While security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication trade-off particularly tailored to smart grids. These systems, often composed of embedded nodes with highly constrained resources, require, e.g., metering data to be delivered efficiently while neither jeopardizing communication nor security. Data aggregation is a natural choice in such settings, where an additional challenge is to facilitate per-hop and end-to-end security as well as a mechanism to protect the valid nodes from exhaustion threats. The prime contribution of this paper is to include into the security design framework issues related to aggregation, wireless fading and shadowing channels, physical layer parameters (such as choice of modulation, packet length, channel coder), medium access control parameters (such as average number of transmissions), routing parameters (such as choice of route). Relying on analysis and corroborating simulations, unprecedented design guidelines are derived which determine the operational point beyond which aggregation is useful as well quantifying the superiority of our protocol enriched with a protection mechanism against nonintended packets (malicious or nonmalicious) w.r.t. nonaggregated and/or unsecured solutions.
and CHRISTOPHE WOLINSKI IRISAAs hardware designs get increasingly complex and time-to-market constraints get tighter there is strong motivation for high-level synthesis (HLS). HLS must efficiently handle both dataflowdominated and controlflow-dominated designs as well as designs of a mixed nature. In the past efficient tools for the former type have been developed but so far HLS of conditional behaviors lags behind. To bridge this gap an efficient scheduling heuristic for conditional behaviors is presented. Our heuristic and the techniques it utilizes are based on a unifying design representation appropriate for both types of behavioral descriptions, enabling the proposed heuristic to exploit under the same framework several well-established techniques (chaining, multicycling) as well as conditional resource sharing and speculative execution which are essential in efficiently scheduling conditional behaviors. Preliminary experiments confirm the effectiveness of our approach and prompted the development of the CODESIS HLS tool for further experimentation.
Abstract-Whilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in Smart Grid systems. These systems, often composed of embedded nodes with highly constrained resources, require e.g. metering data to be delivered efficiently whilst neither jeopardizing communication nor security. Data aggregation is a natural choice in such settings, where the challenge is to facilitate per-hop as well as end-toend security. The prime contribution of this paper is to propose a secure aggregation protocol that meets the requirements of Smart Grids, and to analyze its efficiency considering various system configurations as well as the impact of the wireless channel through packet error rates. Relying on analysis and corroborative simulations, unprecedented design guidelines are derived which determine the operational point beyond which aggregation is useful as well quantifying the superiority of our protocol w.r.t. non-aggregated solutions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.