Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency
- Authors
- Shin, Incheol; Huh, Jun Ho; Kim, Sinkyu; Seo, Jungtaek
- Issue Date
- Jun-2014
- Publisher
- SPRINGER
- Keywords
- Smart grid; Secrete key management; Communication networks; Advanced metering infrastructure (AMI)
- Citation
- MOBILE NETWORKS & APPLICATIONS, v.19, no.3, pp.426 - 434
- Journal Title
- MOBILE NETWORKS & APPLICATIONS
- Volume
- 19
- Number
- 3
- Start Page
- 426
- End Page
- 434
- URI
- https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/82137
- DOI
- 10.1007/s11036-013-0442-2
- ISSN
- 1383-469X
- Abstract
- Advanced Metering Infrastructures (AMI) facilitate efficient and reliable exchange of electricity information between the homes and utilities. Their unique characteristics (e.g., connecting millions of smart meters; accessing customers' private information), however, make them a lucrative target for adversaries. For example, an attacker might try to compromise the head-end of an AMI and send "remote disconnect commands" to the smart meters, disconnecting a large number of customers. To implement message authentication and protect message integrity and confidentiality, a number of cryptographic keys are being utilized. A "command key", for example, signs messages that are sent from the head-end to the meters. Such keys, however, introduce their own set of problems if they ever get compromised. A stolen command key would allow an adversary to continuously send malicious commands to the meters. Hence, the compromised keys must be revoked and replaced as quickly as possible. This paper proposes an efficient and reliable key distribution framework for the AMI mesh networks based on the connected dominating set approach. The keys are replaced with minimal latency through our "hexagon-tile coloring scheme", which allows the maximum number of keys to be transmitted in parallel, free of collision.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - IT융합대학 > 컴퓨터공학과 > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.