Abstract
As an efficient and intelligent system for managing and monitoring electricity usage, the “smart grid” has many useful applications. It supports energy producers and energy consumers efficiently by supporting the estimation and provision of the proper amount of electricity at the proper time. The most serious threat to a smart grid system may be when information is altered or forged by attackers; the system could malfunction and could collapse. In some cases, the attackers could waste system resources on purpose and this could lead to disastrous results. In this paper, we propose security system architecture to provide the secure and reliable smart grid service. It includes a data authentication process to verify the aggregated data and virtual network management to detect a compromised area or node. It detects a false data injection attack and further prevents a denial of service attack efficiently with less overhead for the individual devices comprising the smart grid system.
Access this article
Rent this article via DeepDyve
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig2_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig3_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig4_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig5_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig6_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig7_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig8_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig9_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig10_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-015-1864-5/MediaObjects/500_2015_1864_Fig11_HTML.gif)
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Boneh D, Goh E, Nissim K (2005) Evaluating 2-DNF formulas on ciphertexts. In: Proceedings of theory of cryptography (TCC), pp 325–341
Cheung H et al. (2008) Role-based model security access control for smart power-grids computer networks. In: Proceedings of IEEE PESGM, pp 1–7
Doh I, Lim J, Chae K (2013) Secure aggregation and attack detection for smart grid system. Networking and applications (NeoFusion). In: Proceedings of fourth international symposium on frontiers in ubiquitous computing, pp 270–275
Doh I, Lim J, Chae K (2014) Service security for smart grid system. In: Proceedings of the 8th international conference on innovative mobile and internet services in ubiquitous computing (IMIS 2014)
Fadlullah ZM, Fouda MM, Kato N, Xuemin S, Nozaki Y (2011a) An early warning system against malicious activities for smart grid communications. IEEE Netw 25(5):50–55
Fadlullah ZM, Fouda MM, Kato N, Xuemin S, Nozaki Y (2011b) Toward intelligent machine-to-machine communications in smart grid. IEEE Commun Mag 49:60–65
FitzPatrick J et al. (2009) Report to NIST on smart grid interoperability standards roadmap EPRI, 17 June 2009 (online). http://energy.gov/sites/prod/files/oeprod/ DocumentsandMedia/Report_to_NIST_ August10 _2.pdf
Fouda MM, Fadlullah ZM, Kato N, Lu R, Xuemin S (2011) A light-weight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675–685
Gamal TE (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. Proceedings of CRYPTO 84 on advances in cryptology. Springer, New York, pp 10–18
Hernandez L, Baladron C, Aguiar JM, Carro B, Sanchez-Esguevillas A, Lloret J, Cook D (2013) A multi-agent system architecture for smart grid management and forecasting of energy demand in virtual power plants. IEEE Commun Mag 51(1):106–113
Khurana H, Hadley M, Lu N, Frincke D (2010) Smart-grid security issues. IEEE Secur Priv 8(1):81–85
Kosut O, Jia L, Thomas RJ, Tong L (2011) Malicious data attacks on the smart grid. IEEE Trans Smart Grid 2(4):645–658
Lee A, Brewer T (2010) Smart grid cyber security strategy and requirements. Draft of NIST IR 7628 (2nd draft)
Li F, Luo B, Liu P (2010) Secure information aggregation for smart grids using homomorphic encryption. In: Proceedings of the 1st IEEE conference on smart grid communications (SmartGridComm), pp 27–332
Li Q, Cao G (2011) Multicast authentication in the smart grid with one-time signature. IEEE Trans Smart Grid 2(4):686–696
Li X, Liang X, Lin X, Haojin Zhu (2012) Securing smart grid. Cyber attacks, countermeasures and challenges. IEEE Commun Mag 50:38–45
Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur (TISSEC) 14(1):13
Lu R, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distribut Syst 23(9):1621–1632
Marmol FG, Sorge C, Ugus O, Pérez GM (2012) Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun Mag 50(5):166–172
McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Secur Priv 7(3):75–77
Naccache D, Stern J (1998) A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM conference on computer and communications security, pp 59–66
Oheimb DV (2013) IT security architecture approaches for smart metering and smart grid. Smart GridSec. In: Lecture notes in computer science, vol 7823, pp 1–25
Paillier P (1999) Public-key cryptosystem based on composite degree residuosity classes. In: Proceedings of Eurocrypt ’99, vol 1592, pp 223–238
Pang C, Vyatkin V, Deng Y, Sorouri M (2013) Virtual smart metering in automation and simulation of energy-efficient lighting system. In: Proceedings of 2013 IEEE 18th in emerging technologies and factory automation (ETFA), pp 1–8
Park J, Choi K, Doh I, Chae K (2010) Secure aggregation using homomorphic principle with verification. In: Proceedings of KIPS, pp 993–996
Rivest R (2002) Voting. Homomorphic encryption. In: Lecture notes, vol 15
Rogers KM, Klump R, Khurana H, Aquino-Lugo AA, Overbye TJ (2010) An authenticated control framework for distributed voltage support on the smart grid. In: IEEE transactions on smart grid, vol 1
Rottondi C, Verticale G, Krauß C (2013) Secure distributed data aggregation in the automatic metering infrastructure of smart grids. In: Proceedings of international conference on communications (ICC)
Schmidhuber J (1996) A general method for multi-agent learning and incremental selfimprovement in unrestricted environments. In: Yao X (ed) Evolutionary computation: theory and applications. Scientific Publication, Singapore
Wang W, Xu Y, Khanna M (2011) A survey on the communication architectures in smart grids. Comput Netw 55:3604–3629
Wei D, Lu Y, Jafari M, Skare P, Rohde K (2010) An integrated security system of protecting smart grid against cyber attacks. In: Proceedings of innovative smart grid technologies (ISGT)
Yan Y, Qian Y, Sharif H (2011) A secure data aggregation and dispatch scheme for home area networks in smart grid. In: Proceedings of global telecommunications conference (Globecom)
Yan Y, Qian Y, Sharif H, Tipper D (2012) A survey on cyber security for smart grid communications. IEEE Commun Surv Tutor 14(4)
Zhang Y, Wang L, Sun W, Green RC, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2012R1A1A3019459).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Communicated by A. Jara, M. R. Ogiela, I. You and F.-Y. Leu.
Rights and permissions
About this article
Cite this article
Lim, J., Doh, I. & Chae, K. Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system. Soft Comput 20, 1829–1840 (2016). https://doi.org/10.1007/s00500-015-1864-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-015-1864-5