Practical and secure Machine-to-Machine data collection protocol in Smart Grid

Suleyman Uludag, King Shan Lui, Wenyu Ren, Klara Nahrstedt

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

One of the most promising growth and deployment domains of Machine-to-Machine (M2M) communications is within the context of Smart Grid and its Advanced Metering Infrastructure. Data generation, collection, monitoring, and processing potentials are expected to be greatly expanded. An accompanying security for the communications infrastructure is generally agreed to be unmet by the legacy power grid networking protocols. In this paper, we present a new customized, secure, and scalable M2M data collection protocol for the Smart Grid. We use a hierarchical architecture with intermediary nodes collecting and relaying the data securely from measurement devices back to the power operator. While the data collectors verify the integrity, they are not given access to the content, which may also pave the way for third party providers to deliver value-added services or even the data collection itself. We also report some preliminary experimental results from a testbed developed from Raspberry Pi devices to emulate the resource-constrained measurement devices.

Original languageEnglish (US)
Title of host publication2014 IEEE Conference on Communications and Network Security, CNS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages85-90
Number of pages6
ISBN (Electronic)9781479958900
DOIs
StatePublished - Dec 23 2014
Event2014 IEEE Conference on Communications and Network Security, CNS 2014 - San Francisco, United States
Duration: Oct 29 2014Oct 31 2014

Publication series

Name2014 IEEE Conference on Communications and Network Security, CNS 2014

Other

Other2014 IEEE Conference on Communications and Network Security, CNS 2014
Country/TerritoryUnited States
CitySan Francisco
Period10/29/1410/31/14

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Practical and secure Machine-to-Machine data collection protocol in Smart Grid'. Together they form a unique fingerprint.

Cite this