TY - GEN
T1 - Practical and secure Machine-to-Machine data collection protocol in Smart Grid
AU - Uludag, Suleyman
AU - Lui, King Shan
AU - Ren, Wenyu
AU - Nahrstedt, Klara
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/23
Y1 - 2014/12/23
N2 - One of the most promising growth and deployment domains of Machine-to-Machine (M2M) communications is within the context of Smart Grid and its Advanced Metering Infrastructure. Data generation, collection, monitoring, and processing potentials are expected to be greatly expanded. An accompanying security for the communications infrastructure is generally agreed to be unmet by the legacy power grid networking protocols. In this paper, we present a new customized, secure, and scalable M2M data collection protocol for the Smart Grid. We use a hierarchical architecture with intermediary nodes collecting and relaying the data securely from measurement devices back to the power operator. While the data collectors verify the integrity, they are not given access to the content, which may also pave the way for third party providers to deliver value-added services or even the data collection itself. We also report some preliminary experimental results from a testbed developed from Raspberry Pi devices to emulate the resource-constrained measurement devices.
AB - One of the most promising growth and deployment domains of Machine-to-Machine (M2M) communications is within the context of Smart Grid and its Advanced Metering Infrastructure. Data generation, collection, monitoring, and processing potentials are expected to be greatly expanded. An accompanying security for the communications infrastructure is generally agreed to be unmet by the legacy power grid networking protocols. In this paper, we present a new customized, secure, and scalable M2M data collection protocol for the Smart Grid. We use a hierarchical architecture with intermediary nodes collecting and relaying the data securely from measurement devices back to the power operator. While the data collectors verify the integrity, they are not given access to the content, which may also pave the way for third party providers to deliver value-added services or even the data collection itself. We also report some preliminary experimental results from a testbed developed from Raspberry Pi devices to emulate the resource-constrained measurement devices.
UR - http://www.scopus.com/inward/record.url?scp=84921446675&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84921446675&partnerID=8YFLogxK
U2 - 10.1109/CNS.2014.6997470
DO - 10.1109/CNS.2014.6997470
M3 - Conference contribution
AN - SCOPUS:84921446675
T3 - 2014 IEEE Conference on Communications and Network Security, CNS 2014
SP - 85
EP - 90
BT - 2014 IEEE Conference on Communications and Network Security, CNS 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE Conference on Communications and Network Security, CNS 2014
Y2 - 29 October 2014 through 31 October 2014
ER -