11Security Schemes for AMI Private Networks
In this chapter, a security protocol is proposed specifically for the advanced metering infrastructure (AMI) in the smart grid to address the security requirements. Although AMI does not cover all private networks in smart grid communications, security protocols for its comprehensive and complicated infrastructure can be extended to other private networks based on their different security requirements. The proposed security protocol will be illustrated in four parts, namely the initial authentication scheme, secure uplink transmission scheme, secure downlink transmission scheme, and domain secret update scheme.
11.1 Preliminaries
The proposed security schemes in this chapter are based on several network security concepts: for example, security services, security mechanisms, etc. To make the illustration clearer, we first present some basic background about network security in this section.
11.1.1 Security Services
Security services are provided in a system design to protect against possible security attacks. In a communication system, possible security services are described in Table 11.1
Table 11.1 Security services.
| Security service | Description |
| Access control | Control access from authorized users to resources. |
| Authentication | Verify the identities of entities. |
| Confidentiality | Ensure that information is accessible only to authorized entities. |
| Data integrity | Maintain the accuracy and completeness of data. |
| Non‐repudiation | Prove the data origin. |
| Availability ... |