Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid Rong Jiang 2013.07.31.

Slides:



Advertisements
Similar presentations
Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links Abstract Wildcard identity-based encryption (IBE) provides an effective means.
Advertisements

Akshat Sharma Samarth Shah
A Survey of Key Management for Secure Group Communications Celia Li.
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Authors: Yanchao Zhang, Member, IEEE, Wei Liu, Wenjing Lou,Member, IEEE, and Yuguang Fang, Senior Member, IEEE Source: IEEE TRANSACTIONS ON DEPENDABLE.
Self-Healing in Wireless Networks. The self-healing property is expected in many aspects in wireless networks: – Encryption algorithms – Key distribution.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
Su Youn Lee, Su Mi Lee and Dong Hoon Lee Current Trends in Theory and Practice of Computer Science Baekseok College of Cultural Studies GSIS.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison.
Yan (Lindsay) Sun and K. J. Ray Liu IEEE/ACM Transactions on Networking, Dec Presented by Seo Bon Keun, 2008.
Queensland University of Technology CRICOS No J Mitigating Sandwich Attacks against a Secure Key Management in WSNs for PCS/SCADA Hani Alzaid, DongGook.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Cyber Security and Privacy Issues in Smart Grids Presenter: Hongwei Li.
Broadcast Encryption and Traitor Tracing Jin Kim.
Computer Science 1 Efficient Self-healing Group Key Distribution With Revocation Capability Archana Rajagopal CSC 774 Presentation Based on Original Slides.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi: /j.future
Wireless Sensor Network Security Anuj Nagar CS 590.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Session Initiation Protocol (SIP) 王承宇 張永霖.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Scalability in a Secure Distributed Proof System Kazuhiro Minami and David Kotz May 9, 2006 Institute for Security Technology Studies Dartmouth College.
Enterprise Systems Business Planning & Logistics Site Manufacturing Operations and Control Area Supervisory Control Basic Control Safety- Instrumented.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Computationally Secure Hierarchical Self- Healing Group Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
LiSP: A Lightweight Security Protocol for Wireless Sensor Networks TAEJOON PARK and KANG G. SHIN The University of Michigan Presented by Abhijeet Mugade.
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F. Bao Presenter: Jianying Zhou.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
DEAS2005Michael Shin Copyright1 Connector-Based Self-Healing Mechanism for Components of a Reliable System Michael E. Shin Department of Computer Science.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Random Key Predistribution Schemes for Sensor.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Security for Broadcast Network
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
Innovative Intrusion-Resilient, DDoS-Resistant Authentication System (IDAS) System Yanjun Zhao.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
TrafficGather: An Efficient and Scalable Data Collection Protocol for Vehicular Ad Hoc Networks Wang-Rong Chang Department of Electrical Engineering, National.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Automation Technologies SCADA SENSORS HMI
Self transforming to power law topology for overlay networks.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Presentation transcript:

Robust Group Key Management with Revocation and Collusion Resistance for SCADA in Smart Grid Rong Jiang

Agenda  Introduction  The proposed group key management  Security analysis and performance evaluation  Conclusion 2/19

SCADA  Supervisory Control And Data Acquisition (SCADA) systems are used to monitor and manage the electric distribution, transmission and generation environments.  the group communication is an essential part  a status scan request  measured value scan request  an emergent shutdown message or a set-the-clock-time message  Requirement: availability 3/19

SCADA system architecture HMI: Human-Machine Interface MTU: Master Terminal Unit RTU: Remote Terminal Unit 4/19

Security Model and Design Goal  Security Model  Group confidentiality  Backward secrecy  Forward secrecy  t-collusion-resistant  Design Goal  Availability  Efficiency 5/19

preliminary knowledge  Session key  DDHC(dual directional hash chain)  bivariate polynomial 6/19

Description of LiSH  Initialization  Re-keying  Self-healing mechanism  Adding new member nodes  re-initialization mechanism 7/19

Initialization 8/19

Initialization l is the length of key buffer; T refresh is the rekeying period : random numbers 9/19

Re-keying :the set of users all revoked in and before s j :a set of irrelevant users :self-healing set :broadcast polynomial 10/19 the KDC periodically discloses the next secret number C and constructs a self- healing set T and a revocation set R to expel some illegal nodes.

Re-keying 11/19

12/19

Self-healing mechanism 13/19

Adding new member nodes 14/19

Determination of self-healing period 15/19

Security Analysis  Theorem 1: LiSH is a session key distribution with privacy and achieves self-healing with time-limited t-revocation capability.  Theorem 2: LiSH achieves t-wise forward and backward secrecy.  Theorem 4: LiSH is resistant to attacks to Dutta [13] and Du [17]’s schemes mentioned in section II. 16/19

Performance Evaluation 17/19

Conclusion  In this paper, we have proposed a robust and efficient group key management, named LiSH, to secure SCADA system in smart grid.  The proposed LiSH scheme is characterized by adopting self-healing key to tolerant failures of the sub-MTUs. Security analysis has shown that the proposed LiSH is a collusion-free and self- healing key distribution scheme with t-wise forward and backward security.  In addition, performance evaluation has also demonstrated its efficiency. 18/19

Thank you! 19/19