Hardware-Oriented Authentication for Advanced Metering Infrastructure

Created by W.Langdon from gp-bibliography.bib Revision:1.3973

@Article{Mustapa:2016:ieeeTSmartG,
  author =       "Muslim Mustapa and Mohammed Niamat and 
                 Atul Prasad Deb Nath and Mansoor Alam",
  journal =      "IEEE Transactions on Smart Grid",
  title =        "Hardware-Oriented Authentication for Advanced Metering
                 Infrastructure",
  year =         "2016",
  abstract =     "The paper introduces a novel authentication scheme for
                 Advanced Metering Infrastructure (AMI) of smart grid
                 using Ring Oscillator Physically Unclonable Functions
                 (ROPUFs). The scope of the design covers the
                 communication between the utility company (UC) and the
                 smart meter (SM) network. The scheme is based on
                 hardware-oriented security and can be implemented on
                 existing smart meters. Authentication keys of 64 bits
                 are used for security level 1 (L1) communication. The
                 size of keys can increase up to 1024 bits for security
                 level 5 (L5). The cryptographic keys used in this
                 scheme are extremely difficult to model by adversaries
                 as each key is used only once. These authentication
                 keys are generated from ROPUF response bits using the
                 Hamming code. The design of the scheme ensures fault
                 tolerance as Ring Oscillator (RO) comparison pairs with
                 high frequency differences are selected to prevent bit
                 flips and only 10percent discrepancy is tolerated in
                 parity bits. The proposed scheme is highly secure and
                 efficient in terms of latency and data storage. As a
                 proof of concept, two different machine learning
                 algorithms, Support Vector Machine (SVM) and Multigene
                 Genetic Programming (MGGP), are used to show that the
                 scheme cannot be modelled by adversaries.",
  keywords =     "genetic algorithms, genetic programming",
  DOI =          "doi:10.1109/TSG.2016.2582423",
  ISSN =         "1949-3053",
  notes =        "Also known as \cite{7494646}",
}

Genetic Programming entries for Muslim Mustapa Mohammed Niamat Atul Prasad Deb Nath Mansoor Alam

Citations