Architectural Integration for Wireless Communication Security in terms of integrity for Advanced Metering Infrastructure-Survey Paper
Abstract
At present, cyber-security has become very
significant problem. The universal security integration give
number of cyber-security standards. These standards deliver
different digital security methods which are established to escape
cyber-security attacks. These standards suggest general outlines
and accurate techniques for implementing cyber-security. For
architectural integration the cyber-security standards play vital
role. In this paper, authors are trying to improve wireless
communication security for Advanced metering infrastructure by
providing reliable architectural integration in terms of integrity.
AMI is key part of the Smart Grid (SG). From the collected
work it is clear that, AMI provides efficiency, reliability,
scalability and privacy but due to security problem it lowers the
performance. Wireless communication security of AMI to be
determined by considering four parameters that is confidentiality
(C), integrity (I), availability (A) and accountability (Ac) or nonrepudiation.
The number of researchers has done work on
wireless communication security for AMI but stagnant there is
enormous problem of security. Because of still no one researcher
has considered four security parameters. By considering these
four parameters we can see drastic change in wireless security for
AMI. Improvement in these parameters, AMI will be more
advanced. But in this paper we are going to focus on wireless
security for AMI in terms of Integrity only.
AMI totally depends on wireless communication network.
And now days AMI suffers from various cyber-attacks on
wireless communication network. A security framework and
architectural integration are the things necessary for confident
communication of data and control messages. Existing security
algorithms are not suitable for smart grid data communication
because of their large execution time, more cost and the
requirement of more memory. This paper tries to provide
security algorithm in terms of integrity with less time and cost.
After surveying the existing security solutions in this area, we
propose for wireless communication security WiMAX technology
(Worldwide Interoperability or Microwave Access Smart
architectural integration is very essential for AMI. Infrastructure
of AMI consists of basic steps like power generation, substation
and distribution. Different attacker attacks on AMI
infrastructure. By improving architecture we can make AMI
more secure.
References
Retrieved 2012-05- 12.
[2] Mini S. Thomas, Senior Member, IEEE, Ikbal Ali, Senior Member,
IEEE, and Nitin Gupta, “ A Secure Way of Exchanging the Secret Keys in
Advanced Metering Infrastructure”, 2012 IEEE Trans.
[3] Yichi Zhang, Lingfeng Wang, Weiqing Sun, “Reliability Evaluation of
Power Grids Considering Worm Spreading Pattern in SCADA”, 2013IEEE
Trans
[4]R. Vijayanand, D. Devaraj, B. Kannapiran and K. Kartheeban, “Bit
masking based Secure Data Aggregation Technique for Advanced
Metering Infrastructure in Smart Grid System” ,978-1-4673-6680-
9/16/$31.00 ©2016 IEEE, 2016 International Conference on Computer
Communication and Informatics (ICCCI -2016), Jan. 07 – 09, 2016,
Coimbatore, India
[5] Atul Prasad Deb Nath, Fathi Amsaad, Muhtadi Choudhury, and
Mohammed Niamat, “Hardware-based Novel Authentication Scheme for
Advanced Metering Infrastructure”, 2016 IEEE
[6]SeonghoJu, Moonsuk Choi, Chunghyo Kim and Yonghun Lim, “Security
Architecture for Advanced Metering Infrastructure”, ACSIJ Advances in
Computer Science: an International Journal, Vol. 2, Issue 3, No. , 2013 .4
July ISSN : 2322-5157
[7]VisvakumarAravinthan, VinodNamboodiri, SamshodhSunku and Ward
Jewell, “Wireless AMI Application and Security for Controlled Home Area
Networks”, IEEE TRANSACTIONS
[8] S. Kaplantzis and Y. A. Sekercioglu“ Security and smart metering”, 18th
European Wireless Conference, April 2012
[9] Z. Md. Fadlullah, A. Takeuchi, N. Iwasaki, Y. Nozaki “Toward Intelligent
Machine-to Machine Communications in Smart Grid”, IEEE Communications
Magazine, vol. 49, issue 4, pp 60-65, April 2011, doi:
10.1109/MCOM.2011.5741147
[10]YulongZou, Senior Member, IEEE, Jia Zhu, Xianbin Wang, Senior
Member, IEEE, and LajosHanzo, Fellow, IEEE, “A Survey on Wireless
Security: TechnicalChallenges, Recent Advances and Future Trends”,
IEEE TRANSACTIONS
[11]Jing Xu Zhilei Yao, “Advanced Metering Infrastructure Security Issues
and its Solution: A Review”, Vol. 3, Issue 11, November 2015
[12] Hyunwoo Lim, Jongbin Ko, Seokjun Lee, Jongwan Kim, Mijoo Kim,
TaeshikShon, “Security Architecture Model for Smart Grid
Communication Systems”, IEEE TRANSACTIONS
[13]Tanvi Mehra, R. K. Pateriya, “Cyber Security Considerations for
Advanced Metering Infrastructure in Smart Grid”, International Journal of
Scientific & Engineering Research, Volume 4, Issue 8, August-2013 9
[14] ErasmiaEvangeliaTiniou, PeymanMohajerinEsfahani, and John Lygeros,
“Fault detection with discrete-time measurements: An application for the
cyber security of power networks”, 52nd IEEE Conference on Decision
and Control December 10-13, 2013. IEEE Trans
[15] Marco Crepaldi ,Michelangelo Grosso ,Alessandro Sassone, Stefano
Gallinaro, Salvatore Rinaudo,MassimoPoncino, Enrico Macii, and
DaniloDemarchi, “ A Top-Down Constraint-Driven Methodology for
Smart System Design”, 2014IEEE I, first QUART ER 2014, IEEE
circuits and systems magazine
[16] Henrik Sandberg, Saurabh Amin and Karl Henrik Johanss, “ Cyber
physical Security in Networked Control Systems”, IEEE Control
Systems Magazine ,Februwary 2015.
[17]Ahmed Fawaz, , Robin Berthier and William H. Sanders, “A Response
Cost Model for Advanced Metering Infrastructures”,IEEE Transactions on
smart grid
[18] Ms. Priyanka D. Halle, “Wireless communication security in terms of
Confidentiality, Integrity, Availability and Accountability for Advanced
Metering Infrastructure”, Volume 4, Issue 9, September 2015, ISSN: 2278
– 909X, IJARECE
[19] Rong Jiang_, Rongxing Lu, Ye Wang, Jun Luo, ChangxiangShen, and
Xuemin (Sherman) Shen, “Energy-Theft Detection Issues for Advanced
Metering Infrastructure in Smart Grid”, ISSNll1007-0214ll01/12llpp105-
120 ,Volume 19, Number 2, April 2014
[20]MahshidDelavar, SattarMirzakuchaki, Mohammad Hassan Ameri,
JavadMohajeri, “PUF-based solutions for secure communication in
Advanced Metering Infrastructure (AMI)”.
[21]Ahmed Fawaz, Student Member, IEEE, Robin Berthier, Member, IEEE,
and William H. Sanders, Fellow, IEEE, “A Response Cost Model for
Advanced Metering Infrastructures” ,IEEE TRANSACTIONS ON
SMART GRID
[22]YulongZou, Senior Member, IEEE, Jia Zhu, Xianbin Wang, Senior
Member, IEEE, and LajosHanzo, Fellow, IEEE, “A Survey on Wireless
Security: TechnicalChallenges, Recent Advances and Future Trends”,
IEEE TRANSACTIONS
To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to AJCT and must accompany any such material in order to be published by AJCT. Please read the form carefully.
The undersigned hereby assigns to the Asian Journal of Convergence in Technology Issues ("AJCT") all rights under copyright that may exist in and to the above Work, any revised or expanded derivative works submitted to AJCT by the undersigned based on the Work, and any associated written, audio and/or visual presentations or other enhancements accompanying the Work. The undersigned hereby warrants that the Work is original and that he/she is the author of the Work; to the extent the Work incorporates text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permission. See Retained Rights, below.
AUTHOR RESPONSIBILITIES
AJCT distributes its technical publications throughout the world and wants to ensure that the material submitted to its publications is properly available to the readership of those publications. Authors must ensure that The Work is their own and is original. It is the responsibility of the authors, not AJCT, to determine whether disclosure of their material requires the prior consent of other parties and, if so, to obtain it.
RETAINED RIGHTS/TERMS AND CONDITIONS
1. Authors/employers retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
2. Authors/employers may reproduce or authorize others to reproduce The Work and for the author's personal use or for company or organizational use, provided that the source and any AJCT copyright notice are indicated, the copies are not used in any way that implies AJCT endorsement of a product or service of any employer, and the copies themselves are not offered for sale.
3. Authors/employers may make limited distribution of all or portions of the Work prior to publication if they inform AJCT in advance of the nature and extent of such limited distribution.
4. For all uses not covered by items 2 and 3, authors/employers must request permission from AJCT.
5. Although authors are permitted to re-use all or portions of the Work in other works, this does not include granting third-party requests for reprinting, republishing, or other types of re-use.
INFORMATION FOR AUTHORS
AJCT Copyright Ownership
It is the formal policy of AJCT to own the copyrights to all copyrightable material in its technical publications and to the individual contributions contained therein, in order to protect the interests of AJCT, its authors and their employers, and, at the same time, to facilitate the appropriate re-use of this material by others.
Author/Employer Rights
If you are employed and prepared the Work on a subject within the scope of your employment, the copyright in the Work belongs to your employer as a work-for-hire. In that case, AJCT assumes that when you sign this Form, you are authorized to do so by your employer and that your employer has consented to the transfer of copyright, to the representation and warranty of publication rights, and to all other terms and conditions of this Form. If such authorization and consent has not been given to you, an authorized representative of your employer should sign this Form as the Author.
Reprint/Republication Policy
AJCT requires that the consent of the first-named author and employer be sought as a condition to granting reprint or republication rights to others or for permitting use of a Work for promotion or marketing purposes.
GENERAL TERMS
1. The undersigned represents that he/she has the power and authority to make and execute this assignment.
2. The undersigned agrees to indemnify and hold harmless AJCT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above.
3. In the event the above work is accepted and published by AJCT and consequently withdrawn by the author(s), the foregoing copyright transfer shall become null and void and all materials embodying the Work submitted to AJCT will be destroyed.
4. For jointly authored Works, all joint authors should sign, or one of the authors should sign as authorized agent
for the others.
Licenced by :
Creative Commons Attribution 4.0 International License.