"Smart Grid" incorporates a number of different concepts:two-way integrated communications between a utility and the consumers along with the transmission and distribution grid;incorporates sensing and measurement technologies that can monitor equipment health,grid integrity,congestion,energy theft,advanced transmission and storage components that make the use of generation and transmission infrastructure more efficient and has diagnostic and control devices and software that can identify and propose precise solutions to specific grid disruptions or outages.And demand response is the main balancing part between utility service and customers.Demand management requires that electric meters at each home,farm,factory,or office be replaced by far more advanced devices that incorporate communications and data-processing capabilities.The smart meter is only the first stage in demand management.Over time,the meter could be linked to a new generation of "intelligent" appliances or business equipment.These devices could be set to operate only under price conditions selected by the customers,or they could be controlled by the utility itself by means of the smart meter.That’s why reliable authentication and information security is the ultimate priority for advanced metering infrastructural(AMI)system.Authenticity and cybersecurity is the most crucial part to ensure the efficiency,reliability,and security of the evolving power grid system.Secure and reliable authentication of smart meters and data collectors connected in AMI system is of utmost importance to ensure compliance with the security requirements of smart grid.In this work,a novel authentication and key management scheme is introduced for the AMI system of smart grid using configurable Ring Oscillator Physically Unclonable Functions(RO PUFs).The scope of the design covers the communication between the utility company and the smart meter network.The scheme is based on hardware-oriented security and can be implemented on existing smart meters.The cryptographic keys used in this scheme are extremely difficult to model by adversaries as each set of keys are used only once.The authentication codes are generated from configurable RO PUF response bits using the Hamming code.The design of the proposed scheme ensures fault tolerance as Ring Oscillator(RO)comparison pairs with high-frequency differences are selected to prevent bit flips.The authentication scheme is highly efficient and cost-effective in terms of latency and data storage.As a proof-of-concept,the proposed scheme is implemented on Xilinx Spartan 3E FPGA boards.In the threat model analysis,Multigene Genetic Programming(MGGP)is used to demonstrate that the scheme cannot be modeled by adversaries.Also,it is shown that the scheme is secure against common wireless sensor network attacks including eavesdropping,spoofing,invasive and Man-in-the-middle attacks.The main contents of this paper are as follows:Chapter 1 describes the background and significance of the topic,the research status,as well as the focus and structure of this paper.Also the literature review for this thesis is additionally provided in chapter one.Chapter 2 studies the demand response scenario and advanced metering infrastructure,summarizes the system architecture,communication mode and studies the related concepts of power demand response technology.Chapter 3 analyzes the hardware-based authentication and develops a key administrative scheme configurable Ring Oscillator Physically unclonable Function(RO PUF)and designs the overall framework of DR system hardware architecture.The authentication scheme is shorted between advanced metering infrastructure(AMI)and service provider.In Chapter 4,evaluation and security management are designed in detail to realize the technical support of DR terminal for intelligent and utility service,technical issue,crossover and mutation,simulation and network attack.It summarizes the research results of the paper and explains the shortcomings of the paper.In Chapter 5 is the conclusion for this paper and future work.It summarizes the research results of the paper,explains the shortcomings of the paper and looks forward to further work. |