چكيده به لاتين
Smart grid has emerged as the future of power systems by using of information and communication technology (ICT) in the last decade. This grid improves reliability, flexibility, remote control and reduces greenhouse gas emissions by enabling two-way communication along with electrical power flow. However, the use of ICT poses serious challenges to the implementation of the concept of smart grid. Among all the existing challenges, security is the most important issue that must be addressed. Therefore, the use of cryptographic primitives and algorithms in the design of communication protocols in the smart grid will be inevitable. On the other hand, most network devices have limitations in power consumption, processing, computing, telecommunications, and storage capacity, which lead security engineers and researchers to design their protocols more lightweight. However, most common cryptographic-based methods and algorithms have relatively high computational, communication, and storage overheads.
Physical Unclonable Functions (PUFs) are functions that can be generated using the physical and inherent structure of electronic chips to generate cryptographic keys and be used to authenticate related devices. Due to their high randomness and unclonable properties, these functions act as a hardware fingerprint and can play a main role in the design of lightweight cryptographic methods. The aim of this dissertation is to first design and implement appropriate PUFs to introduce novel and optimal methods for extracting secure keys in accordance with standards such as reliability and uniformity of responses. The next aim is to design secure protocols based on the obtained PUF-based key that are appropriate to the requirements and limitations of the smart grid. For this purpose, we design and evaluate an optimal PUF structure which increases the reliability of Arbiter PUF to 100% (without using any error correction codes), and then a lightweight protocol whose mathematical security is also provable is proposed. The security analysis and performance evaluations show that the proposed PUF-based protocol is secure against all possible cyber and physical attacks and creates a significant improvement in the required storage space, communication overhead, and computational cost over existing methods. Thus, while providing far better security and functionality features, it improves the computational cost by at least 2.7 times.