Skip to Main Content
 

Global Search Box

 
 
 
 

Files

ETD Abstract Container

Abstract Header

Hardware-based Authentication and Security for Advanced Metering Infrastructure

Deb Nath, Atul Prasad

Abstract Details

2016, Master of Science, University of Toledo, Electrical Engineering.
The power system infrastructure of the United States has embarked on a crucial transformation. The enormous change in the infrastructure ranging from private and public sectors to fossil fuel-based power plants, solar plants, and wind farms affects every entity in between. The transformation in power industry is central to national efforts to enhance efficiency, security, and reliability of electric power supply, increase integration of distributed renewable energy sources, eliminate the nation’s CO2 footprint by gradual reduction of greenhouse gas emission, and develop a 21st century smart electric grid compatible with future environmental sustainability and economic prosperity. However, the integration of Information technology (IT), Industrial Control Systems (ICS) and an advanced communication infrastructure exposes smart grid to the cyber threats associated with the networks. Consequently, cybersecurity is crucial to ensure the efficiency, reliability, and security of the evolving power grid system. Security issues pertaining to Advanced Metering Infrastructure (AMI)system has been a major concern since the advent of smart grid. Secure and reliable authentication of smart meters and data collectors connected in AMI system is of utmost importance to ensure compliance with the security requirements of smart grid. In this work, a novel authentication and key management scheme is introduced for the AMI system of smart grid using configurable Ring Oscillator Physically Unclonable Functions (ROPUFs). The scope of the design covers the communication between the utility company and the smart meter network. The scheme is based on hardware-oriented security and can be implemented on existing smart meters. In accordance with ANSI C12.18 standards, the authentication keys are classified into six different level (L0 to L5) with a varying size of 64 to 1024 bits. The cryptographic keys used in this scheme are extremely difficult to model by adversaries as each set of keys are used only once. The authentication codes are generated from configurable ROPUF response bits using the Hamming code. The design of the proposed scheme ensures fault tolerance as Ring Oscillator (RO) comparison pairs with high-frequency differences are selected to prevent bit flips. The authentication scheme is highly efficient and cost-effective in terms of latency and data storage. As a proof-of-concept, the proposed scheme is implemented on Xilinx Spartan 3E FPGA boards. In the threat model analysis, Multigene Genetic Programming (MGGP) is used to demonstrate that the scheme cannot be modeled by adversaries.Also, it is shown that the scheme is secure against common wireless sensor network attacks including eavesdropping, spoofing, invasive and Man-in-the-middle attacks.
Mohammed Niamat (Advisor)
Mansoor Alam (Committee Member)
Hong Wang (Committee Member)
Amanda Bryant-Friedrich (Other)
107 p.

Recommended Citations

Citations

  • Deb Nath, A. P. (2016). Hardware-based Authentication and Security for Advanced Metering Infrastructure [Master's thesis, University of Toledo]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1470106841

    APA Style (7th edition)

  • Deb Nath, Atul Prasad. Hardware-based Authentication and Security for Advanced Metering Infrastructure . 2016. University of Toledo, Master's thesis. OhioLINK Electronic Theses and Dissertations Center, http://rave.ohiolink.edu/etdc/view?acc_num=toledo1470106841.

    MLA Style (8th edition)

  • Deb Nath, Atul Prasad. "Hardware-based Authentication and Security for Advanced Metering Infrastructure ." Master's thesis, University of Toledo, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1470106841

    Chicago Manual of Style (17th edition)