Securing RDS broadcast messages for smart grid applications

Monageng Kgwadi, Thomas Kunz
2010 Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10  
Efforts to reduce peak electrical demand has led to the introduction of demand response programs for residences. Demand response programs allow customers to reduce or shift their electrical consumption from peak periods in response to dynamic prices of electricity. Utility companies broadcasts the prices to the customers who then respond by reducing consumption during peak periods or shift the consumption to off-peak periods. Similarly, direct load control programs entice consumers with special
more » ... rates or other incentives for allowing the utility to control load (typically air conditioning) for a number of days per year. Both uses require a ubiqituous and cost-effective communication network to allow utilities to communicate with users and appliances. The Radio Data System (RDS) has been identified as one strong candidate technology. However, security concerns arise due to the wireless nature of the communication channel. Source authentication is crucial in demand response to ensure that only authenticated messages are responded to. This report presents evaluations of cryptographic methods that could be employed to offer source authentication over the RDS network. Simulations are used to determine the impact on the network performance by employing digital signatures to allow source authentication. The simulations were calibrated with data collected in Ottawa, Canada, in particular to model signal propagation characteristics. While different environments experience different path losses, the relative comparisons are not impacted by this difference, however. The authentication schemes studied all provide strong authentication against attackers who attempt to forge signatures without knowledge of private keys (which are held at the transmitter). The information exposed in the transmitted messages will not help an attacker in forging future messages. And as messages are time-sensitive and the senders and receivers in the network coarsely time-synchronized, replay-attacks are prevented as well. This is different from shared-key/secret-key schemes such as the one employed in Zigbee, where exposure of the secret key on the receiver side (using bit sniffing or other techniques to access the non-volatile memory on the receiver) compromises the security/authentication of messages. The report presents comparisons of the security offered by the protocols, the bandwidth overhead, computational costs and message reception probability. Our simulation results show that, up to a distance of 90 km, all authentication schemes do not affect message reception by the receivers. Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE. ECDSA and HORSE outperform BiBa in terms of message reception beyond 90 km and the difference between the two is not significant. ECDSA however offers higher security than HORSE and BiBa but at the cost of increased computational complexity, in particular at the receivers. In addition, ECDSA has the highest bandwidth overhead. i Carleton University,
doi:10.1145/1815396.1815666 dblp:conf/iwcmc/KgwadiK10 fatcat:d7husqma45gs7oegbqt472nc5y