Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ https://europepmc.or...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
https://europepmc.org/articles...
Part of book or chapter of book
Data sources: UnpayWall
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Hal
Conference object . 2016
License: CC BY
Data sources: Hal
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
https://doi.org/10.1007/978-3-...
Part of book or chapter of book . 2016 . Peer-reviewed
License: Springer TDM
Data sources: Crossref
https://dx.doi.org/10.60692/1b...
Other literature type . 2016
Data sources: Datacite
https://dx.doi.org/10.60692/vv...
Other literature type . 2016
Data sources: Datacite
versions View all 5 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid

المصادقة المتأخرة للبث المتعدد لبث بيانات المتزامن في الشبكة الذكية
Authors: Sergio Camara; Dhananjay Anand; Victoria Pillitteri; Luiz Fernando Rust da Costa Carmo;

Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid

Abstract

L'authentification multidiffusion des données de synchrophase est difficile en raison des exigences de conception des systèmes de surveillance des réseaux intelligents, telles que la faible surcharge de sécurité, la tolérance aux réseaux à pertes, la criticité temporelle et les débits de données élevés. Dans ce travail, nous proposons inf-TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, un protocole d'authentification différée multicast pour les liaisons de communication utilisées pour diffuser des données de synchrophase pour le contrôle étendu des réseaux électriques. Notre approche est basée sur le protocole d'authentification TESLA, mais est augmentée pour s'adapter aux transmissions haute fréquence de longueur illimitée. Le protocole inf-TESLA utilise le mécanisme Dual Offset Key Chains pour réduire le retard d'authentification et les coûts de calcul associés à l'engagement de la chaîne de clés. Nous fournissons une description du mécanisme en utilisant deux modes différents pour divulguer les clés et démontrons sa sécurité contre une tentative d'attaque de l'homme du milieu. Nous comparons notre approche au protocole TESLA dans un scénario de simulation de 2 jours, montrant une réduction de 15,82 % et 47,29 % du coût de calcul, de l'expéditeur et du destinataire respectivement, et une réduction cumulative des frais généraux de communication.

La autenticación multidifusión de datos sincrofásicos es un desafío debido a los requisitos de diseño de los sistemas de monitoreo de redes inteligentes, como la baja sobrecarga de seguridad, la tolerancia a las redes con pérdidas, la criticidad del tiempo y las altas tasas de datos. En este trabajo, proponemos inf-TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, un protocolo de autenticación retardada de multidifusión para enlaces de comunicación utilizados para transmitir datos sincrofásicos para el control de área amplia de redes de energía eléctrica. Nuestro enfoque se basa en el protocolo de autenticación TESLA, pero se aumenta para acomodar transmisiones de alta frecuencia de longitud ilimitada. El protocolo inf-TESLA utiliza el mecanismo de llaveros de doble compensación para reducir el retraso de autenticación y el costo computacional asociado con el compromiso del llavero. Proporcionamos una descripción del mecanismo utilizando dos modos diferentes para revelar claves y demostramos su seguridad contra un intento de ataque de hombre en el medio. Comparamos nuestro enfoque con el protocolo de TESLA en un escenario de simulación de 2 días, mostrando una reducción del 15,82 % y el 47,29 % en el coste computacional, emisor y receptor respectivamente, y una reducción acumulada en la sobrecarga de comunicación.

Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf-TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf-TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82 % and 47.29 % in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.

تمثل المصادقة متعددة الإرسال لبيانات المتزامن تحديًا بسبب متطلبات تصميم أنظمة مراقبة الشبكة الذكية مثل النفقات العامة الأمنية المنخفضة، والتسامح مع الشبكات المفقودة، وحرجية الوقت، ومعدلات البيانات العالية. في هذا العمل، نقترح inf - TESLA، المصادقة الفعالة ذات التوقيت اللانهائي، وهو بروتوكول مصادقة متأخر متعدد الإرسال لروابط الاتصال المستخدمة لبث بيانات synchrophasor للتحكم في مساحة واسعة من شبكات الطاقة الكهربائية. يعتمد نهجنا على بروتوكول المصادقة TESLA ولكنه معزز لاستيعاب عمليات الإرسال عالية التردد ذات الطول غير المحدود. يستخدم بروتوكول inf - TESLA آلية سلاسل مفاتيح الإزاحة المزدوجة لتقليل تأخير المصادقة والتكلفة الحسابية المرتبطة بالتزام سلسلة المفاتيح. نقدم وصفًا للآلية باستخدام وضعين مختلفين للكشف عن المفاتيح وإظهار أمانها ضد محاولة هجوم رجل في الوسط. نقارن نهجنا مع بروتوكول تسلا في سيناريو محاكاة لمدة يومين، مما يدل على انخفاض بنسبة 15.82 ٪ و 47.29 ٪ في التكلفة الحسابية والمرسل والمستقبل على التوالي، وانخفاض تراكمي في النفقات العامة للاتصالات.

Keywords

Computer Networks and Communications, Smart grid, [INFO] Computer Science [cs], Smart Grids, Password, Engineering, Artificial Intelligence, Multicast, Computer security, Control-Flow Integrity, Synchrophasors, Protocol Independent Multicast, Language-based Information Flow Security, Multicast authentication, Lightweight Extensible Authentication Protocol, Computer network, Secure Routing, Security Challenges in Smart Grid Systems, Computer science, Distributed computing, Intrusion Detection, Reliable multicast, Overhead (engineering), Source-specific multicast, Operating system, Handshake, Control and Systems Engineering, Authentication (law), False Data Injection Attacks, Electrical engineering, Asynchronous communication, Physical Sciences, Computer Science, Wide area monitoring protection and control, Security in Wireless Sensor Networks, Authentication protocol

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    9
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
9
Top 10%
Top 10%
Average
Green