Quantum-Resistant Authentication for Smart Grid: The Case for Using Merkle Trees

Quantum-Resistant Authentication for Smart Grid: The Case for Using Merkle Trees

Melesio Muñoz-Calderón, Melody Moh
ISBN13: 9781668452509|ISBN10: 1668452502|ISBN13 Softcover: 9781668452516|EISBN13: 9781668452523
DOI: 10.4018/978-1-6684-5250-9.ch020
Cite Chapter Cite Chapter

MLA

Muñoz-Calderón, Melesio, and Melody Moh. "Quantum-Resistant Authentication for Smart Grid: The Case for Using Merkle Trees." Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World, edited by Amit Kumar Tyagi, IGI Global, 2022, pp. 371-395. https://doi.org/10.4018/978-1-6684-5250-9.ch020

APA

Muñoz-Calderón, M. & Moh, M. (2022). Quantum-Resistant Authentication for Smart Grid: The Case for Using Merkle Trees. In A. Tyagi (Ed.), Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (pp. 371-395). IGI Global. https://doi.org/10.4018/978-1-6684-5250-9.ch020

Chicago

Muñoz-Calderón, Melesio, and Melody Moh. "Quantum-Resistant Authentication for Smart Grid: The Case for Using Merkle Trees." In Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World, edited by Amit Kumar Tyagi, 371-395. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-5250-9.ch020

Export Reference

Mendeley
Favorite

Abstract

We are currently at the beginning of a great technological transformation of our electrical power grids. These new grids will be “smart” as a result of improved communication and control systems but will also have new vulnerabilities. A smart grid will be better able to incorporate new forms of energy generations as well as be self-healing and more reliable. This chapter investigates a threat to wireless communication networks from a fully realized quantum computer and provides a means to avoid this problem in smart grid domains. This chapter examines the security, complexities and performance of device authentication in wireless mesh networks (WMN) using public-key encryption and then using Merkle trees. As a result, the authors argue for the use of Merkle trees as opposed to public-key encryption for authentication of devices in WMN used in smart grid applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.