Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Review of Authentication Strategies and Trends for Distributed Energy Resources (DERs)

Technical Report ·
DOI:https://doi.org/10.2172/1481592· OSTI ID:1481592
 [1];  [1]
  1. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
In this study we review literature on machine to machine (M2M) authentication and encryption pertaining to communication with grid-attached power inverters. We regard security recommendations from NIST, constrained device recommendations from CoAP, as well as influences from the existing markets. We will not focus on passwordless or multifactor schemes of user authentication, the handover/roaming authentication of mobile systems, or the group authentication of WiMAX/LTE communications. The de-facto standards for authentication and encryption are certificate-based public key cryptography and AES, respectively. While certificate-based public key cryptography is widely adopted, certificate management is seen as an Achilles heel of public key infrastructure (PKI). State of the art authentication system research includes work on certificateless authentication; however, much work in the areas of privacy preservation, efficient or lightweight systems continue to be based in public key methods. We will see efforts such as bilinear pairing, aggregate message authentication codes, one-time signatures, and Merkle trees surface and resurface with improved authentication approaches. Though research continues to produce new encryption schemes, AES prevails as a viable choice, as it can be implemented across a variety of resource constrained devices. Other lightweight encryption algorithms often employ the same fundamental addition-rotation-xor operations as AES while achieving higher efficiency, but at steep tradeoffs to security. Despite mathematical proofs of the security of cryptographic algorithms, in practice the greatest weaknesses continue to be incurred during implementation. Security researchers will find edge cases and bugs that allow unintentional behavior. In the following sections, accepted methodologies of authentication and encryption are discussed. Due diligence for securing M2M communications requires consideration during planning, design, implementation and product lifetime, as opposed to a set-it and forget-it policy. Best practices can be gleaned from published successes and failures, with no single end-all, be-all detailed solution.
Research Organization:
Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE National Nuclear Security Administration (NNSA)
DOE Contract Number:
AC04-94AL85000; NA0003525
OSTI ID:
1481592
Report Number(s):
SAND--2018-11778R; 669294
Country of Publication:
United States
Language:
English

Similar Records

Quantum key management
Patent · Mon Nov 28 23:00:00 EST 2016 · OSTI ID:1333682

Simple utility for creat1n1 and signing SSL certificates.
Software · Wed Feb 28 19:00:00 EST 2018 · OSTI ID:code-15096

Group key management
Technical Report · Fri Aug 01 00:00:00 EDT 1997 · OSTI ID:631269

Related Subjects