture of the US Smart Grid, mentions key management as one of the most important research areas, and the IEC 62351 standards committee has already initiated a new specification dedicated to key management. In this document, we describe different variants of symmetric-key and public-key protocols. Our design is motivated by the need to keep the mechanism simple, robust, usable and still cost effective. It is important to take into account the complexity and the costs involved not just in the initial bootstrapping of trust but also in subsequent key management operations like key update and revocation. It is vital to determine the complexity and the cost of recovery mechanisms-recovery not only from malicious, targeted attacks but also from unintentional failures. We present a detailed threat model, analysing a range of scenarios from physical intrusion through disloyal maintenance personnel to supply-chain attacks, network intrusions and attacks on central systems. We conclude that while using cryptography to secure wide area communication between the substation and the network control center brings noticeable benefits, the benefits of using cryptography within the substation bay are much less obvious; we expect that any such use will be essentially for compliance. The protocols presented in this paper are informed by this threat model and are optimised for robustness, including simplicity, usability and cost.
Keywords :
cryptographic protocols; power distribution control; power transmission control; public key cryptography; smart power grids; substation automation; IEC 62351 standard; NISTIR 7628; US smart grid; cryptography; electricity distribution; electricity network control center; electricity transmission; key management operation; public key protocol; resource-constrained environment; secure wide area communication; substation management; symmetric-key protocol; Databases; Ignition; Protocols; Public key; Servers; Substations; key management; substation communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Power Systems Conference and Exposition (PSCE), 2011 IEEE/PES
Conference_Location :
Phoenix, AZ
Print_ISBN :
978-1-61284-789-4
Electronic_ISBN :
978-1-61284-787-0
Type :
conf
DOI :
10.1109/PSCE.2011.5772622
Filename :
5772622
Link To Document :
بازگشت