-
RETINA: Distributed and Secure Trust Management for Smart Grid Applications and Energy Trading
Authors:
Vaios Boulgourasa,
Thodoris Ioannidis,
Ilias Politis,
Christos Xenakis
Abstract:
The rapid adoption of smart grids demands robust security and efficiency measures due to their critical role in delivering electricity and their potential for customer-oriented benefits. This paper presents an innovative framework, named RETINA, which provides a resilient and secure energy trading mechanism within smart grid systems. RETINA tackles the inherent security and infrastructure challeng…
▽ More
The rapid adoption of smart grids demands robust security and efficiency measures due to their critical role in delivering electricity and their potential for customer-oriented benefits. This paper presents an innovative framework, named RETINA, which provides a resilient and secure energy trading mechanism within smart grid systems. RETINA tackles the inherent security and infrastructure challenges in smart grids by establishing a trust-based security layer and facilitating energy transactions through blockchain technology. Our proposed solution integrates Public Key Infrastructure (PKI) and the Web of Trust (WoT) concepts, promoting decentralized communication channels and robust key management. We further introduce a smart contract-based energy trading mechanism that factors in trust, distance, and energy type (green or non-green) in cost calculation. The utility and robustness of RETINA have been validated in a virtualized testbed environment with 500 nodes, demonstrating superior performance in terms of scalability and resilience compared to the existing WoT scheme. Furthermore, RETINA successfully enables a secure and efficient energy trading scheme, promoting the use of renewable energy sources. Future enhancements will include application to a realistic smart grid deployment and the integration of additional functionalities. This groundbreaking solution has the potential to revolutionize the smart grid ecosystem, addressing its current limitations and propelling the industry towards a future of advanced and secure energy exchange.
△ Less
Submitted 13 June, 2023;
originally announced June 2023.
-
An Integrated Approach for Energy Efficient Handover and Key Distribution Protocol for Secure NC-enabled Small Cells
Authors:
Vipindev Adat Vasudevan,
Muhammad Tayyab,
George P. Koudouridis,
Xavier Gelabert,
Ilias Politis
Abstract:
Future wireless networks must serve dense mobile networks with high data rates, keeping energy requirements to a possible minimum. The small cell-based network architecture and device-to-device (D2D) communication are already being considered part of 5G networks and beyond. In such environments, network coding (NC) can be employed to achieve both higher throughput and energy efficiency. However, N…
▽ More
Future wireless networks must serve dense mobile networks with high data rates, keeping energy requirements to a possible minimum. The small cell-based network architecture and device-to-device (D2D) communication are already being considered part of 5G networks and beyond. In such environments, network coding (NC) can be employed to achieve both higher throughput and energy efficiency. However, NC-enabled systems need to address security challenges specific to NC, such as pollution attacks. All integrity schemes against pollution attacks generally require proper key distribution and management to ensure security in a mobile environment. Additionally, the mobility requirements in small cell environments are more challenging and demanding in terms of signaling overhead. This paper proposes a blockchain-assisted key distribution protocol tailored for MAC-based integrity schemes, which combined with an uplink reference signal (UL RS) handover mechanism, enables energy efficient secure NC. The performance analysis of the protocol during handover scenarios indicates its suitability for ensuring high level of security against pollution attacks in dense small cell environments with multiple adversaries being present. Furthermore, the proposed scheme achieves lower bandwidth and signaling overhead during handover compared to legacy schemes and the signaling cost reduces significantly as the communication progresses, thus enhancing the network's cumulative energy efficiency.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
How many FIDO protocols are needed? Surveying the design, security and market perspectives
Authors:
Anna Angelogianni,
Ilias Politis,
Christos Xenakis
Abstract:
Unequivocally, a single man in possession of a strong password is not enough to solve the issue of security. Studies indicate that passwords have been subjected to various attacks, regardless of the applied protection mechanisms due to the human factor. The keystone for the adoption of more efficient authentication methods by the different markets is the trade-off between security and usability. T…
▽ More
Unequivocally, a single man in possession of a strong password is not enough to solve the issue of security. Studies indicate that passwords have been subjected to various attacks, regardless of the applied protection mechanisms due to the human factor. The keystone for the adoption of more efficient authentication methods by the different markets is the trade-off between security and usability. To bridge the gap between user-friendly interfaces and advanced security features, the Fast Identity Online (FIDO) alliance defined several authentication protocols. Although FIDO's biometric-based authentication is not a novel concept, still daunts end users and developers, which may be a contributor factor obstructing FIDO's complete dominance of the digital authentication market. This paper traces the evolution of FIDO protocols, by identifying the technical characteristics and security requirements of the FIDO protocols throughout the different versions while providing a comprehensive study on the different markets (e.g., digital banking, social networks, e-government, etc.), applicability, ease of use, extensibility and future security considerations. From the analysis, we conclude that there is currently no dominant version of a FIDO protocol and more importantly, earlier FIDO protocols are still applicable to emerging vertical services.
△ Less
Submitted 29 June, 2021;
originally announced July 2021.
-
Coalition Formation Games for Improved Cell-Edge User Service in Downlink NOMA and MU-MIMO Small Cell Systems
Authors:
Panagiotis Georgakopoulos,
Tafseer Akhtar,
Christos Mavrokefalidis,
Ilias Politis,
Kostas Berberidis,
Stavros Koulouridis
Abstract:
In today's wireless communication systems, the exponentially growing needs of mobile users require the combination of new and existing techniques to meet the demands for reliable and high-quality service provision. This may not always be possible, as the resources in wireless telecommunication systems are limited and a significant number of users, usually located at the cell edges, can suffer from…
▽ More
In today's wireless communication systems, the exponentially growing needs of mobile users require the combination of new and existing techniques to meet the demands for reliable and high-quality service provision. This may not always be possible, as the resources in wireless telecommunication systems are limited and a significant number of users, usually located at the cell edges, can suffer from severe interference. For this purpose, a new Joint Transmission Coordinated Multipoint (JT-CoMP) scheme, in which the transmission points' clustering is based on a coalition formation game, is deployed alongside with Non-Orthogonal Multiple Access (NOMA) in a Cloud Radio Access Network (C-RAN) consisting of small cells. To further enhance the network's performance, Multiuser Multiple-Input Multiple-Output (MU-MIMO) with Zero-Forcing (ZF) beamforming is applied. The proposed scheme's performance, in terms of user throughput, is then compared to that of a scheme where JT-CoMP with static clustering is selected, a JT-CoMP scheme with clustering based on a greedy algorithm and a scenario where JT-CoMP is not deployed. Simulation results confirm that the proposed scheme reliably improves the throughput of users with poor wireless channels while guaranteeing that the performance of the rest is not severely undermined.
△ Less
Submitted 29 June, 2021;
originally announced June 2021.
-
Secure Virtual Mobile Small Cells: A Stepping Stone Towards 6G
Authors:
J. Rodriguez,
G. P. Koudouridis,
X. Gelabert,
M. Tayyab,
R. Bassoli,
F. H. P. Fitzek,
R. Torre,
R. Abd-Alhameed,
M. Sajedin,
I. Elfergani,
S. Irum,
G. Schulte,
P. Diogo,
F. Marzouk,
M. de Ree,
G. Mantas,
I. Politis
Abstract:
As 5th Generation research reaches the twilight, the research community must go beyond 5G and look towards the 2030 connectivity landscape, namely 6G. In this context, this work takes a step towards the 6G vision by proposing a next generation communication platform, which aims to extend the rigid coverage area of fixed deployment networks by considering virtual mobile small cells (MSC) that are c…
▽ More
As 5th Generation research reaches the twilight, the research community must go beyond 5G and look towards the 2030 connectivity landscape, namely 6G. In this context, this work takes a step towards the 6G vision by proposing a next generation communication platform, which aims to extend the rigid coverage area of fixed deployment networks by considering virtual mobile small cells (MSC) that are created on demand. Relying on emerging computing paradigms such as NFV (Network Function Virtualization) and SDN (Software Defined Networking), these cells can harness radio and networking capability locally reducing protocol signaling latency and overhead. These MSCs constitute an intelligent pool of networking resources that can collaborate to form a wireless network of MSCs providing a communication platform for localized, ubiquitous and reliable connectivity. The technology enablers for implementing the MSC concept are also addressed in terms of virtualization, lightweight wireless security, and energy efficient RF. The benefits of the MSC architecture towards reliable and efficient cell offloading are demonstrated as a use-case.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
On an innovative architecture for digital immunity passports and vaccination certificates
Authors:
John C. Polley,
Ilias Politis,
Christos Xenakis,
Adarbad Master,
Michał Kępkowski
Abstract:
With the COVID-19 pandemic entering a second phase and vaccination strategies being applied by countries and governments worldwide, there is an increasing expectation by people to return to normal life. There is currently a debate about immunity passports, privacy, and the enablement of individuals to safely enter everyday social life, workplace, and travel. Such digital immunity passports and vac…
▽ More
With the COVID-19 pandemic entering a second phase and vaccination strategies being applied by countries and governments worldwide, there is an increasing expectation by people to return to normal life. There is currently a debate about immunity passports, privacy, and the enablement of individuals to safely enter everyday social life, workplace, and travel. Such digital immunity passports and vaccination certificates should meet people's expectations for privacy while enabling them to present to 3rd party verifiers tamper-evident credentials. This paper provides a comprehensive answer to the technological, ethical and security challenges, by proposing an architecture that provides to individuals, employers, and government agencies, a digital, decentralized, portable, immutable, and non-refutable health status cryptographic proof. It can be used to evaluate the risk of allowing individuals to return to work, travel, and public life activities.
△ Less
Submitted 12 May, 2021; v1 submitted 6 March, 2021;
originally announced March 2021.