Hardware-based Authentication and Security for Advanced Metering Infrastructure

Hardware-based Authentication and Security for Advanced Metering Infrastructure PDF Author: Atul Prasad Deb Nath
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 97

Get Book Here

Book Description
The power system infrastructure of the United States has embarked on a crucial transformation. The enormous change in the infrastructure ranging from private and public sectors to fossil fuel-based power plants, solar plants, and wind farms affects every entity in between. The transformation in power industry is central to national efforts to enhance efficiency, security, and reliability of electric power supply, increase integration of distributed renewable energy sources, eliminate the nation's CO2 footprint by gradual reduction of greenhouse gas emission, and develop a 21st century smart electric grid compatible with future environmental sustainability and economic prosperity. However, the integration of Information technology (IT), Industrial Control Systems (ICS) and an advanced communication infrastructure exposes smart grid to the cyber threats associated with the networks. Consequently, cybersecurity is crucial to ensure the efficiency, reliability, and security of the evolving power grid system. Security issues pertaining to Advanced Metering Infrastructure (AMI) system has been a major concern since the advent of smart grid. Secure and reliable authentication of smart meters and data collectors connected in AMI system is of utmost importance to ensure compliance with the security requirements of smart grid. In this work, a novel authentication and key management scheme is introduced for the AMI system of smart grid using configurable Ring Oscillator Physically Unclonable Functions (ROPUFs). The scope of the design covers the communication between the utility company and the smart meter network. The scheme is based on hardware-oriented security and can be implemented on existing smart meters. In accordance with ANSI C12.18 standards, the authentication keys are classified into six different level (L0 to L5) with a varying size of 64 to 1024 bits. The cryptographic keys used in this scheme are extremely difficult to model by adversaries as each set of keys are used only once. The authentication codes are generated from configurable ROPUF response bits using the Hamming code. The design of the proposed scheme ensures fault tolerance as Ring Oscillator (RO) comparison pairs with high-frequency differences are selected to prevent bit flips. The authentication scheme is highly efficient and cost-effective in terms of latency and data storage. As a proof-of-concept, the proposed scheme is implemented on Xilinx Spartan 3E FPGA boards. In the threat model analysis, Multigene Genetic Programming (MGGP) is used to demonstrate that the scheme cannot be modeled by adversaries.Also, it is shown that the scheme is secure against common wireless sensor network attacks including eavesdropping, spoofing, invasive and Man-in-the-middle attacks.

Smart Grid Security

Smart Grid Security PDF Author: Florian Skopik
Publisher: Syngress
ISBN: 0128023546
Category : Computers
Languages : en
Pages : 330

Get Book Here

Book Description
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology. Presents the most current and leading edge research on Smart Grid security from a holistic standpoint, featuring a panel of top experts in the field. Includes coverage of risk management, operational security, and secure development of the Smart Grid. Covers key technical topics, including threat types and attack vectors, threat case studies, smart metering, smart home, e- mobility, smart buildings, DERs, demand response management, distribution grid operators, transmission grid operators, virtual power plants, resilient architectures, communications protocols and encryption, as well as physical security.

Advances in Information Communication Technology and Computing

Advances in Information Communication Technology and Computing PDF Author: Vishal Goar
Publisher: Springer Nature
ISBN: 9811998884
Category : Technology & Engineering
Languages : en
Pages : 621

Get Book Here

Book Description
The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2022), held in Government Engineering College Bikaner, Bikaner, India during 17 – 18 December 2022. The book covers ICT-based approaches in the areas of ICT for Energy Efficiency, Life Cycle Assessment of ICT, Green IT, Green Information Systems, Environmental Informatics, Energy Informatics, Sustainable HCI, or Computational Sustainability.

Enhancing Privacy and Security in the Advanced Metering Infrastructure

Enhancing Privacy and Security in the Advanced Metering Infrastructure PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 110

Get Book Here

Book Description


Applied Cryptography in Computer and Communications

Applied Cryptography in Computer and Communications PDF Author: Jingqiang Lin
Publisher: Springer Nature
ISBN: 3031170814
Category : Computers
Languages : en
Pages : 229

Get Book Here

Book Description
This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.

Georgetown Journal of International Affairs

Georgetown Journal of International Affairs PDF Author: Azhar Unwala
Publisher: Georgetown University Press
ISBN: 1626162670
Category : Political Science
Languages : en
Pages : 234

Get Book Here

Book Description
This fifth edition in the International Engagement on Cyber series focuses on securing critical infrastructure. The centrality of critical infrastructure in the Obama administration's recent cybersecurity initiatives demonstrates the timeliness of this topic for greater review and scholarly input. In this manner, articles in this issue uncover the role and extent of international law and norms, public-private cooperation, as well as novel ways of conceptualizing 'security' in efforts to improve critical infrastructure cybersecurity. Other pieces provide case studies on the telecommunications, power, and energy sectors to generate an in-depth understanding of specific responses to security concerns in different infrastructure areas. Additional contributions examine regulatory activities in cyberspace, the potential value of cryptocurrency, the evolution of cloud computing, cybersecurity in Brazil, as well as the integration of cyber in the military strategies of Russia, China, and the United States. The diversity of these topics demonstrates the Journal's continued commitment to pursuing the myriad facets that compromise the field of cyber. Please note, this special issue is not included in the subscription to the journal.

Bulletproof SSL and TLS

Bulletproof SSL and TLS PDF Author: Ivan Ristic
Publisher: Feisty Duck
ISBN: 1907117040
Category : Computers
Languages : en
Pages : 528

Get Book Here

Book Description
Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you’ll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: - Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version - For IT security professionals, help to understand the risks - For system administrators, help to deploy systems securely - For developers, help to design and implement secure web applications - Practical and concise, with added depth when details are relevant - Introduction to cryptography and the latest TLS protocol version - Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities - Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed - Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning - Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority - Guide to using OpenSSL to test servers for vulnerabilities - Practical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and Tomcat This book is available in paperback and a variety of digital formats without DRM.

Smart Grid Security

Smart Grid Security PDF Author: Jorge Cuellar
Publisher: Springer
ISBN: 3642380301
Category : Computers
Languages : en
Pages : 157

Get Book Here

Book Description
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains three full-paper length invited papers and 7 corrected and extended papers from the First International Workshop on Smart Grid Security, SmartGridSec 2012, which brought together researchers from different communities from academia and industry in the area of securing the Future Smart Grid and was held in Berlin, Germany, on December 3, 2012.

Industry 4.0 Interoperability, Analytics, Security, and Case Studies

Industry 4.0 Interoperability, Analytics, Security, and Case Studies PDF Author: G. Rajesh
Publisher: CRC Press
ISBN: 1000337944
Category : Business & Economics
Languages : en
Pages : 263

Get Book Here

Book Description
All over the world, vast research is in progress on the domain of Industry 4.0 and related techniques. Industry 4.0 is expected to have a very high impact on labor markets, global value chains, education, health, environment, and many social economic aspects. Industry 4.0 Interoperability, Analytics, Security, and Case Studies provides a deeper understanding of the drivers and enablers of Industry 4.0. It includes real case studies of various applications related to different fields, such as cyber physical systems (CPS), Internet of Things (IoT), cloud computing, machine learning, virtualization, decentralization, blockchain, fog computing, and many other related areas. Also discussed are interoperability, design, and implementation challenges. Researchers, academicians, and those working in industry around the globe will find this book of interest. FEATURES Provides an understanding of the drivers and enablers of Industry 4.0 Includes real case studies of various applications for different fields Discusses technologies such as cyber physical systems (CPS), Internet of Things (IoT), cloud computing, machine learning, virtualization, decentralization, blockchain, fog computing, and many other related areas Covers design, implementation challenges, and interoperability Offers detailed knowledge on Industry 4.0 and its underlying technologies, research challenges, solutions, and case studies

Power System Protection in Future Smart Grids

Power System Protection in Future Smart Grids PDF Author: Taha Selim Ustun
Publisher: Elsevier
ISBN: 0323972659
Category : Technology & Engineering
Languages : en
Pages : 243

Get Book Here

Book Description
Power System Protection in Future Smart Grids: Achieving Reliable Operation with Renewable Energy, Electric Vehicles and Distributed Generation demonstrates how to protect smart, highly renewable, and highly distributed power systems with state-of-the-art methods rooted in adaptive protection and dynamic response, and based on continuous communication. Focusing on the implementation of novel protection schemes, each chapter presents solutions accompanied by figurative elements and demonstrator codes in MATLAB, C, Python and Java. Chapters address active distribution networks, hybrid microgrids, EVs and inverters on fault levels, adaptive protection systems, dynamic protection strategies, and Hardware in the Loop (HiL) approaches. Demonstrates how to mitigate the numerous unanticipated protection consequences of smarter grids and smarter grid equipment Focuses on providing communication-based solutions and power hardware in the loop modeling for integration of novel devices Emphasizes the importance of automation, communication, and cybersecurity in future protection systems Fully supported with modern demonstrator coding in MATLAB, C, Python, and Java