much faster, and it is the only integrity protection
scheme that meets the speed requirement.
Since the proposed integrity protection method
uses a symmetric encryption algorithm, its security
highly depends on the initial key agreement, rekey-
ing, and revocation. To this end, our future research
will be focused on secure and efficient key manage-
ment between PMUs and PDCs in transmission and
distribution substations.
REFERENCES
Abuadbba, A. and Khalil, I. (2015). Wavelet based stegano-
graphic technique to protect household confidential
information and seal the transmitted smart grid read-
ings. Information Systems, 53:224–236.
Abuadbba, A., Khalil, I., Ibaida, A., and Atiquzzaman, M.
(2016). Resilient to shared spectrum noise scheme for
protecting cognitive radio smart grid readings- BCH
based steganographic approach. Ad Hoc Networks,
41:30–46.
Adamiak, M., Schiefen, M. J., Schauerman, G., and Ca-
ble, B. (2014). Design of a priority-based load shed
scheme and operation tests. IEEE Transactions on In-
dustry Applications, 50(1):182–187.
Barker, E., Barker, W., Burr, W., Polk, W., and Smid, M.
(2016). Recommendation for key management part
1: General (revision 4). NIST special publication,
800(57).
Bellare, M., Goldwasser, S., and Micciancio, D. (1997).
“pseudo-random” number generation within crypto-
graphic algorithms: The DDS case. In Annual In-
ternational Cryptology Conference, pages 277–291.
Springer.
Birr-Pixton, J. (2015). Benchmarking mod-
ern authenticated encryption on e1 devices.
https://jbp.io/2015/06/01/modern-authenticated-
encryption-for-1-euro/.
Briat, C. (2011). Convergence and equivalence results for
the Jensen’s inequality–Application to time-delay and
sampled-data systems. IEEE Transactions on Auto-
matic Control, 56(7):1660–1665.
Cogranne, R. and Retraint, F. (2013). An asymptotically
uniformly most powerful test for LSB matching de-
tection. IEEE transactions on information forensics
and security, 8(3):464–476.
Cohen, A. S. and Lapidoth, A. (2002). The gaussian wa-
termarking game. IEEE Transactions on Information
Theory, 48(6):1639–1667.
Dworkin, M. J. (2007). Recommendation for block cipher
modes of operation: The CMAC mode for authenti-
cation. NIST special publication 800-38b, National
Institute of Standards and Technology (NIST).
Fan, Y., Zhang, Z., Trinkle, M., Dimitrovski, A. D., Song,
J. B., and Li, H. (2015). A cross-layer defense mecha-
nism against GPS spoofing attacks on PMUs in smart
grids. IEEE Transactions on Smart Grid, 6(6):2659–
2668.
Gilad, Y. and Herzberg, A. (2014). Off-path TCP injection
attacks. ACM Transactions on Information and Sys-
tem Security (TISSEC), 16(4):13.
Guo, H., Li, Y., and Jajodia, S. (2007). Chaining wa-
termarks for detecting malicious modifications to
streaming data. Information Sciences, 177(1):281–
298.
IEC 61850-90-5 (2012). Use of IEC 61850 to transmit syn-
chrophasor information according to IEEE C37. 118.
Khan, E., El-Kharashi, M. W., Gebali, F., and Abd-El-Barr,
M. (2007). Design and performance analysis of a uni-
fied, reconfigurable HMAC-Hash unit. IEEE Trans-
actions on Circuits and Systems I: Regular Papers,
54(12):2683–2695.
Krawczyk, H. (2001). The order of encryption and authenti-
cation for protecting communications (or: How secure
is SSL?). In Annual International Cryptology Confer-
ence, pages 310–331. Springer.
Kundu, P. and Pradhan, A. K. (2014). Synchrophasor-
assisted zone 3 operation. IEEE Transactions on
Power Delivery, 29(2):660–667.
L’Ecuyer, P. and Simard, R. (2007). TestU01: A C li-
brary for empirical testing of random number gener-
ators. ACM Transactions on Mathematical Software
(TOMS), 33(4):22.
Martin, K., Hamai, D., Adamiak, M., Anderson, S., Be-
govic, M., Benmouyal, G., Brunello, G., Burger, J.,
Cai, J., Dickerson, B., et al. (2008). Exploring the
IEEE standard C37. 118–2005 synchrophasors for
power systems. IEEE transactions on power delivery,
23(4):1805–1811.
Martin, K., Zwergel, A., and Kapostasy, D. (2015).
PMU installation and configuration requirements,
Public Manual, version no. 1.0, MISO energy.
https://www.misoenergy.org/Library/Repository/.
Mouha, N., Mennink, B., Van Herrewege, A., Watanabe, D.,
Preneel, B., and Verbauwhede, I. (2014). Chaskey: an
efficient MAC algorithm for 32-bit microcontrollers.
In International Workshop on Selected Areas in Cryp-
tography, pages 306–323. Springer.
Nakassis, A. (1988). Fletcher’s error detection algorithm:
how to implement it efficiently and how to avoid the
most common pitfalls. ACM SIGCOMM Computer
Communication Review, 18(5):63–88.
Oechslin, P. (2003). Making a faster cryptanalytic time-
memory trade-off. In Annual International Cryptol-
ogy Conference, pages 617–630. Springer.
Pappu, V., Carvalho, M., and Pardalos, P. (2013). Opti-
mization and security challenges in smart power grids.
page 157. Springer.
Plumstead, J. B. (1983). Inferring a sequence generated
by a linear congruence. In Advances in Cryptology–
CRYPTO, pages 317–319.
Rosenbaum, U. (1993). A lower bound on authentication
after having observed a sequence of messages. Jour-
nal of Cryptology, 6(3):135–156.
Seyed Reza, F., Vanfretti, L., Ruiz-Alvarez, A., Mahmood,
F., Hooshyar, H., and Cairo, I. (2016). An IEC 61850-
90-5 gateway for IEEE C38. 118.2 synchrophasor data
transfer. In IEEE PES General Meeting, 17th to 21th
A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid
41