Owner of the document requires that the content be not remodified or redistributed.
Share |



Information-Theoretic Approach to Authentication Codes for Power System Communications
Author:
Matsumoto, T.; Kobayashi, T.; Katayama, S.; Fukushima, K.; Sekiguchi, K.
Year:
2010
Abstract:

This paper appears in: Transmission and Distribution Conference and Exposition, 2010 IEEE PES
Issue Date: 19-22 April 2010
On page(s): 1 - 7
Location: New Orleans, LA, USA
Print ISBN: 978-1-4244-6546-0
The purpose of this study is to realize a practical method of providing cyber security for power system communications. Considering communication requirements needed for Smart Grids, power system communications can be classified into five main categories: real-time protection, supervisory control and data acquisition (SCADA), remote access, demand management system (DMS) and advanced metering infrastructure (AMI) . This paper describes a concept and method of effectively applying information-theoretic cryptography to these power system communications. From the requirements of real-time communication and long-term maintenance of such systems, we explore a novel scheme based on unconditionally secure authentication codes (A-codes) having short authenticators (authentication tags) and a feasible number of keys, and have developed a data format for the scheme. The efficiency of the scheme is illustrated using several examples and experimental results.

Document Type:
Technical paper
Source:
IEEE