Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems

The smart grid is an emerging technology that integrates power infrastructures with information technologies to enable intelligent energy managements. As one of the most important facilities of power infrastructures, electrical substations undertake responsibilities of energy transmissions and distr...

Full description

Bibliographic Details
Main Authors: Xiang Lu, Wenye Wang, Jianfeng Ma
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2012-06-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2012/175262
_version_ 1827079666351996928
author Xiang Lu
Wenye Wang
Jianfeng Ma
author_facet Xiang Lu
Wenye Wang
Jianfeng Ma
author_sort Xiang Lu
collection DOAJ
description The smart grid is an emerging technology that integrates power infrastructures with information technologies to enable intelligent energy managements. As one of the most important facilities of power infrastructures, electrical substations undertake responsibilities of energy transmissions and distributions by operating interconnected electrical devices in a coordinated manner. Accordingly, it imposes a great challenge on information security, since any falsifications may trigger mal-operations, and result in damages to power usage. In this paper, we aim at authentication and integrity protections in substation automation systems (SAS), by an experimental approach on a small scale SAS prototype, in which messages are transmitted with commonly-used data origin authentication schemes, such as RSA, Message Authentication Code, and One-Time Signature. Through experimental results, we find that, current security solutions cannot be applied directly into the SAS due to insufficient performance considerations in response to application constraints, including limited device computation capabilities, stringent timing requirements and high data sampling rates. Moreover, intrinsic limitations of security schemes, such as complicated computations, shorter key valid time and limited key supplies, can easily be hijacked by malicious attackers, to undermine message deliveries, thus becoming security vulnerabilities. Our experimental results demonstrate guidelines in design of novel security schemes for the smart grid.
first_indexed 2024-03-12T10:39:09Z
format Article
id doaj.art-ef5a4479a4094a63906a0e904de529f7
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2025-03-20T02:49:11Z
publishDate 2012-06-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-ef5a4479a4094a63906a0e904de529f72024-10-03T07:28:32ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772012-06-01810.1155/2012/175262Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation SystemsXiang Lu0Wenye Wang1Jianfeng Ma2 Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC 27606, USA Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC 27606, USA Department of Computer Science, Xidian University, Xi'an 710071, ChinaThe smart grid is an emerging technology that integrates power infrastructures with information technologies to enable intelligent energy managements. As one of the most important facilities of power infrastructures, electrical substations undertake responsibilities of energy transmissions and distributions by operating interconnected electrical devices in a coordinated manner. Accordingly, it imposes a great challenge on information security, since any falsifications may trigger mal-operations, and result in damages to power usage. In this paper, we aim at authentication and integrity protections in substation automation systems (SAS), by an experimental approach on a small scale SAS prototype, in which messages are transmitted with commonly-used data origin authentication schemes, such as RSA, Message Authentication Code, and One-Time Signature. Through experimental results, we find that, current security solutions cannot be applied directly into the SAS due to insufficient performance considerations in response to application constraints, including limited device computation capabilities, stringent timing requirements and high data sampling rates. Moreover, intrinsic limitations of security schemes, such as complicated computations, shorter key valid time and limited key supplies, can easily be hijacked by malicious attackers, to undermine message deliveries, thus becoming security vulnerabilities. Our experimental results demonstrate guidelines in design of novel security schemes for the smart grid.https://doi.org/10.1155/2012/175262
spellingShingle Xiang Lu
Wenye Wang
Jianfeng Ma
Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems
International Journal of Distributed Sensor Networks
title Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems
title_full Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems
title_fullStr Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems
title_full_unstemmed Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems
title_short Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems
title_sort authentication and integrity in the smart grid an empirical study in substation automation systems
url https://doi.org/10.1155/2012/175262
work_keys_str_mv AT xianglu authenticationandintegrityinthesmartgridanempiricalstudyinsubstationautomationsystems
AT wenyewang authenticationandintegrityinthesmartgridanempiricalstudyinsubstationautomationsystems
AT jianfengma authenticationandintegrityinthesmartgridanempiricalstudyinsubstationautomationsystems