DOI QR코드

DOI QR Code

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments

안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크

  • Lee, Young-Seok (Department of Telecommunication Engineering, Kunsan National University)
  • Received : 2013.07.18
  • Accepted : 2013.08.27
  • Published : 2013.09.30

Abstract

Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

스마트 그리드란 기존 전력망에 IT기술을 접목하여 공급자와 소비자가 양방향으로 실시간 전력정보를 교환함으로써 에너지 효율을 최적화하는 전력망이다. 기존의 폐쇄이던 전력망이 다양한 이해당사자가 참여하는 상호운용성이 보장되는 개방형 구조를 가지게 됨으로써 이에 대한 보안 기술 개발이 시급한 상태이다. 이러한 스마트그리드의 보안 위협에 대응할 수 있는 안전한 환경을 구축하기 위해서는 보안 메커니즘 개발에 핵심이 되는 키 관리 기법이 필수적으로 요구된다. 본 논문에서는 이중 해쉬 체인을 이용하여 스마트그리드 환경에 효율적으로 적용 가능한 키 관리 프레임워크를 제안하고, 제안하는 키 관리 프레임워크의 안전성 및 효율성을 분석한다.

Keywords

References

  1. NIST, "NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0", NIST Special Publication, 01. 2010.
  2. NIST, "Smart Grid Cyber Security Strategy and Requirements", Draft NISTIR 7628, 02. 2010.
  3. Y. G. Jung, et al, "Smart Grid Security Trend", Korea Institute of Information Security & Cryptology, Vol. 20, No. 4, pp. 66-79, Aug. 2010.
  4. NIST smart grid, http://www.nist.gov/smartgrid/
  5. NIST Special Publication 1108R2, "NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0", 2012. 2.
  6. NISTIR 7628, "Guidelines for Smart Grid Cyber Security", 2010. 8.
  7. R. D. Colin, C. Boyd, J. Manuel, and G. Nieto, "KMA-A key management architecture for SCADA systems," in Proc. 4th Australasian Inf. Security Workshop, Vol.54, pp. 138-192, 2006.
  8. Information Technology - Security Techniques - Key Management - Part 2: Mechani는 Using Symmetric Techniques ISO/IEC 11770-2 International Standard, 1996.
  9. D. Choi, H. Kim, D. Won, and S. Kim, "Advanced Key Management Architecture for Secure SCADA Communications", IEEE Transactions on Power Delivery, Vol.24, No.3, pp.1154-1163, 2009. https://doi.org/10.1109/TPWRD.2008.2005683
  10. D. Choi, S. Lee, D. Won, and S. Kim, "Efficient Secure Group Communications for SCADA", IEEE Transactions on Power Delivery, Vol.25 No.2, pp. 714-722, 2010. https://doi.org/10.1109/TPWRD.2009.2036181
  11. S. K. Eun, S.H. Oh, "Hash chain based Group Key Management Mechanism for Smart Grid Environments," Korea Institute of Information Security & Cryptology, Vol. 21, No. 4, pp. 149-160, Aug. 2011.
  12. Yoon-Su Jeong, "A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node,"pp.569-643,2008.