Skip to main content

A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure

  • Conference paper
Applied Informatics and Communication (ICAIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 225))

Included in the following conference series:

Abstract

Key management for secure communications of Advanced Metering Infrastructure is an unsolved problem until now. The difficulties and their basic solutions for AMI to choose a key management scheme will be summed up after the studies of AMI system structure, business process and cyber security requirements, proposing a key management scheme based on a hybrid-tree graph for AMI. The cyber security, including key security, key freshness, forward & backward security, etc., can be satisfied by the presented scheme, while the overhead of the scheme is reasonable. Based on the analysis, the presented scheme is a possible solution for AMI.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cleveland, F.M.: Cyber Security Issues for Advanced Metering Infrastructure (AMI). In: Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century. IEEE, Pittsburgh (2008)

    Google Scholar 

  2. Robert, D., Colin, B., Ed, D., Juan, M.G.N.: SKMA a key management architecture for SCADA systems. In: Proc. 4th Australasian Information Security Workshop, vol. 54, pp. 138–192 (2006)

    Google Scholar 

  3. Wong, C.K., Gouda, M., Lam, S.: Secure group communication using key graphs. IEEE/ACM Trans. on Networking 8, 16–30 (2000)

    Article  Google Scholar 

  4. Mittra, S.: Lolus: a framework for scalable secure multicasting. ACM SIGCOMM Computer Communication Review 27, 277–288 (1997)

    Article  Google Scholar 

  5. Yan, K., Xie, D.-q.: Scheme and Implementation of Key Management Based on LKH. Computer Engineer and Application 31, 145–148 (2006)

    Google Scholar 

  6. Luan, W.-p.: Advanced Metering Infrastructure. Southern Power System Technology 3, 6–10 (2009)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, J., Liu, N., Liu, W., Luo, H. (2011). A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 225. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23220-6_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23220-6_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23219-0

  • Online ISBN: 978-3-642-23220-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics