Authentication and Integrity Protection for Real-time Cyber-Physical Systems

Edited book (chapter)


Keoh, Sye Loong, Tan, Heng Chuan and Tang, Zhaohui. 2020. "Authentication and Integrity Protection for Real-time Cyber-Physical Systems." Tian, Yu-Chu and Levy, David Charles (ed.) Handbook of Real-Time Computing. Singapore. Springer. pp. 1-22
Chapter Title

Authentication and Integrity Protection for Real-time Cyber-Physical Systems

Book Chapter CategoryEdited book (chapter)
ERA Publisher ID3337
Book TitleHandbook of Real-Time Computing
AuthorsKeoh, Sye Loong (Author), Tan, Heng Chuan (Author) and Tang, Zhaohui (Author)
EditorsTian, Yu-Chu and Levy, David Charles
Page Range1-22
SeriesSpringer Reference
Chapter Number3
Number of Pages22
Year2020
PublisherSpringer
Place of PublicationSingapore
ISBN9789814585873
Digital Object Identifier (DOI)https://doi.org/10.1007/978-981-4585-87-3_39-1
Web Address (URL)https://link.springer.com/referenceworkentry/10.1007%2F978-981-4585-87-3_39-1
Abstract

Cyber-physical system (CPS) is a collaborative system of cyber and physical devices that work together to facilitate automation, communication, and sharing of information in real time. This chapter examines the Advanced Metering Infrastructure (AMI) in a smart grid environment, in which energy consumption data collected by smart meters is collected and aggregated in real time. Thus, allowing the system operators to analyze the energy usage to improve consumer service by refining utility operating and asset management processes more efficiently. Data aggregation is an integral part of AMI deployment. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth utilization of AMI. However, the concentrator (the entity that aggregates the energy readings) poses a considerable risks of being tampered with, leading to erroneous bills, and possible consumer disputes. In this chapter, we discuss an end-to-end integrity protocol using elliptic curve-based chameleon hashing to provide data integrity and authenticity. The concentrator generates and sends a chameleon hash value of the aggregated readings to the Meter Data Management System (MDMS) for verification, while the smart meter with the trapdoor key computes and sends a commitment value to the MDMS so that the resulting chameleon hash value calculated by the MDMS is equivalent to the previous hash value sent by the concentrator. By comparing the two hash values, the MDMS can validate the integrity and authenticity of the data transmitted by the concentrator.

KeywordsCyber-physical system (CPS); Advanced Metering Infrastructure (AMI); Meter Data Management System (MDMS)
ANZSRC Field of Research 2020469999. Other information and computing sciences not elsewhere classified
Byline AffiliationsUniversity of Glasgow, United Kingdom
Advanced Digital Science Centre, Singapore
School of Sciences
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q5893/authentication-and-integrity-protection-for-real-time-cyber-physical-systems

  • 160
    total views
  • 10
    total downloads
  • 3
    views this month
  • 0
    downloads this month

Export as

Related outputs

A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566
Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning
Tang, Zhaohui. 2022. "Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.
Federated Learning with Real-world Datasets: Compliance with the Privacy Act
Tang, Zhaohui and Keoh, Sye Loong. 2022. "Federated Learning with Real-world Datasets: Compliance with the Privacy Act." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.
Secret sharing-based IoT text data outsourcing: a secure and efficient scheme
Tang, Zhaohui. 2021. "Secret sharing-based IoT text data outsourcing: a secure and efficient scheme." IEEE Access. 9, pp. 76908 -76920. https://doi.org/10.1109/ACCESS.2021.3075282
An Efficient Scheme to Secure Data Provenance in Home Area Networks
Tang, Zhaohui and Keoh, Sye Loong. 2020. "An Efficient Scheme to Secure Data Provenance in Home Area Networks." IEEE 3rd 5G World Forum (5GWF 2020). Bangalore, India 10 - 12 Sep 2020 United States. https://doi.org/10.1109/5GWF49715.2020.9221402
Privacy Preserving Computation in Home Loans Using the FRESCO Framework
Chan, Fook Mun, Xu, Quanqing, Seah, Hao Jian, Keoh, Sye Loong, Tang, Zhaohui and Aung, Khin Mi Mi. 2019. "Privacy Preserving Computation in Home Loans Using the FRESCO Framework." Kacprzyk, Janusz (ed.) 2018 Future of Information and Communication Conference (FICC 2018). Singapore 05 - 06 Apr 2018 Switzerland. https://doi.org/10.1007/978-3-030-03405-4_7