Authentication of Smart Grid: The Case for Using Merkle Trees

Authentication of Smart Grid: The Case for Using Merkle Trees

Melesio Calderón Muñoz, Melody Moh
Copyright: © 2020 |Pages: 20
ISBN13: 9781799817635|ISBN10: 1799817636|EISBN13: 9781799817642
DOI: 10.4018/978-1-7998-1763-5.ch015
Cite Chapter Cite Chapter

MLA

Muñoz, Melesio Calderón, and Melody Moh. "Authentication of Smart Grid: The Case for Using Merkle Trees." Cryptography: Breakthroughs in Research and Practice, edited by Information Resources Management Association, IGI Global, 2020, pp. 257-276. https://doi.org/10.4018/978-1-7998-1763-5.ch015

APA

Muñoz, M. C. & Moh, M. (2020). Authentication of Smart Grid: The Case for Using Merkle Trees. In I. Management Association (Ed.), Cryptography: Breakthroughs in Research and Practice (pp. 257-276). IGI Global. https://doi.org/10.4018/978-1-7998-1763-5.ch015

Chicago

Muñoz, Melesio Calderón, and Melody Moh. "Authentication of Smart Grid: The Case for Using Merkle Trees." In Cryptography: Breakthroughs in Research and Practice, edited by Information Resources Management Association, 257-276. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1763-5.ch015

Export Reference

Mendeley
Favorite

Abstract

The electrical power grid forms the functional foundation of our modern societies, but in the near future our aging electrical infrastructure will not be able to keep pace with our demands. As a result, nations worldwide have started to convert their power grids into smart grids that will have improved communication and control systems. A smart grid will be better able to incorporate new forms of energy generation as well as be self-healing and more reliable. This paper investigates a threat to wireless communication networks from a fully realized quantum computer, and provides a means to avoid this problem in smart grid domains. We discuss and compare the security aspects, the complexities and the performance of authentication using public-key cryptography and using Merkel trees. As a result, we argue for the use of Merkle trees as opposed to public key encryption for authentication of devices in wireless mesh networks (WMN) used in smart grid applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.