Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

PUF-Based Two-Factor Authentication Protocol for Securing the Power Grid Against Insider Threat

Conference · · 2022 IEEE Kansas Power and Energy Conference (KPEC)
 [1];  [1];  [1];  [2];  [1];  [1];  [1]
  1. Georgia Institute of Technology,School of Electrical and Computer Engineering,Atlanta,Georgia
  2. Georgia Institute of Technology,School of Computer Science,Atlanta,Georgia

Recent advances in smart grid technologies have enabled additional distributed control paradigms that allow more efficient and reliable operation. However, this creates new security concerns for the grid, such as attackers using spoofed grid control devices to generate false measurements. This paper introduces a two-factor authentication protocol leveraging standard public-key cryptography as one authentication factor and a hardware-based fingerprint, known as a Physical Unclonable Function, as a second authentication factor. This protocol incurs a small overhead and prevents cyber-attacks even when an adversary is able to compromise the cryptographic keys stored in the non-volatile memory of an intelligent control device.

Research Organization:
Georgia Institute of Technology, Atlanta, GA (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
CR0000004
OSTI ID:
1997022
Report Number(s):
DOE-GATECH-00004-3
Journal Information:
2022 IEEE Kansas Power and Energy Conference (KPEC), Conference: 2022 IEEE Kansas Power and Energy Conference (KPEC) Manhattan, KS, USA 25-26 April 2022
Country of Publication:
United States
Language:
English

References (6)

PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey journal June 2022
PUF Modeling Attacks on Simulated and Silicon Data journal November 2013
The rust language conference October 2014
Bad Data Injection Attack Propagation in Cyber-Physical Power Delivery Systems conference September 2018
Certificate-based sequential aggregate signature conference March 2009
The 2015 Ukraine Blackout: Implications for False Data Injection Attacks journal July 2017