Energy Efficient Security Algorithm For Power Grid Wide Area Monitoring System
Energy Efficient Security Algorithm For Power Grid Wide Area Monitoring System
Abstract—Modern power grid is the most complex human-made ergy management systems (EMS). Typical SCADA and EMS
system, which is monitored by wide-area monitoring system have slow data update rate and cannot meet performance de-
(WAMS). Providing time-synchronized data of power system
operating states, WAMS will play a crucial role in next generation mand of a smart grid.
smart grid protection and control. WAMS helps secure efficient Thanks to the rapid development of synchronized global po-
energy transmission as well as reliable and optimal grid manage- sitioning system (GPS), synchronized-measurement technology
ment. As the key enabler of a smart grid, numerous sensors such
as PMU and current sensors transmit real-time dynamic data, has been developed since the 1970s for emerging wide-area
which is usually protected by encryption algorithm from malicious monitoring system (WAMS) [1]. WAMS is essentially a sensor
attacks, over wide-area-network (WAN) to power system control
centers so that monitoring and control of the whole system is network deployed over a vast geographical area overlaying the
possible. Security algorithms for power grid need to consider both power network infrastructure. The backbone of this network is
performance and energy efficiency through code optimization high speed Internet. Attempting to monitor the entire power
techniques on encryption and decryption. In this paper, we take
power nodes (sites) as platforms to experimentally study ways system dynamics, WAMS synchronizes all monitored data by
of energy consumptions in different security algorithms. First, time-stamping GPS coordinated universal time (UTC) so as to
we measure energy consumptions of various security algorithms globally validate measurements regardless of measuring loca-
on CrossBow and Ember sensor nodes. Second, we propose an
array of novel code optimization methods to increase energy tions. The key component in WAMS is the phasor measurement
consumption efficiency of different security algorithms. Finally, unit (PMU). Providing time-synchronized data of power system
based on careful analysis of measurement results, we propose a set
of principles on using security algorithms in WAMS nodes, such operating states, WAMS will play crucial role in next generation
as cryptography selections, parameter configuration, and the like. smart grid protection and control. WAMS will help secure effi-
Such principles can be used widely in other computing systems cient energy transmission as well as reliable and optimal grid
with energy constraints.
management.
Index Terms—Cryptographic algorithm, power grid, sched- Security is a critical issue in the design and operation of
uling, security, smart grid, wide-area monitoring system.
WAMS. As the key enabler of a smart grid, numerous sensors
such as PMU and current sensors transmit real-time dynamic
I. INTRODUCTION data over a wide-area network (WAN) to power system control
centers so that monitoring and control of the whole system is
lead to higher IC complexity, which causes the increase of static and energy consumption in Section III. In order to provide the
power consumption and short circuit power consumption. From insight of the impact of security algorithms, we measure the en-
the energy consumption aspect, the higher level of design can ergy consumptions of several well-known security algorithms
provide higher potential solution space for energy reduction and on two kinds of WAMS nodes in Section IV. Then, we present a
lower cost [2], [4]. Recently, there is a new trend: the focus of code optimization method to reduce energy consumption of se-
energy optimization research is transferring to energy optimiza- curity algorithms in Section V. Finally, in Section VI, we pro-
tion on application level. Energy optimizations on the behavior vide a set of principles on applying security algorithms to en-
level has certain limitations due to the poor flexibility of hard- ergy-constrained systems, such as WAMSs.
ware implementations. Thus, for an energy-constrained system,
we can satisfy the security requirements using software imple-
II. RELATED WORK
mentations rather than hardware implementations.
Basic security algorithms, e.g., cryptography algorithms, are A large amount of works have been done on energy consump-
the fundamental parts of any security system. A wide variety of tion of security algorithms and protocols in common network
security protocols and standards are developed based on basic environment, such as the energy consumption of the SSL pro-
security algorithms. In security algorithms, users can set the tocol in PC networks, the energy consumption of WEP in Wi-Fi
values of some parameters, such as key length and application networks, etc. However, there are few research on the energy
mode, which facilitate the energy optimization on the applica- consumption of security algorithms in WAMSs.
tion level. Therefore, we believe that the balance between se- Recently, most of the energy consumption studies related to
curity and energy consumption can be achieved by properly WAMSs are based on simulations. The energy consumption is
using the existing security algorithms. Meanwhile, due to the usually measured based on the CPU computation time and the
high flexibility of software implementations, we can reduce the number of data packets. However, this is a coarse grain approxi-
energy consumption of executing security algorithms through mation. In simulation aspect, network simulations, such as NS2,
code optimizations. Furthermore, when determining the con- TOSSIMM [5], and Atemu [6], can properly simulate the behav-
figuration and the selection of security algorithms, one has to iors of the network protocols, but they are not able to simulate
consider not only the power consumption of CPUs, but also the the single node well. Thus, the method mentioned above is not
impact of the implementation on other components. Thus, the suitable for our study on the energy consumption of security al-
objective of energy optimizations is to have: 1) longer system gorithms in WAMSs.
lifetime and 2) lower system total energy consumption. In the There are some instruction-level energy evaluation models
rest of this paper, we study the security algorithms implemented for WAMSs, such as AEON [7], and PowerTOSSIM [8]. These
in an energy-constrained system on our WAMS platform. The two models first measure the currents of the sensor nodes, fol-
reasons of using the WAMS platform as our platform are as fol- lowed by partitioning the measured currents to different code
lows. segments and different components of sensor nodes. Finally,
• WAMS is a typical energy-constrained system. The com- the energy consumption of a certain code segment or a certain
plexity of the hardware/software functions in WAMSs has component is calculated. However, these models are not suit-
a large impact on the lifetimes of sensor nodes in WAMSs. able for commercial WAMS sensors, due to the fact that most
• Compared with traditional energy-constrained systems, of the manufacturers only provide software in the form of “black
WAMSs face larger challenges. The security requirement box.” Even obtaining the source code, inserting instruction for
of WAMSs covers every aspect of system security, such as measuring is not convenient.
confidentiality, integrity availability, which makes it more To obtain the energy characteristics of security algorithms,
suitable to study the characteristics of different security there are some studies based on physical measurement. Wander
algorithms. et al. [9] has measured the energy consumption of the RSA
• Executing security algorithms on sensor nodes of a WAMS and ECC on MICA2DOT sensor nodes. However, this method
impacts not only the energy consumption of CPUs, but also cannot be implemented with the whole version of code into the
the energy comsuption of other components. WAMS nodes. Gupta et al. [10] has pointed out that the size of
In this paper, we take power nodes (sites) as platforms to ex- memory consumption of standard code is close to 4 KB for cryp-
perimentally study ways of energy consumptions in different se- tography algorithms such as DES. This means that the memory
curity algorithms. First, we design a micro-power measurement will not be enough to directly implement standard algorithms
circuit to measure energy consumptions of various security al- on some WAMS nodes.
gorithms on CrossBow and Ember sensor nodes. Second, we WAMS is an autonomic network consisting of a large number
propose an array of novel code optimization methods to increase of sensor nodes deployed in the monitoring area. The sensor
energy consumption efficiency of different security algorithms. nodes are connected by an ad hoc network and communicate
Finally, based on careful analysis of measurement results, we with the sink through multihop, as shown in Fig. 1. In a WAMS,
propose a set of principles on using security algorithms in sensor the sensor nodes are the basic parts of the implementation of
network nodes, such as cryptography selections, parameter con- information sensing and communication. Compared to other
figuration, and the like. Such principles can be used widely in wireless network, the WAMS is a specific application oriented
other computing systems with energy constraints. network, which has characteristics of large size and dynamic
The arrangement of this paper is as the following: we first topology.
introduce the related work of this topic in Section II, followed A sensor node in WAMS is a system with multifunction, such
by the analysis of some basic issues related to WAMS security as data collection, computation, and communication. Compared
Authorized licensed use limited to: University of Delhi. Downloaded on November 22,2024 at 10:09:07 UTC from IEEE Xplore. Restrictions apply.
QIU et al.: ENERGY EFFICIENT SECURITY ALGORITHM FOR POWER GRID WIDE AREA MONITORING SYSTEM 717
TABLE I
MAJOR SECURITY THREATS IN A WAMS
have thus been continuously enhanced and are now being de-
ployed in substations. The PMU data are collected in a phasor
data concentrator (PDC) to facilitate real-time power system sit-
uation awareness, analysis, operation, protection, and control
[13]–[15]. With large scale integration of variable renewable
energy integration, PMU-based smart grid will ensure power
system stability and reliability.
TABLE II
ENERGY CONSUMPTIONS ON CROSSBOW MICA2 NODES
TABLE III
ENERGY CONSUMPTIONS ON EMBER NODES
Fig. 4. The energy consumptions when running different security algorithm on a CrossBow node. (a) On the CPU. (b) On the RF module. (c) On the whole node.
In (b), the three curves for RC5, DES, and AES overlap into the lower curve, and the other four are overlapped into the upper curve. In (c), RC5 and DES are
overlapped into the lowest curve, above which is the AES curve. SHA-1 + AES is the highest curve, and the left three overlap into the curve just below it.
The energy consumption on the RF module with 4 different Hash Algorithm (SHA) was published as federal informa-
message lengths is shown in Fig. 3. tion processing standard in 1993 and SHA-1 is a revised
For the Ember node, the energy consumption on the RF version. In Fig. 4(a), “ - ,” “ - ,” and
module increases linearly as the length of message increases. “ - ” are three different combinations of encryption
For the CrossBow node, when the length of the message is and integrity protection service [25]. The results show that
between 8 to 24 bytes, the energy consumption increases the energy consumption of a combination is far larger than
linearly. However, when the length of message increases from a single service. This reflects the linear relationship between
24 bytes to 32 bytes, the energy consumption has a significant the energy consumption and the strength of the security ser-
increase, about 64.7%. The reason is that the XMesh protocol vice. For the message with a length of 32 bytes, the highest
implemented in the CrossBow node defines the maximum size energy consumption on CPU is the one when running the
of the data packet to be 29 bytes. A 32 bytes data needs to be “ - ” security scheme, 493 J, 17.6 times higher
separated into two packets, leading to more energy consump- compared to the baseline energy consumption. However, this
tion. And the maximum size of the data packet on the Ember part of energy consumption just accounts for 20.2% of the
node is 68 bytes. It can send message with the length from 8 to total energy consumption, which is 2443 J. Thus, the energy
32 bytes in just one packet. consumption when executing the security algorithm will not
impact the total energy consumption of a node at large.
A. Energy Consumption of Security Algorithm on CrossBow The energy consumptions on the RF module when executing
different security algorithms on a CrossBow node are shown
In this experiment, we measure the energy consumption of in Fig. 4(b). Comparing with Table II, we find out that imple-
the CrossBow node when running different security algorithms menting these three encryptions (RC5, DES, and AES) individu-
on messages with four different lengths. We set the energy con- ally will not increase the energy consumption on the RF module,
sumption of the CrossBow node with no security service as the due to the fact that the lengths of messages do not increase after
baseline consumption, and measure the energy consumption of the encryption. However, the energy consumption increases by
different security algorithms. We also compare the energy con- 98.0% on average when executing the SHA-1 algorithm. The
sumption on the CPU, the RF module, and the whole node. reason is that the SHA-1 algorithm adds 20 bytes of abstract
The energy consumptions on the CPU when running different information, causing additional work load to the RF module.
security algorithms are shown in Fig. 4(a). For example, when Furthermore, in some cases, the extended message may need
running the SHA-1 algorithm, the energy consumption on the multiple packets for transmitting, which requires more energy
CPU is 153 J, 6.9 times the energy consumption when the consumption.
CPU executes the data processing program. This means that the Finally, we measure the energy consumptions of the whole
computational complexity of a security algorithm is far more node, when running different security algorithms. The results
complex than the one of an application. Since the step length are shown Fig. 4(c). Compared with the “ ” in Table II,
of the SHA-1 algorithm is 64 bytes, the energy consumptions running the RC5, the DES, and the AES individually, the en-
of this algorithm is the same, when the message lengths are be- ergy consumption increases by 6.6%, 4.0%, and 20.2%, respec-
tween 8 to 32 bytes. Similarly, the step length of the AES al- tively. And the Hash algorithm increases the energy consump-
gorithm is 128 bytes, the energy consumption with those four tion significantly, 104.3% on average, with the SHA-1 algorithm
different lengths messages are all 339 J. On the other hand, on messages with four different lengths. This means that the life-
the step lengths of both the RC5 and the DES are bytes, time of a CrossBow node decreases by half. The three combina-
. The energy consumptions of these two algo- tions with the Hash algorithm bring 110.2% increase on average.
rithms increase linearly as the length of message goes up. Thus, for an energy-constrained CrossBow node, the use of the
For those messages with four different lengths, the energy Hash algorithm needs careful consideration.
consumptions on the CPU when executing the RC5, the Data
Encryption Standard (DES), and the Advanced Encryption B. Energy Consumption of Security Algorithm on Ember
Standard (AES), are 90 J, 130 J, and 339 J on average, Similar to the experiment in the previous subsection, we con-
respectively. It means that the energy consumption is linearly duct the measurement and analysis of the energy consumption
dependent on the strength of the security algorithm. Secure of security algorithms on the Ember node. First, we measure the
Authorized licensed use limited to: University of Delhi. Downloaded on November 22,2024 at 10:09:07 UTC from IEEE Xplore. Restrictions apply.
720 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011
TABLE IV
THE COMPARISON OF TOTAL ENERGY CONSUMPTIONS
TABLE V
THE ENERGY CONSUMPTION OF FOUR IMPLEMENTATIONS OF AES
[10] V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. Prof. Qiu has been on various chairs and TPC members for many international
C. Shantz, “Sizzle: A standards-based end-to-end security architecture conferences. He served as the Program Chair of IEEE EmbeddCom’09 and
for the embedded Internet,” in Proc. IEEE Int. Conf. Pervasive Comput. EM-Com’09. He received the Air Force Summer Faculty Award 2009. He is the
Commun., 2005, pp. 247–256. recipient of the ACM Transactions on Design Automation Electronic Systems
[11] M. Hadley, J. McBride, T. Edgar, L. O’Neil, and J. Johnson, “Securing (TODAES) 2011 Best Paper Award. He also won three IEEE/ACM international
wide area measurement systems,” Pacific Northwest Natl. Lab., Tech. conferences Best Paper Awards (IEEE EUC’09, IEEE/ACM GreenCom’10, and
Rep., 2007. IEEE CSE’10) and one best paper nomination.
[12] F. Li, W. Qiao, H. Sun, H. Wan, J. Wang, Y. Xia, Z. Xu, and P. Zhang,
“Smart transmission grid: Vision and framework,” IEEE Trans. Smart
Grid, vol. 1, no. 2, pp. 168–177, 2010. Wenzhong Gao (S’00–M’02–SM’03) received
[13] Y. Zhang, P. Markham, T. Xia, L. Chen, Y. Ye, and Z. Wu et al., the M.S. and Ph.D. degrees in electrical and com-
“Wide-area frequency monitoring network (FNET) architecture and puter engineering specializing in electric power
applications,” IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 159–167, engineering from Georgia Institute of Technology,
2010. Atlanta, in 1999 and 2002, respectively.
[14] A. Armenia and J. Chow, “A flexible phasor data concentrator design He is currently with the Department of Electrical
leveraging existing software technologies,” IEEE Trans. Smart Grid, and Computer Engineering, University of Denver,
vol. 1, no. 1, pp. 73–80, 2010. CO. His current teaching and research interests
[15] P. Zhang, F. Li, and N. Bhatt, “Next-generation monitoring, analysis, include renewable energy and distributed generation,
and controlfor the future smart control center,” IEEE Trans. Smart smart grid, power-system protection, power-elec-
Grid, vol. 1, no. 2, pp. 186–192, 2010. tronics applications in power systems, power-system
[16] J. Dwoskin, D. Xu, J. Huang, M. Chiang, and R. Lee, “Secure key modeling and simulation, and hybrid electric propulsion systems.
management architecture against sensor-node fabrication attacks,” in
IEEE Global Telecommun. Conf., 2007, pp. 166–171.
[17] A. Agah and S. Das, “Preventing DoS attacks in wireless sensor net- Min Chen (SM’09) received the Ph.D. degree in
works: A repeated game theory approach,” Int. J. Network Security, electrical engineering from South China University
vol. 5, no. 2, pp. 145–153, 2007. of Technology, China, in 2004.
[18] B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node repli- He was a Postdoctoral Fellow at SNU and in the
cation attacks in sensor networks,” in Proc. IEEE Symp. Security Pri- Department of Electrical and Computer Engineering
vacy, 2005, pp. 49–63. at UBC. He is currently an Assistant Professor in
[19] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: the School of Computer Science and Engineering
Attacks and countermeasure,” Ad-Hoc Network, vol. 1, no. 2, pp. at Seoul National University (SNU), Korea. He has
293–315, 2007. published more than 120 technical papers.
[20] H. Chan, A. Perrig, and D. Song, “Secure hierarchical in-network ag- Dr. Chen received the Best Paper Runner-up
gregation in sensor networks,” in Proc. ACM Conf. Comput. Commun. Award from QShine 2008. He serves as Editor or
Security, 2006, pp. 1–10. Associate Editor for several journals. He was a TPC co-chair for several
[21] J. Lach, D. Evans, J. McCune, J. Brandon, and L. Hu, “Power-effi- conferences.
cient adaptable wireless sensor networks,” in Proc. Int. Conf. Military
Aerosp. Programmable Logic Devices, 2003, pp. 1–8.
[22] C. C. Chang, D. J. Nagel, and S. Muftic, “Balancing security and energy Jian-Wei Niu received the B.S. degree in informa-
consumption in wireless sensor networks,” Lecture Notes in Computer tion science from Zhengzhou Institution of Aeronau-
Science, vol. 4864, pp. 469–480, 2007. tical Industry Management, Zhengzhou, China, and
[23] G. D. Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira, “On the the M.S. and Ph.D. degrees in computer application
energy cost of communication and cryptography in wireless sensor from Beihang University, Beijing, China in 1998 and
networks,” in IEEE Int. Conf. Wireless Mobile Comput., Networking, 2002, respectively.
Commun., 2008, pp. 580–585. He is now an Associate Professor at Beihang
[24] V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. University. His current research interests include
Shantz, “Performance assessment of a class of cross-layer optimized embedded and mobile computing.
protocols for geographic routing in WSNs,” in Proc. IEEE Int. Symp.
Personal, Indoor, Mobile Radio Commun., 2008, pp. 1–5.
[25] M. Passing and F. Dressler, “Experimental performance evaluation of
cryptographic algorithms on sensor nodes,” in Proc. IEEE Int. Conf. Lei Zhang received M.S. and Ph.D. degrees in com-
Mobile Adhoc Sensor Syst., 2006, pp. 882–887. puter science from the University of Electronic Sci-
[26] A. J. Menezes, V. O. Scott, and A. Vanstone, Handbook of Applied ence and Technology of China.
Cryptography. Boca Raton, FL: CRC, 2006. He was awarded a fellowship from the China
[27] V. Alfred, R. Sethi, and J. D. Ullman, Compilers: Principles, Tech- Scholarship Council to conduct research at Uni-
niques, and Tools, 2 ed. Reading, MA: Pearson/Addison-Wesley, versity of Texas, Dallas, as a Visiting Scholar. His
2007. research interests include embedded systems, com-
[28] J. Grossschadl, S. Tillich, C. Rechberger, M. Hofmann, and M. piler optimization, and hardware/software codesign.
Medwed, “Energy evaluation of software implementations of block
ciphers under memory constraints,” in Proc. IEEE/ACM DATE, 2007,
pp. 1–6.
Authorized licensed use limited to: University of Delhi. Downloaded on November 22,2024 at 10:09:07 UTC from IEEE Xplore. Restrictions apply.