Quantum-Resistant Authentication for Smart Grid: The Case for Using Merkle Trees

Quantum-Resistant Authentication for Smart Grid: The Case for Using Merkle Trees

Melesio Muñoz-Calderón, Melody Moh
DOI: 10.4018/978-1-6684-5250-9.ch020
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

We are currently at the beginning of a great technological transformation of our electrical power grids. These new grids will be “smart” as a result of improved communication and control systems but will also have new vulnerabilities. A smart grid will be better able to incorporate new forms of energy generations as well as be self-healing and more reliable. This chapter investigates a threat to wireless communication networks from a fully realized quantum computer and provides a means to avoid this problem in smart grid domains. This chapter examines the security, complexities and performance of device authentication in wireless mesh networks (WMN) using public-key encryption and then using Merkle trees. As a result, the authors argue for the use of Merkle trees as opposed to public-key encryption for authentication of devices in WMN used in smart grid applications.
Chapter Preview
Top

Introduction

Today our modern world is not so far removed from a “simpler time” when rapid transportation was by horse, water was hauled by hand and refrigeration was a sort of science fiction. Some of us will never forget the stories told by our elders of the first time they witnessed the magic of electricity. Since those times technology has advanced quickly. Presently, as a result of political turmoil, cyber-attacks and natural disasters we see how important electric power has become to our modern societies. Electricity keeps transportation systems moving in an orderly manner. It keeps water flowing. It keeps medicines and food refrigerated. In short electric power is now fundamental to our world.

The electrical power grid forms the functional foundation of our modern societies. Born in the Victorian Era the grid has served humanity well, but as our societies continue to evolve, demands are increasing, and requirements are being put on the grid that were not there a hundred years ago. In short, this infrastructure is hitting a limit and needs to be modernized. It is expected that by 2050 worldwide consumption of electricity will triple (Kowalenko, 2010). Furthermore, power grids are still susceptible to large-scale outages that can affect millions of people (U.S.-Canada Power System Outage Task Force, 2004). These are some of the motivations for the creation of an “advanced decentralized, digital, infrastructure with two-way capabilities for communicating information, controlling equipment and distributing energy” (National Institute of Standards and Technology (NIST, 2010). This infrastructure will be better able to incorporate new forms of energy generation, as well as be self-healing and more robust. Each device in a smart grid will likely have its own IP address and will use protocols like TCP/IP for communication. Thus, they will be vulnerable to similar security threats that face present day communication networks (Yan, Qian, Sharif, Tipper, 2012); however, the stakes will be much higher. That is to say, in the information technology industry the highest priority is the confidentiality, integrity and availability of information. In the electrical power industry, the highest priority is human safety. For the smart grid cyber security measures must not get in the way of safe and reliable power system operations (NIST, 2010).

Key Terms in this Chapter

One-Way Hash Function: A function that takes a variable length input and converts it to a fixed length output.

Tree: A connected acyclic graph.

Wireless Mesh Network (WMN): A wireless network topology where all nodes are peers that relay data for the network.

Public-Key Encryption: Type of encryption where encrypting and decrypting are done with different keys.

National Institute of Standards and Technology (NIST): A measurement standards laboratory and part of the U.S. Department of Commerce.

Quantum Computing: A computing system that makes use of quantum mechanics to perform operations.

Ralph Merkle: Computer scientist and pioneer in the field of cryptography.

Complete Chapter List

Search this Book:
Reset