Authentication and Integrity Protection for Real-time Cyber-Physical Systems
Edited book (chapter)
Chapter Title | Authentication and Integrity Protection for Real-time Cyber-Physical Systems |
---|---|
Book Chapter Category | Edited book (chapter) |
ERA Publisher ID | 3337 |
Book Title | Handbook of Real-Time Computing |
Authors | Keoh, Sye Loong (Author), Tan, Heng Chuan (Author) and Tang, Zhaohui (Author) |
Editors | Tian, Yu-Chu and Levy, David Charles |
Page Range | 1-22 |
Series | Springer Reference |
Chapter Number | 3 |
Number of Pages | 22 |
Year | 2020 |
Publisher | Springer |
Place of Publication | Singapore |
ISBN | 9789814585873 |
Digital Object Identifier (DOI) | https://doi.org/10.1007/978-981-4585-87-3_39-1 |
Web Address (URL) | https://link.springer.com/referenceworkentry/10.1007%2F978-981-4585-87-3_39-1 |
Abstract | Cyber-physical system (CPS) is a collaborative system of cyber and physical devices that work together to facilitate automation, communication, and sharing of information in real time. This chapter examines the Advanced Metering Infrastructure (AMI) in a smart grid environment, in which energy consumption data collected by smart meters is collected and aggregated in real time. Thus, allowing the system operators to analyze the energy usage to improve consumer service by refining utility operating and asset management processes more efficiently. Data aggregation is an integral part of AMI deployment. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth utilization of AMI. However, the concentrator (the entity that aggregates the energy readings) poses a considerable risks of being tampered with, leading to erroneous bills, and possible consumer disputes. In this chapter, we discuss an end-to-end integrity protocol using elliptic curve-based chameleon hashing to provide data integrity and authenticity. The concentrator generates and sends a chameleon hash value of the aggregated readings to the Meter Data Management System (MDMS) for verification, while the smart meter with the trapdoor key computes and sends a commitment value to the MDMS so that the resulting chameleon hash value calculated by the MDMS is equivalent to the previous hash value sent by the concentrator. By comparing the two hash values, the MDMS can validate the integrity and authenticity of the data transmitted by the concentrator. |
Keywords | Cyber-physical system (CPS); Advanced Metering Infrastructure (AMI); Meter Data Management System (MDMS) |
ANZSRC Field of Research 2020 | 469999. Other information and computing sciences not elsewhere classified |
Byline Affiliations | University of Glasgow, United Kingdom |
Advanced Digital Science Centre, Singapore | |
School of Sciences | |
Institution of Origin | University of Southern Queensland |
https://research.usq.edu.au/item/q5893/authentication-and-integrity-protection-for-real-time-cyber-physical-systems
181
total views10
total downloads0
views this month0
downloads this month