Title
Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies
Abstract
We propose using Power Line Communication PLC as a second channel for data origin authentication, and we present a system architecture and protocol for doing so taking advantage of existing infrastructure for communicating over power lines. Our system connects a user's computer to a secure electric meter in his building via a secure Human Authorization Detector HAD. The meter, which has a unique secret identifier and encryption key, communicates securely with the trusted Power Grid Server PG through PLC. Upon request from an Internet Application Server AS, the user sends a location certificate to the AS, obtained via PLC from the PG and signed by the PG. Because PLC requires physical access to the meter permanently attached to the building, our system offers fine-grain location authentication. The user authorizes certificate requests by reading the HAD's display including transaction details and pushing a button, thus mitigating the threat of malware on the user's computer maliciously requesting or forwarding location certificates unauthorized by the user. Our system provides strong location authentication useful to many on-line applications, including banking and SCADA systems. We present our architecture and protocols in sufficient detail to permit further implementation and analysis. We also outline applications for anti-theft and emergency signaling.
Year
DOI
Venue
2012
10.1080/01611194.2012.660370
Cryptologia
Keywords
Field
DocType
new out-of-band strategies,power grid server pg,forwarding location certificate,scada system,fine-grain location authentication,location authentication,data origin authentication,strong location authentication,system architecture,location certificate,power line communication plc,emergency signaling,secure electric meter,man in the middle attack,out of band authentication,network security,security engineering
Authentication,Man-in-the-middle attack,Computer science,Computer security,Network security,Power-line communication,Computer network,Systems architecture,Multi-factor authentication,Key (cryptography),Application server
Journal
Volume
Issue
ISSN
36
2
0161-1194
Citations 
PageRank 
References 
0
0.34
5
Authors
4
Name
Order
Citations
PageRank
AlanT. Sherman1401.74
Dhananjay Phatak2132.32
VivekG. Relan300.34
Bhushan Sonawane410.69