Authentication of Smart Grid: The Case for Using Merkle Trees

Authentication of Smart Grid: The Case for Using Merkle Trees

Melesio Calderón Muñoz, Melody Moh
ISBN13: 9781522518297|ISBN10: 1522518290|EISBN13: 9781522518303
DOI: 10.4018/978-1-5225-1829-7.ch007
Cite Chapter Cite Chapter

MLA

Muñoz, Melesio Calderón, and Melody Moh. "Authentication of Smart Grid: The Case for Using Merkle Trees." Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, IGI Global, 2017, pp. 117-136. https://doi.org/10.4018/978-1-5225-1829-7.ch007

APA

Muñoz, M. C. & Moh, M. (2017). Authentication of Smart Grid: The Case for Using Merkle Trees. In M. Ferrag & A. Ahmim (Eds.), Security Solutions and Applied Cryptography in Smart Grid Communications (pp. 117-136). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch007

Chicago

Muñoz, Melesio Calderón, and Melody Moh. "Authentication of Smart Grid: The Case for Using Merkle Trees." In Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, 117-136. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1829-7.ch007

Export Reference

Mendeley
Favorite

Abstract

The electrical power grid forms the functional foundation of our modern societies, but in the near future our aging electrical infrastructure will not be able to keep pace with our demands. As a result, nations worldwide have started to convert their power grids into smart grids that will have improved communication and control systems. A smart grid will be better able to incorporate new forms of energy generation as well as be self-healing and more reliable. This paper investigates a threat to wireless communication networks from a fully realized quantum computer, and provides a means to avoid this problem in smart grid domains. We discuss and compare the security aspects, the complexities and the performance of authentication using public-key cryptography and using Merkel trees. As a result, we argue for the use of Merkle trees as opposed to public key encryption for authentication of devices in wireless mesh networks (WMN) used in smart grid applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.