Premium
Enhancing the security of a cloud‐based smart grid AMI network by leveraging on the features of quantum key distribution
Author(s) -
Diovu R.C.,
Agee J.T.
Publication year - 2019
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.3587
Subject(s) - cloud computing , computer science , quantum key distribution , smart grid , computer network , firewall (physics) , computer security , distributed computing , key (lock) , engineering , quantum , operating system , entropy (arrow of time) , physics , quantum mechanics , electrical engineering , charged black hole , extremal black hole
In the last decade, there have been many research proposals on the potentials of incorporating cloud computing technology to the electrical power grid as it evolves rapidly to the smart grid. The advanced metering infrastructure (AMI) is one domain of the smart grid that can be greatly impacted by cloud computing technology with regards to an improved capability for data storage and computations, which will be a serious burden to the AMI in an evolved smart grid environment. In our previous study, a cloud‐based OpenFlow firewall for the mitigation of distributed denial‐of‐service attacks in a smart grid AMI (SG AMI) was proposed. In that study, it was clearly demonstrated that cloud computing technology, in addition to improving the storage and computation capability of the AMI, can also be leveraged on to enhance the security of the SG AMI in an attack scenario. In this study, we propose a cloud‐based SG AMI system model utilizing quantum key distribution (QKD) cryptography for enhancing the security of a cloud‐based SG AMI. The proposed model has been designed to complement the security features of the previously designed OpenFlow firewall to guarantee not only the availability but also the confidentiality and integrity of data traversing the AMI network and beyond. The analysis on computation and communication costs shows that the protocols utilized in the proposed system model are lightweight protocols. In addition, results from the simulation of the QKD (BB84) protocol show that QKD can be leveraged on to provide information theoretic security for the cloud‐based SG AMI.