An Efficient ARIA-RSA-SHA256 Hybridized Encryption Algorithm for Metering Data in Smart Grid Network Systems

Anita Philips, J Jayakumar

Abstract


Digitizing the traditional electrical power grid and the transition of the grid operations to Smart Grid functionalities could yield very efficient results. Despite all the advantages, the smart grid networks pose a serious threat of cyber-attacks emerging at the various nodes of the system. The cyber threat models could vary from minimal effect on the system to even massive power outages disrupting the entire system. One of the vulnerable and crucial nodes of the smart grid where the security breaches can occur is the Advanced Metering Infrastructure component of the smart grid. Hence, it becomes essential for efficient security protocols in place, to secure the metering data originating from the consumer premises through smart meters. In this paper, we have explored the cryptographic encryption algorithms, which are most effective in securely transmitting data from smart meters to the utility centers and vice versa. In particular, using the approach of combining the strengths of asymmetric and asymmetric public key algorithms to provide hybrid functionalities are very efficient in Internet of Things (IoT) systems. Therefore, in this research work, we propose an enhanced hybrid security protocol with ARIA encryption algorithm and Rivest–Shamir–Adleman (RSA) key encryption algorithm with SHA256 hash digital signature for the secure transmission of metering data in smart grid networks. The results of this hybrid application in smart grids shows significant improvement in the defined performance metrics.


Keywords


Cyber security; Hybrid security; Symmetric encryption; Asymmetric encryption; ARIA encryption algorithm; RSA cryptographic algorithm; Digital Signature; Advanced metering infrastructure; Smart grid

Full Text:

PDF

References


U.S. Department of Energy, “Advanced Metering Infraestructure and Customer Systems - Results from the smart grid investment grant program,” Off. Electr. Deliv. Energy Reliab., pp. 1–98, 2016.

D. M. Menon and N. Radhika, “Design of a Secure Architecture for Last Mile Communication in Smart Grid Systems,” Procedia Technol., vol. 21, pp. 125–131, 2015, doi: 10.1016/j.protcy.2015.10.019.

S. Khasawneh and M. Kadoch, “Hybrid Cryptography Algorithm with Precomputation for Advanced Metering Infrastructure Networks,” Mob. Networks Appl., vol. 23, no. 4, pp. 982–993, 2018, doi: 10.1007/s11036-017-0956-0.

S. Grids and H. Cryptosystem, “Australian Journal of Basic and Applied Sciences Hybrid Security Approach for Smart Grid Infrastructure,” vol. 9, no. 16, pp. 91–96, 2015.

M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. S. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675–685, 2011, doi: 10.1109/TSG.2011.2160661.

S. Khasawneh and M. Kadoch, “A Hybrid Encryption Scheme for Advanced Metering Infrastructure Networks,” no. May, 2017, doi: 10.4108/eai.7-8-2017.152990.

A. K. Asundi, P. B. Jyoti, M. S. Nagaraj, and S. S. Sultan, “An efficient cryptography key management for secure communications in smart metering,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 10, pp. 2908–2916, 2019, doi: 10.35940/ijitee.I7846.0881019.

K. Mahmood, S. Ashraf Chaudhry, H. Naqvi, T. Shon, and H. Farooq Ahmad, “A lightweight message authentication scheme for Smart Grid communications in power sector,” Comput. Electr. Eng., vol. 52, pp. 114–124, 2016, doi: 10.1016/j.compeleceng.2016.02.017.

I. Parvez, M. Aghili, and A. Sarwat, “Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid,” pp. 1–8, 2017, [Online]. Available: http://arxiv.org/abs/1709.08505.

D. Abbasinezhad-Mood and M. Nikooghadam, “Design of an enhanced message authentication scheme for smart grid and its performance analysis on an ARM Cortex-M3 microcontroller,” J. Inf. Secur. Appl., vol. 40, pp. 9–19, 2018, doi: 10.1016/j.jisa.2018.02.007.

K. Alharbi and X. Lin, “Efficient and privacy-preserving smart grid downlink communication using identity based signcryption,” 2016 IEEE Glob. Commun. Conf. GLOBECOM 2016 - Proc., 2016, doi: 10.1109/GLOCOM.2016.7841770.

N. George, S. Nithin, and S. K. Kottayil, “Hybrid Key Management Scheme for Secure AMI Communications,” Procedia Computer Science, vol. 93. pp. 862–869, 2016, doi: 10.1016/j.procs.2016.07.260.

T. Rizzetti, B. Menezes da Silva, A. Silva Rodrigues, R. Gressler Milbradt, and L. Neves Canha, “A secure and lightweight multicast communication system for Smart Grids,” ICST Trans. Secur. Saf., vol. 5, no. 16, p. 156004, 2018, doi: 10.4108/eai.13-7-2018.156004.

K. Mahmood, S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, and A. K. Sangaiah, “An elliptic curve cryptography based lightweight authentication scheme for smart grid communication,” Futur. Gener. Comput. Syst., vol. 81, pp. 557–565, 2018, doi: 10.1016/j.future.2017.05.002.

N. N. Mohamed, Y. M. Yussoff, M. A. Saleh, and H. Hashim, “Hybrid cryptographic approach for internet of things applications: A review,” J. Inf. Commun. Technol., vol. 19, no. 3, pp. 279–319, 2020, doi: 10.32890/jict2020.19.3.1.

B. K. Alese, E. D. Philemon, and S. O. Falaki, “Comparative analysis of public-key encryption schemes,” Int. J. Eng. Technol., vol. 2, no. 9, pp. 1152–1568, 2012, [Online]. Available: http://iet-journals.org/archive/2012/sep_vol_2_no_9/1298141336454596.pdf.

F. Wang, Z. Wang, and Y. Zhu, “Adaptive RSA Encryption Algorithm for Smart Grid,” J. Phys. Conf. Ser., vol. 1302, no. 2, 2019, doi: 10.1088/1742-6596/1302/2/022097.

G. M. S. G. C. Deka and K. G. S. L. M. Patnaik, C Y B E R - P H Y S I C A L S Y S T E M S A Computational Perspective. 2016.

L. Wei, L. P. Rondon, A. Moghadasi, and A. I. Sarwat, “Review of cyber-physical attacks and counter defense mechanisms for advanced metering infrastructure in smart grid,” arXiv, 2018.

“Threat Modeling: 12 Available Methods.” https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/ (accessed Jul. 12, 2021).

S. Editor et al., Information Security and Cryptography, vol. 19. 2007.

J. Ekanayake, K. Liyanage, J. Wu, A. Yokoyama, and N. Jenkins, Smart Grid: Technology and Applications. 2012.

R. Manjupriya, “A Study on Symmetric and Asymmetric Key Encryption Algorithms,” Int. Res. J. Eng. Technol., vol. 3, no. 4, pp. 27–31, 2016.

“Symmetric Algorithms | Types of Symmetric Algorithms.” https://www.educba.com/symmetric-algorithms/?source=leftnav (accessed Jul. 07, 2021).

J. Henkel, Cyber-Physical Systems Security and Privacy, vol. 34, no. 4. 2017.

“Public Key Encryption and Digital Signatures.” http://guides.brucejmack.net/SOA-Patterns/WSSP/13.1PublicKeyEncryptDigSigDoc.htm (accessed Aug. 22, 2021).

NIST, “Annex A : Security Requirements for Cryptographic Modules,” pp. 2–9, 2019.

T. Caddy, “Fips 140-2,” Encycl. Cryptogr. Secur., pp. 468–471, 2011, doi: 10.1007/978-1-4419-5906-5_205.

“Popular Symmetric Algorithms - Practical Cryptography for Developers.” https://cryptobook.nakov.com/symmetric-key-ciphers/popular-symmetric-algorithms (accessed Jul. 22, 2021).

K. Standard and B. Cipher, “Block Cipher Algorithm ARIA,” pp. 1–2, 2021.

“An Overview of Cryptography.” https://www.garykessler.net/library/crypto.html (accessed Jul. 23, 2021).

C. D. C. J. L. B. P. S. B. Ö. A. Biryukov, “Security and Performance Analysis of ARIA,” vol. 2, no. 1, pp. 27–33, 2004, [Online]. Available: http://www.cosic.esat.kuleuven.be/publications/article-500.ps.

A. Abdelkhalek, M. Tolba, and A. M. Youssef, “Improved linear cryptanalysis of round-reduced ARIA,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9866 LNCS, pp. 18–34, 2016, doi: 10.1007/978-3-319-45871-7_2.

H. Seo, H. Kwon, H. Kim, and J. Park, “Ace: Aria-ctr encryption for low-end embedded processors,” Sensors (Switzerland), vol. 20, no. 13, pp. 1–15, 2020, doi: 10.3390/s20133788.

A. Philips, J. Jayaraj, J. F.T, and V. P, “Enhanced RSA key encryption application for metering data in smart grid,” Int. J. Pervasive Comput. Commun., vol. 17, no. 5, pp. 596–610, 2021, doi: 10.1108/IJPCC-07-2021-0172.

N. Kaur and H. Wadhwa, “Security Enhancement in Cloud Storage using ARIA and Elgamal Algorithms,” Int. J. Comput. Appl., vol. 171, no. 9, pp. 19–23, 2017, doi: 10.5120/ijca2017915116.




DOI (PDF): https://doi.org/10.20508/ijrer.v13i4.13998.g8821

Refbacks

  • There are currently no refbacks.


Online ISSN: 1309-0127

Publisher: Gazi University

IJRER is cited in SCOPUS, EBSCO, WEB of SCIENCE (Clarivate Analytics);

IJRER has been cited in Emerging Sources Citation Index from 2016 in web of science.

WEB of SCIENCE in 2025; 

h=35,

Average citation per item=6.59

Last three Years Impact Factor=(1947+1753+1586)/(146+201+78)=5286/425=12.43

Category Quartile:Q4