4.6 Article

Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2015.2467385

关键词

Certificate revocation; public key cryptography; smart grid security; Public key infrastructure; AMI

资金

  1. US National Science Foundation [1550313]
  2. Division Of Computer and Network Systems
  3. Direct For Computer & Info Scie & Enginr [1619250, 1550313] Funding Source: National Science Foundation

向作者/读者索取更多资源

Given the scalability of the advanced metering infrastructure (AMI) networks, maintenance and access of certificate revocation lists (CRLs) pose new challenges. It is inefficient to create one large CRL for all the smart meters (SMs) or create a customized CRL for each SM since too many CRLs will be required. In order to tackle the scalability of the AMI network, we divide the network into clusters of SMs, but there is a tradeoff between the overhead at the certificate authority (CA) and the overhead at the clusters. We use Bloom filters to reduce the size of the CRLs in order to alleviate this tradeoff by increasing the clusters' size with acceptable overhead. However, since Bloom filters suffer from false positives, there is a need to handle this problem so that SMs will not discard important messages due to falsely identifying the certificate of a sender as invalid. To this end, we propose two certificate revocation schemes that can identify and nullify the false positives. While the first scheme requires contacting the gateway to resolve them, the second scheme requires the CA additionally distribute the list of certificates that trigger false positives. Using mathematical models, we have demonstrated that the probability of contacting the gateway in the first scheme and the overhead of the second scheme can be very low by properly designing the Bloom filters. In order to assess the scalability and validate the mathematical formulas, we have implemented the proposed schemes using Visual C. The results indicate that our schemes are much more scalable than the conventional CRL and the mathematical and simulation results are almost identical. Moreover, we simulated the distribution of the CRLs in a wireless mesh-based AMI network using ns-3 network simulator and assessed its distribution overhead.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks

Samet Tonyali, Ozan Cakmak, Kemal Akkaya, Mohamed M. E. A. Mahmoud, Ismail Guvenc

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Theory & Methods

Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems

Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac, Mehrdad Nojoumian

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

A realistic performance evaluation of privacy-preserving protocols for smart grid AMI networks

Samet Tonyali, Ruben Munoz, Kemal Akkaya, Utku Ozgur

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks

Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya

IEEE INTERNET OF THINGS JOURNAL (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices

Jessica Bozhko, Yacoub Hanna, Ricardo Harrilal-Parchment, Samet Tonyali, Kemal Akkaya

Summary: Post-quantum cryptographic algorithms are being developed to resist attacks from quantum computers. The efficiency of these algorithms is crucial for their practical use in securing networks, especially for consumer IoT devices with limited computational power and constrained wireless bandwidth. This paper focuses on evaluating the performance of widely used IoT standards BLE and WiFi to find the optimal PQ algorithm for their security. The test results showed that Kyber512 is the ideal KEM for BLE devices, while Falcon-512 and Dilithium2 are the best signatures for WiFi devices.

2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC (2023)

Proceedings Paper Computer Science, Hardware & Architecture

A Scalable Protocol Stack for IEEE 802.11s-based Advanced Metering Infrastructure Networks

Samet Tonyali, Kemal Akkaya

2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC) (2018)

Proceedings Paper Engineering, Electrical & Electronic

An Attribute-based Reliable Multicast-over-Broadcast Protocol for Firmware Updates in Smart Meter Networks

Samet Tonyali, Kemal Akkaya, Nico Saputro

2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2017)

Proceedings Paper Computer Science, Theory & Methods

Testbed and Simulation-based Evaluation of Privacy-preserving Algorithms for Smart Grid AMI Networks

Utku Ozgur, Samet Tonyali, Kemal Akkaya

PROCEEDINGS OF THE 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS - LCN WORKSHOPS 2016 (2016)

Proceedings Paper Engineering, Electrical & Electronic

Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks

Hawzhin Mohammed, Samet Tonyali, Khaled Rabieh, Mohamed Mahmoud, Kemal Akkaya

2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Addressing Network Interoperability in Hybrid IEEE 802.11s/LTE Smart Grid Communications

Nico Saputro, Kemal Akkaya, Samet Tonyali

2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN) (2016)

Proceedings Paper Computer Science, Theory & Methods

Comparative Evaluation of Smart Grid AMI Networks: Performance under Privacy

Utku Ozgur, Samet Tonyali, Kemal Akkaya, Fatih Senel

2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC) (2016)

Proceedings Paper Engineering, Electrical & Electronic

A Reliable Data Aggregation Mechanism with Homomorphic Encryption in Smart Grid AMI Networks

Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac

2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC) (2016)

Proceedings Paper Engineering, Electrical & Electronic

Assessing the Feasibility of Fully Homomorphic Encryption for Smart Grid AMI Networks

Samet Tonyali, Nico Saputro, Kemal Akkaya

2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (2015)

Proceedings Paper Computer Science, Theory & Methods

Application of Recently Proposed Metaheuristics to the Sequence Dependent TSP

Samet Tonyali, Ali Fuat Alkaya

ADVANCED COMPUTATIONAL METHODS FOR KNOWLEDGE ENGINEERING (2015)

暂无数据