das2012
das2012
is currently available to address communication for an example field environment using the AMI
network security, the smart grid environment system. Finally, we conclude the article with GAA uses authenti-
requires unique security capabilities. For exam- future research directions.
cation and key
ple, an electric or gas meter in the advanced
metering system (a so-called smart meter) is a agreement (AKA) for
device with little processing power, and typically
RELATED WORK
mutual authentica-
only 4–12 kbytes of RAM and 64–256 kbytes of Key management has been an area of consider-
flash memory. These low-cost devices may also able attention, particularly in browser-based web tion. While this archi-
make use of personal area wireless network applications. Most notably, initiatives such as tecture allows the
technology such as Zigbee, and often are con- OAuth [2], OpenID [3], SAML [4], and others
cellular operators to
nected to the backhaul via low bandwidth links. have emerged to provide single sign-on (SSO)
The link characteristics can also vary depending capabilities. OAuth is a popular SSO enabler bootstrap other ser-
upon the activity state of the meter. For instance, and provides mechanisms for end users to autho- vices the client wants
smart meters may periodically wake up and sync rize third-party access to networked resources
with the network to save power rather than without requiring static credentials to be shared to use, it does not
always being active. Additional device require- with third parties. Another popular SSO tech- allow authentication
ments include: nology is OpenID, which has gained consider-
mechanisms other
• The support of multihop networks using able momentum with commercial web services.
mesh topology (e.g., to extend backhaul It is employed by several prominent web service than AKA
reach back) providers such as Google, Yahoo!, AOL, and credentials.
• The support of multiple link layer technolo- Facebook, among others. OpenID is an open,
gies decentralized access control mechanism that
Given the low-bandwidth nature of the commu- allows users to sign-on to several different ser-
nication links and the comparatively low capabil- vices with a single digital identity. It requires
ity of the smart meters themselves, these regular logon to the subscriber’s service provider
requirements demand that protocol overhead to access services provided by each service
and performance be optimized. provider. However, security concerns regarding
Advanced meters can also be used for other vulnerabilities associated with OpenID have
purposes besides simple metering data. Ameri- begun to surface. In [5], the authors address per-
can National Standards Institute (ANSI) C12.22 ceived limitations, such as symmetric cryptogra-
allows advanced meter peering via relay or con- phy, length of time the authentication status is
centrators. Other applications, such as Con- stored in relay providers and OpenID providers,
strained Application Protocol (CoAP), an and vulnerabilities to man-in-the-middle attacks.
emerging IETF standard , should be able to run Secure Assertion Markup Language (SAML)
simultaneously on a single meter. While these is yet another technique to provide authentica-
are very attractive features and make the tion and authorization data between secure
advanced meter economically more viable, they domains such as enterprise networks. SAML is
add additional challenges to security; for exam- defined in XML and uses federated identity
ple, each application needs to be authenticated management techniques to ease authentication
and also needs to preserve the integrity of sys- and authorization tasks across domains under
tem data (e.g., billing system). While some ven- the same federation. In [6], the authors identify
dors may provide end-to-end application several security flaws with respect to confiden-
encryption capabilities in a proprietary way, the tiality, bilateral authentication, integrity, and
adoption of this non-standard solution is very user tracking that could lead to potential vulner-
minimal. able implementations of SAML.
Therefore, in recent years, several efforts None of above mechanisms provides a fully
have started addressing the smart grid security unified key management framework that could
issues. Each of them identified that the smart enable multiple communication layers and pro-
grid introduces a different set of security require- tocols to work across layers without having dedi-
ments, thus necessitating new techniques and cated key management at each layer or protocol.
protocols for this environment. To meet these While other approaches exist, such as adding
emerging requirements, we propose a unified network access authentication within Kerberos
key management framework with two models by attempting to integrate with Extensible
appropriate for smart grid and then show how Authentication Protocol (EAP) [7], these tech-
the framework can be realized using existing niques require modified EAP methods in order
protocols. Our work is motivated by two guiding to interwork with Kerberos.
principles: A commonly used mechanism in cellular net-
• Avoid multilayer authentication works is called generic authentication architec-
• Adapt to a multilayer and multiprotocol ture (GAA), which is a Third Generation
environment Partnership Project (3GPP) solution for authen-
Our approach is a simple unified key manage- tication and key agreement between clients and
ment framework that addresses certain smart services. There are two ways by which GAA can
grid security requirements with direct applica- be used: i) based on a shared secret between the
tion to AMI networks. client and the server (a.k.a., Generic Bootstrap-
The rest of the article is organized as follows. ping Architecture (GBA)), and ii) based on pub-
We present related work, and describe our pro- lic-private key pair and digital certificates. GAA
posed models and framework. We show how uses Authentication and Key Agreement (AKA)
these models can be realized by using existing for mutual authentication. While this architec-
protocols and extensions. We provide a test plan ture allows the cellular operators to bootstrap
description with initial implementation results other services that the client wants to use, it
KEY MANAGEMENT ALTERNATIVES between ANSI C12.22 hosts and ANSI 12.22
Rekeying EMSK will master relays where the host is a PaC and the
Many different link-layer technologies may be master relay is a PANA authentication agent
replace all keys used for connecting smart meters to the AMI (PAA).
derived from it. network including Ethernet, PLC, ZigBee, Wi- Both of the above architectural alternatives
Therefore, from an Fi, and third/fourth generation (3G/4G). There- may require an extension of EAP to support
fore, considerations are needed for how the application-level authentication to bootstrap
optimization point of EAP-based unified key management scheme can application-layer ciphering since the current
view, it is desirable work with multiple link-layer technologies that applicability of EAP is for network access
may manage link-layer-specific keys in different authentication. Such extensions of EAP applica-
to design a system ways. There are two alternative methods. bility are possible without necessarily requiring a
such that the fre- First architectural alternative: EAP is used modification of EAP itself. The next subsections
quency of EMSK for both network access authentication and boot- describe additional considerations needed to
strapping application-layer ciphering. In this extend EAP applicability to fit our unified key
rekeying can be case, EAP may be carried out either at the link- management mechanism.
reduced as much as layer using a link-layer specific EAP transport,
or at the network layer using PANA. When CONFIGURATION
possible. There are using link-layer key management with PANA, The EAP-based UKMF requires end hosts to
three independent there is two cases to consider. configure information in order to bootstrap
solutions to address •In the first case, link-layer ciphering may be application-layer ciphering. Specifically, the fol-
disabled or enabled independent of PANA use. lowing information needs to be configured:
the rekey issue. In this case, cryptographic or non-cryptographic • The transport identifier of an EAP authen-
access control is provided at the IP layer or ticator that supports bootstrapping applica-
above. An example cryptographic access control tion-layer ciphering
at the IP layer is IPsec. An example of non-cryp- • A set of identifiers of applications that sup-
tographic access control at the IP layer is Source port bootstrapping application-layer cipher-
Address Validation Improvements (SAVI). In ing from EAP
this case, link-layer ciphering may be enabled • For each application that supports boot-
using a link-layer specific authentication and key strapping application-layer ciphering from
agreement mechanism that may not support EAP, the identifier(s) of the application
EAP, such as Universal Mobile Telecommunica- endpoint(s) in the network
tions System (UMTS) AKA. This case belongs As part of our future work, we plan to identi-
to the partially unified model in that UKMF is a fy candidate solutions that enable such informa-
part of key management for application-layer tion to be dynamically configured.
ciphering and optionally for IP layer ciphering,
but not part of a key management for link-layer REKEYING APPLICATION-LAYER
ciphering. CIPHERING KEYS
•In the second case, link-layer ciphering is
bootstrapped using PANA in which a link-layer In the EAP-based unified key management
master key is securely established between two mechanism, without an additional rekey mecha-
endpoints of the link using the PANA security nism, rekeying application-layer ciphering keys
association. The link-layer master key is used by derived from EMSK is carried out via EAP re-
the secure association protocol to establish link- authentication. Rekeying EMSK will replace all
layer ciphering keys. The link-layer master key keys derived from it. Therefore, from an opti-
may be an individual key or a group key depend- mization point of view, it is desirable to design a
ing on the trust model of the link layer. When system such that the frequency of EMSK rekey-
the link-layer master key is an individual key, the ing can be reduced as much as possible. There
key is used solely between the endpoints of a are three independent solutions to address the
particular link. An example of such an individual rekey issue.
key is PEMK (PaC [PANA client]-EP [enforce- The first solution is to use EAP extensions
ment Point] master key). When a group key is for EAP re-authentication protocol (ERP) for
used, all nodes that possess the same group key EAP re-authentication. Since ERP operates
are considered as trusted. A typical link-layer without rekeying EMSK, this solution can avoid
technology that uses a group key is ZigBee. The EMSK rekeying even when the fully unified
group key needs to be securely delivered to each model is used and employs EAP re-authentica-
node once it successfully authenticates to the tion for network access.
network. PANA may be used for protecting the The second solution is to use the second key
group key delivery. This case belongs to the fully management alternative (i.e., using EAP carried
unified model. by PANA for bootstrapping application-layer
Second architectural alternative: EAP is used ciphering only). This solution can avoid EMSK
for bootstrapping application-layer ciphering rekey when an end host changes its network
only. PANA is used as the EAP transport for point of attachment since EAP is not used for
application-level authentication. Note that network access, and PANA has its own mobility
IKEv2 is another EAP transport over UDP. management mechanism to deal with the end
Access control at the link layer or network layer host’s IP address change.
may be performed independent of this EAP for The third solution is to generate multiple sets
bootstrapping application-layer ciphering. This of application-layer ciphering keys (instead of a
architecture belongs to the partially unified single set of application-layer ciphering keys) for
model. An example use case of this model is for each function of a given application and change
bootstrapping ANSI C12.22 ciphering keys the effective set of application-layer ciphering
Power line
DR signal
In-home
display
Wide PV,
area Communication link Smart battery
DRMS MDMS Home
network meter server
Home
appliances
Utilities office
Home
Metering data
[9] Y. Ohba, Ed., “Protocol for Carrying Authentication for MITSURU KANDA ([email protected]) is a senior
Network Access (PANA),” http://www.ietf.org/rfc/ research scientist in Toshiba Corporate Research & Devel-
rfc5191.txt, 2008. opment Center. He received B.E. and M.E. degrees in
[10] C. Kaufman, “Internet Key Exchange (IKEv2) Protocol,” information sciences from Tohoku University in 1997 and
http://www.ietf.org/rfc/rfc5996.txt, 2005. 1999. His research interests are IPv6 and security. He is
[11] ZigBee Alliance, “ZigBee Smart Energy Profile™ 2.0 an author of the Linux IPv6/IPsec stack and a member of
Technical Requirements Document,” 2010. the racoon2 project (an open source IKE implementa-
[12] J. Salowey, “Specification for the Derivation of Root tion).
Keys from an Extended Master Session Key (EMSK),”
http://www.ietf.org/rfc/rfc5295.txt, 2008. DAVID FAMOLARI ([email protected]) is a vice presi-
dent at Rutberg & Company, a technology-focused
BIOGRAPHIES investment bank specializing in the mobile and wireless
sector. He serves as a venture advisor to Paladin Capital
S UBIR D AS [M] ([email protected]) is a director and Group, is a founding partner at Day2 Ventures, a co-
senior scientist in the mobile networking department of founder of GoodCompany Ventures, and sits on the
Applied Communication Sciences, New Jersey. His current Technology Advisory Board at Ben Franklin Technology
research interests include mobile networking, network Partners. Previously, he spent more than 12 years in
security and mobility, AMI networks, IP multimedia subsys- advanced R&D at Telcordia Technologies. He earned an
tem, and ad hoc networks. He is very active in several stan- M.B.A. from the Wharton School at the University of
dards and holds leadership positions in IEEE 802. He is a Pennsylvania, and M.S. and B.S. degrees in electrical
recipient of an IEEE Region 1 award and a member of the engineering from Rutgers University.
IEEE Communications Society.
S AJ A L K . D A S ( d a s @ u t a . e d u ) i s a U n i v e r s i t y D i s t i n -
Y OSHIHIRO O HBA ([email protected]) is a chief guished Scholar Professor of Computer Science and
research scientist in Toshiba Corporate R&D Center. He Engineering at the University of Texas at Arlington,
received B.E., M.E., and Ph.D. in information and computer where he is also the director of the Center for Research
sciences from Osaka University in 1989, 1991, and 1994, in Wireless Mobility and Networking. His current
respectively. He is an active member in IEEE 802 and IETF research interests include mobile and pervasive com-
for standardizing security and mobility protocols. He is a puting, wireless sensor networks, energy and sustain-
main contributor to RFC 5191 (PANA-Protocol for Carrying ability, smart environments and cyber-physical systems,
Authentication for Network Access). He received the IEEE security and privacy, social networks, applied graph
Region 1 Technology Innovation Award in 2008. theory, and game theory.