Skip to main content

Advertisement

Log in

Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

As an efficient and intelligent system for managing and monitoring electricity usage, the “smart grid” has many useful applications. It supports energy producers and energy consumers efficiently by supporting the estimation and provision of the proper amount of electricity at the proper time. The most serious threat to a smart grid system may be when information is altered or forged by attackers; the system could malfunction and could collapse. In some cases, the attackers could waste system resources on purpose and this could lead to disastrous results. In this paper, we propose security system architecture to provide the secure and reliable smart grid service. It includes a data authentication process to verify the aggregated data and virtual network management to detect a compromised area or node. It detects a false data injection attack and further prevents a denial of service attack efficiently with less overhead for the individual devices comprising the smart grid system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Rent this article via DeepDyve

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Boneh D, Goh E, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts. In: Proceedings of theory of cryptography (TCC), pp 325–341

  • Cheung H et al. (2008) Role-based model security access control for smart power-grids computer networks. In: Proceedings of IEEE PESGM, pp 1–7

  • Doh I, Lim J, Chae K (2013) Secure aggregation and attack detection for smart grid system. Networking and applications (NeoFusion). In: Proceedings of fourth international symposium on frontiers in ubiquitous computing, pp 270–275

  • Doh I, Lim J, Chae K (2014) Service security for smart grid system. In: Proceedings of the 8th international conference on innovative mobile and internet services in ubiquitous computing (IMIS 2014)

  • Fadlullah ZM, Fouda MM, Kato N, Xuemin S, Nozaki Y (2011a) An early warning system against malicious activities for smart grid communications. IEEE Netw 25(5):50–55

  • Fadlullah ZM, Fouda MM, Kato N, Xuemin S, Nozaki Y (2011b) Toward intelligent machine-to-machine communications in smart grid. IEEE Commun Mag 49:60–65

  • FitzPatrick J et al. (2009) Report to NIST on smart grid interoperability standards roadmap EPRI, 17 June 2009 (online). http://energy.gov/sites/prod/files/oeprod/ DocumentsandMedia/Report_to_NIST_ August10 _2.pdf

  • Fouda MM, Fadlullah ZM, Kato N, Lu R, Xuemin S (2011) A light-weight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675–685

    Article  Google Scholar 

  • Gamal TE (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. Proceedings of CRYPTO 84 on advances in cryptology. Springer, New York, pp 10–18

    Google Scholar 

  • Hernandez L, Baladron C, Aguiar JM, Carro B, Sanchez-Esguevillas A, Lloret J, Cook D (2013) A multi-agent system architecture for smart grid management and forecasting of energy demand in virtual power plants. IEEE Commun Mag 51(1):106–113

    Article  Google Scholar 

  • Khurana H, Hadley M, Lu N, Frincke D (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81–85

    Article  Google Scholar 

  • Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645–658

    Article  Google Scholar 

  • Lee A, Brewer T (2010) Smart grid cyber security strategy and requirements. Draft of NIST IR 7628 (2nd draft)

  • Li F, Luo B, Liu P (2010) Secure information aggregation for smart grids using homomorphic encryption. In: Proceedings of the 1st IEEE conference on smart grid communications (SmartGridComm), pp 27–332

  • Li Q, Cao G (2011) Multicast authentication in the smart grid with one-time signature. IEEE Trans Smart Grid 2(4):686–696

    Article  Google Scholar 

  • Li X, Liang X, Lin X, Haojin Zhu (2012) Securing smart grid. Cyber attacks, countermeasures and challenges. IEEE Commun Mag 50:38–45

    Article  Google Scholar 

  • Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur (TISSEC) 14(1):13

    Article  Google Scholar 

  • Lu R, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distribut Syst 23(9):1621–1632

    Article  Google Scholar 

  • Marmol FG, Sorge C, Ugus O, Pérez GM (2012) Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun Mag 50(5):166–172

    Article  Google Scholar 

  • McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 7(3):75–77

  • Naccache D, Stern J (1998) A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM conference on computer and communications security, pp 59–66

  • Oheimb DV (2013) IT security architecture approaches for smart metering and smart grid. Smart GridSec. In: Lecture notes in computer science, vol 7823, pp 1–25

  • Paillier P (1999) Public-key cryptosystem based on composite degree residuosity classes. In: Proceedings of Eurocrypt ’99, vol 1592, pp 223–238

  • Pang C, Vyatkin V, Deng Y, Sorouri M (2013) Virtual smart metering in automation and simulation of energy-efficient lighting system. In: Proceedings of 2013 IEEE 18th in emerging technologies and factory automation (ETFA), pp 1–8

  • Park J, Choi K, Doh I, Chae K (2010) Secure aggregation using homomorphic principle with verification. In: Proceedings of KIPS, pp 993–996

  • Rivest R (2002) Voting. Homomorphic encryption. In: Lecture notes, vol 15

  • Rogers KM, Klump R, Khurana H, Aquino-Lugo AA, Overbye TJ (2010) An authenticated control framework for distributed voltage support on the smart grid. In: IEEE transactions on smart grid, vol 1

  • Rottondi C, Verticale G, Krauß C (2013) Secure distributed data aggregation in the automatic metering infrastructure of smart grids. In: Proceedings of international conference on communications (ICC)

  • Schmidhuber J (1996) A general method for multi-agent learning and incremental selfimprovement in unrestricted environments. In: Yao X (ed) Evolutionary computation: theory and applications. Scientific Publication, Singapore

    Google Scholar 

  • Wang W, Xu Y, Khanna M (2011) A survey on the communication architectures in smart grids. Comput Netw 55:3604–3629

    Article  Google Scholar 

  • Wei D, Lu Y, Jafari M, Skare P, Rohde K (2010) An integrated security system of protecting smart grid against cyber attacks. In: Proceedings of innovative smart grid technologies (ISGT)

  • Yan Y, Qian Y, Sharif H (2011) A secure data aggregation and dispatch scheme for home area networks in smart grid. In: Proceedings of global telecommunications conference (Globecom)

  • Yan Y, Qian Y, Sharif H, Tipper D (2012) A survey on cyber security for smart grid communications. IEEE Commun Surv Tutor 14(4)

  • Zhang Y, Wang L, Sun W, Green RC, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2012R1A1A3019459).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Inshil Doh.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Communicated by A. Jara, M. R. Ogiela, I. You and F.-Y. Leu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lim, J., Doh, I. & Chae, K. Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system. Soft Comput 20, 1829–1840 (2016). https://doi.org/10.1007/s00500-015-1864-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-015-1864-5

Keywords

Navigation