Toward secure targeted broadcast in smart grid
- 7 May 2012
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Magazine
- Vol. 50 (5), 150-156
- https://doi.org/10.1109/mcom.2012.6194396
Abstract
Significant research efforts have recently been directed toward materializing smart grid for the purpose of transforming the aging power grid into an efficient and intelligent electric power distribution system. Conceptually, smart grid can be regarded as a fusion of different advanced technologies (i.e., electrical power engineering meets sensing, control, digital communication, and network information technologies). However, when these advanced technologies converge at smart grid, we will face many unforeseen challenges, particularly security challenges in smart grid communications. In this article, toward secure targeted broadcast in smart grid, we investigate the applicability of Attribute Based Encryption (ABE) for smart grid communication scenarios. In particular, we focus on the application of Key Policy ABE (KPABE), where a smart grid control center can use KP-ABE to broadcast a single encrypted message to a specific group of users, and each user in the targeted group can individually use the defined key policy to decrypt the message. With this kind of KP-ABE targeted broadcast, it is possible to eliminate the need for issuing multiple unicast messages. As a result, both communication and computation efficiency can be ensured.Keywords
This publication has 7 references indexed in Scilit:
- A Lightweight Message Authentication Scheme for Smart Grid CommunicationsIEEE Transactions on Smart Grid, 2011
- Toward intelligent machine-to-machine communications in smart gridIEEE Communications Magazine, 2011
- GRS: The green, reliability, and security of emerging machine to machine communicationsIEEE Communications Magazine, 2011
- Smart-grid security issuesIEEE Security & Privacy, 2010
- Conjunctive Broadcast and Attribute-Based EncryptionLecture Notes in Computer Science, 2009
- Attribute-based encryption for fine-grained access control of encrypted dataPublished by Association for Computing Machinery (ACM) ,2006
- Rewriting Histories: Recovering from Malicious TransactionsDistributed and Parallel Databases, 2000