Repository logo
 

Faculty of Engineering and Built Environment

Permanent URI for this communityhttp://ir-dev.dut.ac.za/handle/10321/9

Browse

Search Results

Now showing 1 - 1 of 1
  • Thumbnail Image
    Item
    A secured access control architecture consideration for PLC based smart grids
    (SATNAC, 2015) Mooketsio, Thsepiso; Nleya, Bakhe; Dewa, Mendon; Mutsvangwa, Andrew
    Abstract—Power supply, distribution and generation industry is now turning the existing electrical grids to smart grids, thus making them more efficient in both effective power management and reliability, reduced production costs, and more environmen-tally friendly energy generation. Despite its attractive features, Smart Grid technology remains vulnerable to security threats. This paper summaries some of these potential security issues by exploring a data access control mechanism that ensures privacy to customers. The proposed access control mechanism gives selec-tive access to consumer data stored in data repositories and used by different smart grid users. A n attribute-based encryption (ABE) is suggested. The entire grid network is subdivided into clusters each with its own remote terminal unit (RTU) as well as a gateway smart meter. User data in a given cluster is aggregated and sent to the local substation where it is monitored by the RTU. RTUs and users have attributes and cryptographic keys dis-tributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt infor-mation provided they have valid attributes. The access control scheme is quite resilient because of its b e i n g distributed in na-ture and does not rely on a single KDC to distribute keys. The encryption algorithm is based on Diffie-Hellman key establish-ment protocol and hash-based message authentication code, which allows smart meters at different clusters of the smart grid to mu-tually authenticate prior to data/information exchange and in the process maintaining low latency as well as relatively fewer au-thentication associated messages . Overall the control scheme is relatively collusion resistant.