Skip to main content

Advertisement

Log in

Towards Fault-Tolerant Fine-Grained Data Access Control for Smart Grid

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Data access control within smart grids is a challenging issue because of the environmental noise and interferences. On one hand side, fine-grained data access control is essential because illegal access to the sensitive data may cause disastrous implications and/or be prohibited by the law. On the other hand, fault tolerance of the access control is very important, because of the potential impacts (implied by the errors) which could be significantly more serious than the ones regarding general data. In particular, control bits corruption could invalidate the security operation. To address the above challenges, this paper proposes a dedicated data access control scheme that is able to enforce fine-grained access control and resist against the corruptions implied by the noisy channels and the environmental interferences. The proposed scheme exploits a state-of-the-art cryptographic primitive called Fuzzy identity-based encryption with the lattice based access control and dedicated error-correction coding. We evaluate our proposed scheme by extensive simulations in terms of error correcting capability and energy consumption and results show the efficiency and feasibility of the proposed scheme. To our best knowledge, this paper is the first which addresses fault tolerant fine-grained data access control for smart grid.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

References

  1. Fadlullah, Z. M., Kato, N., Lu, R., Shen, X., & Nozaki, Y. (2012). Towards secure targeted broadcast in smart grid. IEEE Communications Magazine, 50(5), 150–156.

    Article  Google Scholar 

  2. Zhang, Y., Wang, L., Sun, W., Green, R. C, I. I., & Alam, M. (2011). Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Transactions on Smart Grid, 2(4), 796–808.

    Article  Google Scholar 

  3. Fouda, M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011). A light-weight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675–685.

    Article  Google Scholar 

  4. Lu, R., Liang, X., Li, X., Lin, X., & Shen, X. (2012). EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1621–1631.

    Article  Google Scholar 

  5. Fadlullah, Z. M., Fouda, M. M., Kato, N., Takeuchi, A., Iwasaki, N., & Nozaki, Y. (2011). Towards intelligent machine-to-machine communications in smart grid. IEEE Communications Magazine, 49(9), 60–65.

    Article  Google Scholar 

  6. Wu, Y., Min, G., & Yang, L. T. (2013). Performance analysis of hybrid wireless networks under bursty and correlated traffic. IEEE Transactions Vehicular Technology, 62(1), 449–454.

    Article  Google Scholar 

  7. Alcaraz, C., Lopez, J., Roman, R., & Chen, H. H. (2012). Selecting key management schemes for WSN applications. Computers & Security, 31(8), 956–966.

    Article  Google Scholar 

  8. Wu, Y., Min, G., Li, K., & Javadi, B. (2012). Modeling and analysis of communication networks in multicluster systems under spatio-temporal bursty traffic. IEEE Transactions on Parallel Distributed System, 23(5), 902–912.

    Article  Google Scholar 

  9. Wu, Y., Min, G., & Al-Dubai, A. Y. (2012). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications, 11(5), 1643–1648.

    Article  Google Scholar 

  10. Hu, R. Q., Qian, Y., Chen, H. H., & Mouftah, H. T. (2012). Cyber security for smart grid communications: Part I. IEEE Communications Magazine, 50(8), 16–17.

    Article  Google Scholar 

  11. Fadlullah, Z. M., Fouda, M., Kato, N., Shen, X., & Nozaki, Y. (2011). An early warning system against malicious activities for smart grid communications. IEEE Network-special issue on Communication Infrastructures for Smart Grid, 25(5), 50–55.

    Google Scholar 

  12. Wang, X., & Yi, P. (2011). Security framework for wireless communications in smart distribution grid. IEEE Transactions on Smart Grid, 2(4), 809–818.

    Article  MathSciNet  Google Scholar 

  13. Neuman, C., & Tan, K. (2011). Mediating cyber and physical threat propagation in secure smart grid architectures. In Proceedings of 2nd IEEE international conference on smart grid, communications (SmartGridComm 2011).

  14. Liu, J., Li, X., Liu, D., Liu, H., & Mao, P. (2011). Study on data management of fundamental model in control center for smart grid operation. IEEE Transactions on Smart Grid, 2(4), 573–579.

    Article  MathSciNet  Google Scholar 

  15. Qiu, J., Liu, J., Hou, Y., & Zhang, J. (2011). Use of real-time/historical database in smart grid. In Proceedings of international conference on electric information and control engineering (ICEICE 2011).

  16. Cheung, H., Hamlyn, A., Mander, T., Yang, C., & Cheung, R. (2007). Strategy and role-based model of security access control for smart grids computer networks. In Proceedings of IEEE Canada electrical power conference (EPC 2007).

  17. Bhatti, S. A., Shan, Q., Atkinson, R., Vieira, M., & Glover, I. A. (2011). Vulnerability of Zigbee to impulsive noise in electricity substations. In Proceedings of XXX URSI general assembly and scientific, symposium 2011.

  18. Rieken, D. W., & Walker, M. R. (2011). Ultra low frequency power-line communications using a resonator circuit. IEEE Transactions on Smart Grid, 2(1), 41–50.

    Article  Google Scholar 

  19. Kim, S., Kwon, E. Y., Kim, M., Cheon, J. H., Ju, S., Lim, Y., et al. (2011). A secure smart-metering protocol over power-line communication. IEEE Transactions on Power Delivery, 26(4), 2370–2379.

    Article  Google Scholar 

  20. Rehman, O. U., Zivic, N., Tabatabaei, S. A. H. A. E., & Ruland, C. (2011). Error correcting and weighted noise tolerant message authentication codes. In Proceedings of 5th international conference on signal processing and communication systems (ICSPCS 2011).

  21. Chen, S., Wu, M., & Lu, W. (2012). Compressed error and erasure correcting codes via rank-metric codes in random network coding. International Journal of Communication Systems, 25(11), 1398–1414.

    Article  Google Scholar 

  22. Kliazovich, D., Redana, S., & Granelli, F. (2012). Cross-layer error recovery in wireless access networks: The ARQ proxy approach. International Journal of Communication Systems, 25(4), 461–477.

    Article  Google Scholar 

  23. Li, H., & Ren, J. (2007). A syntax aware error-tolerant encryption for secure multimedia communications. In Proceedings of IEEE workshop on signal processing applications for public security and forensics (SAFE 2007).

  24. Banu, R. (2009). Fault-tolerant encryption for space applications. IEEE Transactions Aerospace and Electronic Systems, 45(1), 266–278.

    Article  Google Scholar 

  25. Hemenway, B., & Ostrovsky, R. (2008). Public-key locally-decodable codes. In Proceedings of the 28th annual conference on cryptology: Advances in cryptology (CRYPTO 2008).

  26. Bose, A. (2010). Smart transmission grid application and their supporting infrastructures. IEEE Transactions on Smart Grid, 1(1), 11–19.

    Article  Google Scholar 

  27. Rao, L., Liu, X., Xie, L., & Liu, W. (2012). Coordinated energy cost management of distributed internet data centers in smart grid. IEEE Transactions on Smart Grid, 3(1), 50–58.

    Article  Google Scholar 

  28. Afzal, M., & Pothamsetty, V. (2012). Analytics for distributed smart grid sensing. In Proceedings of IEEE PES innovative smart grid technologies (ISGT 2012).

  29. Pipattanasomporn, M., Feroze, H., & Rahman, S. (2009). Multi-agent systems in a distributed smart grid: Design and implementation. In Proceedings of IEEE/PES power systems conference and exposition (PSCE 2009).

  30. Guzelgoz, S. (2011). Characterizing wireless and powerline communication channels with applications to smart grid networks. Ph. D: Dissertation, University of South Florida, April 2011.

  31. Katayama, M., Yamazato, T., & Okada, H. (2006). A mathematical model of noise in narrowband power line communication systems. IEEE Journal on Selected Areas in Communications, 24(7), 1267–1276.

    Article  Google Scholar 

  32. Anatory, J., Theethayi, N., Thottappillil, R., Kissaka, M. M., & Mvungi, N. H. (2008). Broadband power-line communications: The channel capacity analysis. IEEE Transactions on Power Delivery, 23(1), 164–170.

    Article  Google Scholar 

  33. Meng, H., Guan, Y. L., & Chen, S. (2005). Modeling and analysis of noise effects on broadband power-line communications. IEEE Transactions on Power Delivery, 20(2), 630–637.

    Article  Google Scholar 

  34. Shan, Q., Glover, I. A., Atkinson, R. C., Bhatti, S. A., Portugues, I. E., Moore, P. J., et al. (2011). Estimation of impulsive noise in an electricity substation. IEEE Transactions on Electromagnetic Compatibility, 53(3), 653–663.

    Article  Google Scholar 

  35. Close, G. F., Frey, U., Breitwisch, M., Lung, H. L., Lam, C., Hagleitner, C., & Eleftheriou, E. (2010). Device, circuit and system-level analysis of noise in multi-bit phase-change memory. In Proceedings of IEEE international electron devices meeting (IEDM 2010).

  36. Liu, Z., & Kursun, V. (2007) High read stability and low leakage cache memory cell. In IEEE international symposium on circuits and systems (ISCAS 2007).

  37. Fierens, P. I., Ibáñeza, S. A., Perazzo, R. P. J., Patterson, G. A., & Grosz, D. F. (2010). A memory device sustained by noise. Physics Letters A, 374(22), 2207–2209.

    Article  MATH  Google Scholar 

  38. She, X., Li, N., & Jensen, D. W. (2012). SEU tolerant memory using error correction code. IEEE Transactions on Nuclear Science, 59(1), 205–210.

    Article  Google Scholar 

  39. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Proceedings of 25th annual international cryptology conference (CRYPTO 2005).

  40. Bentoutou, Y. (2006). Efficient memory error coding for space computer applications. In Proceedings of 2nd IEEE international conference on information and communication technologies: From theory to applications (ICTTA 2006).

  41. Yao, X., Clark, L. T., Patterson, D. W., & Holbert, K. E. (2010). Single event transient mitigation in cache memory using transient error checking circuits. In Proceedings of IEEE custom integrated circuits conference (CICC 2010).

  42. Boncelet, C. G, Jr. (2006). The NTMAC for authentication of noisy messages. IEEE Transactions on Information Forensics Security, 1(1), 35–42.

    Article  Google Scholar 

  43. Sarier, N. D. (2011). A new biometric identity based encryption scheme secure against DoS attacks. Security and Communication Networks, 4(1), 23–32.

    Article  Google Scholar 

  44. Kovacs, L. (2006). Concept lattice structure with attribute lattices. Production System and Information Engineering, 4, 65–79.

    Google Scholar 

  45. Zhang, L., Zhang, H., Yin, L., & Shen, X. (2011). A mandatory access control model based on concept lattice. In Proceedings of international conference on network computing and information security (NCIS 2011).

  46. Erol-Kantarci, M., & Mouftah, H. T. (2010). Wireless sensor networks for cost-efficient residential energy management in the smart grid. IEEE Transactions on Smart Grid, 2(2), 314–325.

    Article  Google Scholar 

  47. Gungor, V. C., Lu, B., & Hancke, G. P. (2010). Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10), 3557–3564.

    Article  Google Scholar 

  48. Shnayder, V., Hempstead, M., Chen, B., Allen, G., Allen, G. W., & Welsh, M. (2004). Simulating the power consumption of large-scale sensor network applications. In Proceedings of international conference on embedded networked sensor systems 2004.

  49. Minhas, A. A., Trathnigg, T., Steger, C., & Wei\(\beta \), R. (2006). Energy saving in pervasive wireless sensor networks. In Proceedings of 2nd IET international conference on intelligent environments (IE 2006).

Download references

Acknowledgments

This work is supported by JSPS A3 Foresight Program and NEC C&C Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mianxiong Dong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wu, J., Dong, M., Ota, K. et al. Towards Fault-Tolerant Fine-Grained Data Access Control for Smart Grid. Wireless Pers Commun 75, 1787–1808 (2014). https://doi.org/10.1007/s11277-013-1294-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1294-6

Keywords

Navigation