SlideShare a Scribd company logo
1 | P a g e
Authentication in smart grid
Introduction
Since the dawn of network security, authentication has played a vital role. Authentication can be
thought of as procedure or steps taken to determine with certainty that someone is in fact what
he/she is declaring to be. In case of networks not always humans need to be authenticated but
processes also. Processes are always in need of resources or engaged in sending/receiving sensitive
information. For such scenarios processes also needs to be authenticated. Former uses traditional
username password scheme or biometrics while latter uses schemes such as digital certificates and
public key infrastructure. Smart Grid (SG) signifies the junctions of traditional electricity grid with
digital technology to create a reliable and efficient electric grid. Smart Grid (SG) is a vast intricate
network consisting of millions of device interconnected. Such huge network implicitly inherits
certain security concerns and susceptibilities. authentication can be thought of as a most significant
aspect in such concerns. The paper describes three most recent developments in this field of
research.
Entity Authentication
Entity authentication follows the ideology of an entity, whether it is person or a device or a process,
entity should be authenticated as and when it accesses resources requiring authentication. Entity
authorization in SG is an important research topic [1], [2], [3]. There are some prominent features
that make entity authentication still a challenge. First, the intended use of SG will be ultimately to
aid in automated administration and supervision of energy devices and entities without human
involvement, in essence machines to machine authentication would be elementary form of
authentication. A strong and reliable scheme for the protection of a private key is needed to attain
desired guarantee of digital authorization in an unattended, entirely computerized environment.
Second, currently all present protocols [4], [5], [6] and [7] suffice security issues corresponding to
cyber domain, undermining SG is an cyber as well as physical domain which includes power
relays, substations, vehicle-to-grid [8], etc. In SG, many of the cyber domain instructions produces
effects on a physical domain such as command sent to disable a power relay. A new two-factor
cyber-physical authentication protocol is presented in [9] for Electric Vehicles (EV) in SG. It
focuses on both physical as well as cyber domain by following challenge-response authentication
paradigm where one party asks a "question" or "challenge" and another party is expected to provide
2 | P a g e
a valid "answer" or "response". Protocol in [9] uses two challenge approach where one challenge
is sent over cyber domain and other is sent over physical domain introducing two-factor cyber-
physical authentication. This protocol can easily be extended to any physical domain appliance
such as switches, trippers, etc. only hurdle is finding the appliance relevant "challenges". Main
problem that is solved by this protocol is substitution attack which is analogous to Man in the
Middle attack. Assumption made here is every EV has Intelligent Electronic Device (IED)- a token
to guarantee the identity of EV. Attacker would try to access an EV with a stolen IED. If only
physical level "challenge" was used then attacker would surely get stolen EV charged in contrast
to deny charging for stolen EV with help of stolen IED. But this attack would not work if two
challenge authentications is used as cyber challenge would fail, an example of cyber challenge
would be username password pair of the valid EV driver. Argument can be made that if there is a
way to overcome physical challenge than surely there exists a way to overcome cyber challenge
i.e. what if stolen but valid EID and valid user credentials are used to charge stolen EV? To
overcome such scenarios a new identity can be used which strictly depends on EID pre-installed
on EV and username-password combination. Thus, when attacker tries to impersonate as valid
user the combination of stolen EID and username password will not match resulting in denied
access of charging.
Authentication between SG and Gateways
Gateways in SG are the system to which every smart appliance are connected on one end and it’s
another end is connected to Smart Meter (SM) which is installed by utility providers. If the
authentication between gateway and SM is not efficiently processed than an attacker can easily
perform Man In The Middle (MITM) attack which can lead to irregularity in power usage directly
affecting the pricing/billing for service usage or at worst attacker may send false control signals to
genuine gateway and cause blackout by shutting down all appliances. Protocol described in [10]
is an attempt to prevent such attacks. Here assumption made is that both gateway and SM uses
common connection architecture i.e. internet, landline, cell phone or Advanced Metering
Infrastructure (AMI). SG contains millions of devices, and each of them should be globally
connected. For this purpose, each device needs to be identified by a unique identifier which
depends on the communication architecture used, for example in the case of Internet IPv6 can be
used. For the current scenario let us assume internet is the communication architecture and each
3 | P a g e
device uses an IP as identifier. Initiation is done by gateway by sending an authorization request
message along with its IP, on receiving this message SM sends an acknowledge to sender gateway
and an authentication request with its ID and IP of sender to a trusted third party. On receiving the
acknowledge from SM gateway also send an authentication request with same data as SM to the
same trusted third party for mapping of SM's ID to a location. For appropriate mapping trusted
party can collaborate with ISP to provide location based on IP, ISP sends "True" if location of SM
matches location of a gateway otherwise "False" message to both SM and gateway. Connection is
only established if both SM and gateway receive "True" message. Here the trusted third party has
to make sure that a correct gateway is matched to correct SM.
Authentication between smart appliances and remote user
One of the most important feature supported by smart appliances connected to SG is that remote
control and monitoring by user who is not in Home Area Network (HAN). For example,
homeowner can control or monitor smart appliances such as smart bulb, cooling system or security
system while he/she is not present in his HAN. Such capability introduces great deal of security
vulnerability. MITM attacks are possible as attacker can impersonate as a homeowner and can
control every smart appliance which can result in irregularity in power consumption leading to
higher billing price or even blackouts. A user should be authenticated rigorously before giving him
the control of appliances. [11] describes such protocol which includes a remote user, device to
access remotely and an authentication server spanning in two phase. In primary phase, whenever
a new device is registered by the authentication server it creates an ID and shared secret key which
is stored in server's database and in device's memory securely. Also, remote user should have its
own ID and password authenticated by a server in advance. In second phase, mutual authentication
takes place between remote user and device as follows: user sends its ID, ID of the device and a
timestamp TS1 to the authentication server, authentication server then checks ID and password of
user and creates a secret key by applying one-way hash function on TS1 and password of user.
This secret key, ID of user and a session key KAB (includes secret key of remote device (B) and
user (A)) with a random key RS is used to create token for authentication purpose. This token is
then sent to remote user which creates a message authentication code (MAC) with a help this
token, a new timestamp TS2 and session key KAB and transmits to a home server of remote device.
On receiving this MAC, server knows the intended destination with a help of ID in the
4 | P a g e
authentication code and routes the MAC to device. Device decrypts the code with help of session
key KAB and secret value created during primary phase. Now [11] uses mutual authentication
scheme where device also sends a token to user and user needs to authenticate it. Thus, after
decrypting the message device creates a new message with same session key KAB and a random
number RS+1 created with help of random number RS in previous message. This new message is
then sent to user via home server, user decrypts the message with help of session key KAB and then
creates a secure channel and communicates over this channel. In case of attacker intercepts the
message from channel and masquerades as sender for receiver or as receiver for sender, attacks
such as data forging and alteration by the outside party (attacker, in this case) can be easily blocked
as they have no knowledge of the secret key used by sender and receiver.
Conclusion
Authentication problems in SG are far more diverse and difficult than in traditional network i.e.
internet. This is because of very high level of reliability, power device security and IT security, as
a result of this SG authentication requires new techniques. Attacks such cyber-physical attacks are
only possible in SG. The above mentioned three techniques adopted from [9], [10] and [11]
provides a radical approach to solving this problem of cyber-physical attacks and user privacy
attacks respectively and providing availability and confidentiality at the same time.
5 | P a g e
Works Cited
[1] Baumeister, T. 2011. "Adapting PKI for the smart grid." Proc. IEEE SmartGridComm 249–
254.
[2] Hasen Nicanfar, Paria Jokar, Konstantin Beznosov, Victor C. M. Leung. 2014. "Efficient
Authentication and Key Management Mechanisms for Smart Grid Communications."
IEEE SYSTEMS JOURNAL, VOL. 8, NO. 2 629-640.
[3] Hongwei Li, Rongxing Lu, Liang Zhou, Bo Yang, Xuemin (Sherman) Shen. 2013. "An
Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid." IEEE SYSTEMS
JOURNAL.
[4] H. Khurana, R. Bobba, T. Yardley, P. Agarwal, and E. Heine, “Design principles for power
grid cyber-infrastructure authentication protocols,” in Proc. HICSS, Jan. 2010, pp. 1–10.
[5] N. Kuntze, C. Rudolph, I. Bente, J. Vieweg, and J. von Helden, “Interoperable device
identification in smart-grid environments,” in Proc. IEEE PES Gener. Meet., Jul. 2011, pp.
1–7.
[6] S. Lakshminarayanan, “Authentication and authorization for smart grid application
interfaces,” in Proc. IEEE/PES PSCE, Mar. 2011, pp. 1–5
[7] A. J. Paverd and A. P. Martin, “Hardware security for device authentication in the smart
grid,” in Proc. SmartGridSec, vol. 7823, LNCS, J. Cuellar, Ed., 2013, pp. 72–84, Springer-
Verlag
[8] A. C-F. Chan and J. Zhou, “On smart grid cybersecurity standardization: Issues of
designing with NISTIR 7628,” IEEE Commun. Mag., vol. 51, no. 1, pp. 58–65, Jan. 2013.
6 | P a g e
[9] A. C-F. Chan and J. Zhou," Cyber–Physical Device Authentication for the Smart Grid
Electric Vehicle Ecosystem", IEEE journal on selected areas in communications, vol. 32,
no. 7, pp. 1059-1517, July 2014.
[10] Erman Ayday, and Sridhar Rajagopal, “Secure Device Authentication Mechanisms for
the Smart Grid-Enabled Home Area Networks”, 2013
[11] Do-Eun Cho, Sang-Soo Yeo, and Si-Jung Kim, “Authentication Method for Privacy
Protection in Smart Grid Environment”, Hindawi Publishing Corporation Journal of
Applied Mathematics Volume 2014, Article ID 280978,, July 2014

More Related Content

PDF
Ijcnc050205
PDF
IRJET- Internal Security in Metropolitan Area Network using Kerberos
PPT
CTO-CyberSecurityForum-2010-Brisson-Boren
PDF
Implementation of public key cryptography in kerberos with prevention 2
PDF
Security Analysis of Mobile Authentication Using QR-Codes
PDF
Efficient and Secure Single Sign on Mechanism for Distributed Network
PDF
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
PDF
G1102014246
Ijcnc050205
IRJET- Internal Security in Metropolitan Area Network using Kerberos
CTO-CyberSecurityForum-2010-Brisson-Boren
Implementation of public key cryptography in kerberos with prevention 2
Security Analysis of Mobile Authentication Using QR-Codes
Efficient and Secure Single Sign on Mechanism for Distributed Network
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
G1102014246

What's hot (18)

PDF
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
PDF
iaetsd Robots in oil and gas refineries
DOCX
Digital signature
PDF
Identity based encryption with cloud revocation authority and its applications
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
PDF
Enhanced Security Through Token
PDF
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
DOC
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PDF
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
PDF
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
PDF
Securing corporate assets_with_2_fa
DOCX
Identity based proxy-oriented data uploading and remote data integrity checki...
PPTX
Securing broker less publish subscribe systems using identity-based encryption
PDF
IJSRED-V2I1P29
PDF
An authentication framework for wireless sensor networks using Signature Base...
PDF
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
iaetsd Robots in oil and gas refineries
Digital signature
Identity based encryption with cloud revocation authority and its applications
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
Enhanced Security Through Token
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Ch12 Cryptographic Protocols and Public Key Infrastructure
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
Securing corporate assets_with_2_fa
Identity based proxy-oriented data uploading and remote data integrity checki...
Securing broker less publish subscribe systems using identity-based encryption
IJSRED-V2I1P29
An authentication framework for wireless sensor networks using Signature Base...
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
Ad

Viewers also liked (16)

PDF
Feresin Catina, Agostini Tiziano, Nila Saviolo Negrin, 1998
PDF
A_future_perspective_-_N_Harding
DOCX
Gebruikersvergoeding
PDF
ME_thesis
PDF
Kira Mandon Portfolio 2015
PPTX
Business model analysis by stefano marconi
PPTX
ICTFKIPUNSRI_SUWANTO
PPTX
Все Шоферыпрезентация приложения
PDF
Feresin Catina and Agostini Tiziano (2007)
PPT
Apprendimento e multimedialità
PPT
Physical layer
PPTX
Balcom Agency's Association of Fundraising Professionals Presentation
PPT
{Forestory 森林小故事} 北科大互動設計系(大二)360 vr 說故事課程
DOCX
tư vấn bán đồng hồ casio đúng giá gốc
PDF
DETECTION_OF_TOXIC_ALKOLOIDS_BY_LC-MS
PDF
[Vnmath.com] bai giang-trong_tam_ve_ham_so_thay_dang_viet_hung
Feresin Catina, Agostini Tiziano, Nila Saviolo Negrin, 1998
A_future_perspective_-_N_Harding
Gebruikersvergoeding
ME_thesis
Kira Mandon Portfolio 2015
Business model analysis by stefano marconi
ICTFKIPUNSRI_SUWANTO
Все Шоферыпрезентация приложения
Feresin Catina and Agostini Tiziano (2007)
Apprendimento e multimedialità
Physical layer
Balcom Agency's Association of Fundraising Professionals Presentation
{Forestory 森林小故事} 北科大互動設計系(大二)360 vr 說故事課程
tư vấn bán đồng hồ casio đúng giá gốc
DETECTION_OF_TOXIC_ALKOLOIDS_BY_LC-MS
[Vnmath.com] bai giang-trong_tam_ve_ham_so_thay_dang_viet_hung
Ad

Similar to Paper1_Final (20)

PDF
Authentication in Smart Grid
PDF
Review
PDF
Authentication techniques in smart grid: a systematic review
PDF
Salsa20 based lightweight security scheme for smart meter communication in sm...
PDF
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
PDF
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
PDF
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
PDF
Smart Grid Systems Based Survey on Cyber Security Issues
PPTX
Information Technology Strategy by Group 3
PDF
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
PDF
Ijmsr 2016-09
PDF
A signature-based data security and authentication framework for internet of...
PDF
Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...
PDF
Authentication and Authorization for User Roles and Device for Attack Detecti...
PDF
A Novel Security Approach for Communication using IOT
PDF
Evaluation of cybersecurity threats -mdms.pdf
PDF
Novel authentication framework for securing communication in internet-of-things
PDF
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
PDF
Thesis Body
PDF
1678 1683
Authentication in Smart Grid
Review
Authentication techniques in smart grid: a systematic review
Salsa20 based lightweight security scheme for smart meter communication in sm...
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRID
Smart Grid Systems Based Survey on Cyber Security Issues
Information Technology Strategy by Group 3
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Ijmsr 2016-09
A signature-based data security and authentication framework for internet of...
Smart Grid Data Centers Distributed & ICTs Sustainability on Generation Energ...
Authentication and Authorization for User Roles and Device for Attack Detecti...
A Novel Security Approach for Communication using IOT
Evaluation of cybersecurity threats -mdms.pdf
Novel authentication framework for securing communication in internet-of-things
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
Thesis Body
1678 1683

Paper1_Final

  • 1. 1 | P a g e Authentication in smart grid Introduction Since the dawn of network security, authentication has played a vital role. Authentication can be thought of as procedure or steps taken to determine with certainty that someone is in fact what he/she is declaring to be. In case of networks not always humans need to be authenticated but processes also. Processes are always in need of resources or engaged in sending/receiving sensitive information. For such scenarios processes also needs to be authenticated. Former uses traditional username password scheme or biometrics while latter uses schemes such as digital certificates and public key infrastructure. Smart Grid (SG) signifies the junctions of traditional electricity grid with digital technology to create a reliable and efficient electric grid. Smart Grid (SG) is a vast intricate network consisting of millions of device interconnected. Such huge network implicitly inherits certain security concerns and susceptibilities. authentication can be thought of as a most significant aspect in such concerns. The paper describes three most recent developments in this field of research. Entity Authentication Entity authentication follows the ideology of an entity, whether it is person or a device or a process, entity should be authenticated as and when it accesses resources requiring authentication. Entity authorization in SG is an important research topic [1], [2], [3]. There are some prominent features that make entity authentication still a challenge. First, the intended use of SG will be ultimately to aid in automated administration and supervision of energy devices and entities without human involvement, in essence machines to machine authentication would be elementary form of authentication. A strong and reliable scheme for the protection of a private key is needed to attain desired guarantee of digital authorization in an unattended, entirely computerized environment. Second, currently all present protocols [4], [5], [6] and [7] suffice security issues corresponding to cyber domain, undermining SG is an cyber as well as physical domain which includes power relays, substations, vehicle-to-grid [8], etc. In SG, many of the cyber domain instructions produces effects on a physical domain such as command sent to disable a power relay. A new two-factor cyber-physical authentication protocol is presented in [9] for Electric Vehicles (EV) in SG. It focuses on both physical as well as cyber domain by following challenge-response authentication paradigm where one party asks a "question" or "challenge" and another party is expected to provide
  • 2. 2 | P a g e a valid "answer" or "response". Protocol in [9] uses two challenge approach where one challenge is sent over cyber domain and other is sent over physical domain introducing two-factor cyber- physical authentication. This protocol can easily be extended to any physical domain appliance such as switches, trippers, etc. only hurdle is finding the appliance relevant "challenges". Main problem that is solved by this protocol is substitution attack which is analogous to Man in the Middle attack. Assumption made here is every EV has Intelligent Electronic Device (IED)- a token to guarantee the identity of EV. Attacker would try to access an EV with a stolen IED. If only physical level "challenge" was used then attacker would surely get stolen EV charged in contrast to deny charging for stolen EV with help of stolen IED. But this attack would not work if two challenge authentications is used as cyber challenge would fail, an example of cyber challenge would be username password pair of the valid EV driver. Argument can be made that if there is a way to overcome physical challenge than surely there exists a way to overcome cyber challenge i.e. what if stolen but valid EID and valid user credentials are used to charge stolen EV? To overcome such scenarios a new identity can be used which strictly depends on EID pre-installed on EV and username-password combination. Thus, when attacker tries to impersonate as valid user the combination of stolen EID and username password will not match resulting in denied access of charging. Authentication between SG and Gateways Gateways in SG are the system to which every smart appliance are connected on one end and it’s another end is connected to Smart Meter (SM) which is installed by utility providers. If the authentication between gateway and SM is not efficiently processed than an attacker can easily perform Man In The Middle (MITM) attack which can lead to irregularity in power usage directly affecting the pricing/billing for service usage or at worst attacker may send false control signals to genuine gateway and cause blackout by shutting down all appliances. Protocol described in [10] is an attempt to prevent such attacks. Here assumption made is that both gateway and SM uses common connection architecture i.e. internet, landline, cell phone or Advanced Metering Infrastructure (AMI). SG contains millions of devices, and each of them should be globally connected. For this purpose, each device needs to be identified by a unique identifier which depends on the communication architecture used, for example in the case of Internet IPv6 can be used. For the current scenario let us assume internet is the communication architecture and each
  • 3. 3 | P a g e device uses an IP as identifier. Initiation is done by gateway by sending an authorization request message along with its IP, on receiving this message SM sends an acknowledge to sender gateway and an authentication request with its ID and IP of sender to a trusted third party. On receiving the acknowledge from SM gateway also send an authentication request with same data as SM to the same trusted third party for mapping of SM's ID to a location. For appropriate mapping trusted party can collaborate with ISP to provide location based on IP, ISP sends "True" if location of SM matches location of a gateway otherwise "False" message to both SM and gateway. Connection is only established if both SM and gateway receive "True" message. Here the trusted third party has to make sure that a correct gateway is matched to correct SM. Authentication between smart appliances and remote user One of the most important feature supported by smart appliances connected to SG is that remote control and monitoring by user who is not in Home Area Network (HAN). For example, homeowner can control or monitor smart appliances such as smart bulb, cooling system or security system while he/she is not present in his HAN. Such capability introduces great deal of security vulnerability. MITM attacks are possible as attacker can impersonate as a homeowner and can control every smart appliance which can result in irregularity in power consumption leading to higher billing price or even blackouts. A user should be authenticated rigorously before giving him the control of appliances. [11] describes such protocol which includes a remote user, device to access remotely and an authentication server spanning in two phase. In primary phase, whenever a new device is registered by the authentication server it creates an ID and shared secret key which is stored in server's database and in device's memory securely. Also, remote user should have its own ID and password authenticated by a server in advance. In second phase, mutual authentication takes place between remote user and device as follows: user sends its ID, ID of the device and a timestamp TS1 to the authentication server, authentication server then checks ID and password of user and creates a secret key by applying one-way hash function on TS1 and password of user. This secret key, ID of user and a session key KAB (includes secret key of remote device (B) and user (A)) with a random key RS is used to create token for authentication purpose. This token is then sent to remote user which creates a message authentication code (MAC) with a help this token, a new timestamp TS2 and session key KAB and transmits to a home server of remote device. On receiving this MAC, server knows the intended destination with a help of ID in the
  • 4. 4 | P a g e authentication code and routes the MAC to device. Device decrypts the code with help of session key KAB and secret value created during primary phase. Now [11] uses mutual authentication scheme where device also sends a token to user and user needs to authenticate it. Thus, after decrypting the message device creates a new message with same session key KAB and a random number RS+1 created with help of random number RS in previous message. This new message is then sent to user via home server, user decrypts the message with help of session key KAB and then creates a secure channel and communicates over this channel. In case of attacker intercepts the message from channel and masquerades as sender for receiver or as receiver for sender, attacks such as data forging and alteration by the outside party (attacker, in this case) can be easily blocked as they have no knowledge of the secret key used by sender and receiver. Conclusion Authentication problems in SG are far more diverse and difficult than in traditional network i.e. internet. This is because of very high level of reliability, power device security and IT security, as a result of this SG authentication requires new techniques. Attacks such cyber-physical attacks are only possible in SG. The above mentioned three techniques adopted from [9], [10] and [11] provides a radical approach to solving this problem of cyber-physical attacks and user privacy attacks respectively and providing availability and confidentiality at the same time.
  • 5. 5 | P a g e Works Cited [1] Baumeister, T. 2011. "Adapting PKI for the smart grid." Proc. IEEE SmartGridComm 249– 254. [2] Hasen Nicanfar, Paria Jokar, Konstantin Beznosov, Victor C. M. Leung. 2014. "Efficient Authentication and Key Management Mechanisms for Smart Grid Communications." IEEE SYSTEMS JOURNAL, VOL. 8, NO. 2 629-640. [3] Hongwei Li, Rongxing Lu, Liang Zhou, Bo Yang, Xuemin (Sherman) Shen. 2013. "An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid." IEEE SYSTEMS JOURNAL. [4] H. Khurana, R. Bobba, T. Yardley, P. Agarwal, and E. Heine, “Design principles for power grid cyber-infrastructure authentication protocols,” in Proc. HICSS, Jan. 2010, pp. 1–10. [5] N. Kuntze, C. Rudolph, I. Bente, J. Vieweg, and J. von Helden, “Interoperable device identification in smart-grid environments,” in Proc. IEEE PES Gener. Meet., Jul. 2011, pp. 1–7. [6] S. Lakshminarayanan, “Authentication and authorization for smart grid application interfaces,” in Proc. IEEE/PES PSCE, Mar. 2011, pp. 1–5 [7] A. J. Paverd and A. P. Martin, “Hardware security for device authentication in the smart grid,” in Proc. SmartGridSec, vol. 7823, LNCS, J. Cuellar, Ed., 2013, pp. 72–84, Springer- Verlag [8] A. C-F. Chan and J. Zhou, “On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628,” IEEE Commun. Mag., vol. 51, no. 1, pp. 58–65, Jan. 2013.
  • 6. 6 | P a g e [9] A. C-F. Chan and J. Zhou," Cyber–Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem", IEEE journal on selected areas in communications, vol. 32, no. 7, pp. 1059-1517, July 2014. [10] Erman Ayday, and Sridhar Rajagopal, “Secure Device Authentication Mechanisms for the Smart Grid-Enabled Home Area Networks”, 2013 [11] Do-Eun Cho, Sang-Soo Yeo, and Si-Jung Kim, “Authentication Method for Privacy Protection in Smart Grid Environment”, Hindawi Publishing Corporation Journal of Applied Mathematics Volume 2014, Article ID 280978,, July 2014