An Efficiency Firmware Verification Framework for Public Key Infrastructure with Smart Grid and Energy Storage System
- URL: http://arxiv.org/abs/2501.05722v1
- Date: Fri, 10 Jan 2025 05:43:31 GMT
- Title: An Efficiency Firmware Verification Framework for Public Key Infrastructure with Smart Grid and Energy Storage System
- Authors: Jhih-Zen Shih, Cheng-Che Chuang, Hong-Sheng Huang, Hsuan-Tung Chen, Hung-Min Sun,
- Abstract summary: Rapid evolution of smart grids has attracted numerous nation-state actors seeking to disrupt the power infrastructure of adversarial nations.<n>We propose a digital signing and verification framework grounded in Public Key Infrastructure (PKI), specifically tailored for resource-constrained devices such as smart meters.
- Score: 0.6757476692230008
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As a critical component of electrical energy infrastructure, the smart grid system has become indispensable to the energy sector. However, the rapid evolution of smart grids has attracted numerous nation-state actors seeking to disrupt the power infrastructure of adversarial nations. This development underscores the urgent need to establish secure mechanisms for firmware updates, with firmware signing and verification serving as pivotal elements in safeguarding system integrity. In this work, we propose a digital signing and verification framework grounded in Public Key Infrastructure (PKI), specifically tailored for resource-constrained devices such as smart meters. The framework utilizes the Concise Binary Object Representation (CBOR) and Object Signing and Encryption (COSE) formats to achieve efficient da-ta encapsulation and robust security features. Our approach not only en-sures the secure deployment of firmware updates against the convergence of information technology (IT) and operational technology (OT) attacks but also addresses performance bottlenecks stemming from device limitations, thereby enhancing the overall reliability and stability of the smart grid sys-tem.
Related papers
- Intelligent Detection of Non-Essential IoT Traffic on the Home Gateway [45.70482328441101]
This work presents ML-IoTrim, a system for detecting and mitigating non-essential IoT traffic by analyzing network behavior at the edge.
We test our framework in a consumer smart home setup with IoT devices from five categories, demonstrating that the model can accurately identify and block non-essential traffic.
This research advances privacy-aware traffic control in smart homes, paving the way for future developments in IoT device privacy.
arXiv Detail & Related papers (2025-04-22T09:40:05Z) - A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App [1.4732811715354452]
This paper proposes a holistic approach to securing network-connected devices.
At the hardware level, we focus on secure key management, reliable random number generation, and protecting critical assets.
For secure communication, we emphasize TLS 1.3 and optimized cipher suites tailored for both standard and resource-constrained devices.
arXiv Detail & Related papers (2025-01-23T14:44:34Z) - Sustainable and Intelligent Public Facility Failure Management System Based on Large Language Models [14.776153063614244]
This paper presents a new Large Language Model (LLM)-based Smart Device Management framework.
We demonstrate its practical applicability and its capacity to significantly reduce budgetary constraints on public facilities.
We plan to extend the framework's scope to include a wider array of public facilities and to integrate it with cutting-edge cybersecurity technologies.
arXiv Detail & Related papers (2025-01-08T02:30:37Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction [53.2306792009435]
We propose GAN-GRID a novel adversarial attack targeting the stability prediction system of a smart grid tailored to real-world constraints.
Our findings reveal that an adversary armed solely with the stability model's output, devoid of data or model knowledge, can craft data classified as stable with an Attack Success Rate (ASR) of 0.99.
arXiv Detail & Related papers (2024-05-20T14:43:46Z) - Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments [60.51751612363882]
We investigate the security implications of and software-based Open Radio Access Network (RAN) systems.
We highlight the presence of potential vulnerabilities and misconfigurations in the infrastructure supporting the Near Real-Time RAN Controller (RIC) cluster.
arXiv Detail & Related papers (2024-05-03T07:18:45Z) - Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds [42.37170902465878]
Decentralized Physical Infrastructure Networks (DePINs) aim to enhance data sovereignty and confidentiality and increase resilience against a single point of failure.
This work focuses on the potential of DePINs to disrupt traditional centralized architectures by taking advantage of the Internet of Things (IoT) devices and crypto-economic design in combination with blockchains.
arXiv Detail & Related papers (2024-04-12T08:00:38Z) - Software-based Security Framework for Edge and Mobile IoT [0.5735035463793009]
This work focuses on designing secure communication among remote servers and embedded IoT devices.
The proposed approach uses lightweight cryptography, optimizing device performance and security without overburdening their limited resources.
arXiv Detail & Related papers (2024-04-09T16:25:13Z) - Demand-Side Threats to Power Grid Operations from IoT-Enabled Edge [6.437501851914223]
Growing adoption of Internet-of-Things (IoT)-enabled energy smart appliances (ESAs) at the consumer end, is seen as key to enabling demand-side response (DSR) services.
These smart appliances are often poorly engineered from a security point of view and present a new threat to power grid operations.
Unlike utility-side and SCADA assets, ESAs are not monitored continuously due to their large numbers and the lack of extensive monitoring infrastructure at consumer sites.
arXiv Detail & Related papers (2023-10-28T20:56:43Z) - Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid [0.0]
A smart grid (SG) requires a prompt and dependable connection to provide real-time monitoring through the IoT.
5G could be considered a catalyst for upgrading the existing power grid systems.
This article analyzes the Zero Trust (ZT) architecture specific to the power system of IoT and uses that knowledge to develop a security protection architecture.
arXiv Detail & Related papers (2022-10-04T16:57:33Z) - AI-Empowered Data Offloading in MEC-Enabled IoV Networks [40.75165195026413]
This article surveys research studies that use AI as part of the data offloading process, categorized based on four main issues: reliability, security, energy management, and service seller profit.
Various challenges to the process of offloading data in a MEC-enabled IoV network have emerged, such as offloading reliability in highly mobile environments, security for users within the same network, and energy management to keep users from being disincentivized to participate in the network.
arXiv Detail & Related papers (2022-03-31T09:31:53Z) - Authentication of Smart Grid Communications using Quantum Key
Distribution [0.0]
We report the first use of quantum key distribution (QKD) keys in the authentication of smart grid communications.
The developed method was prototyped in a software package to manage and utilize cryptographic keys.
This demonstration showcases the feasibility of using QKD to improve the security of critical infrastructure.
arXiv Detail & Related papers (2021-10-07T14:50:46Z) - Intelligent Zero Trust Architecture for 5G/6G Tactical Networks:
Principles, Challenges, and the Role of Machine Learning [4.314956204483074]
We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components.
This paper presents the architectural design of an i-ZTA upon which modern artificial intelligence (AI) algorithms can be developed to provide information security in untrusted networks.
arXiv Detail & Related papers (2021-05-04T13:14:29Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.