Skip to main content

Security and Feasibility of Power Line Communication System

  • Conference paper
  • First Online:
Book cover Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (ICGS3 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 534))

Included in the following conference series:

  • International Conference on Global Security, Safety, and Sustainability

Abstract

Power Line Communication (PLC) has the potential to become the preferred connectivity technique for providing broadband to homes and offices with advantage of eliminating the need for new wiring infrastructure and reducing the cost. The PLC channel, its characterization, standardization and applications has been well studied. However, the security of PLC has not been investigated sufficiently, and such assessments are required for prospective implementation of successful PLC communication systems. Since PLC uses power line as the medium, it has similar characteristics with wireless communications from the security perspective. This paper provides discussion of security issues and feasibility for PLC networks. The authentication and cryptographic scheme used in PLC standard is also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agrawal, D.G., Paliwal, R.K., Subramanium, P.: Effect of turbo coding on OFDM transmission to improve BER. Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 2(1), 94–102 (2011)

    Google Scholar 

  2. Al Mawali, K.S.: Techniques for broadband power line communications: impulsive noise mitigation and adaptive modulation. School of Electrical and Computer Engineering College of Science, Engineering and Health College of Science, RMIT University, Melbourne, Victoria (2011)

    Google Scholar 

  3. Apoorva, A., Singla, P.: A review of information sharing through shared key cryptography. Int. J. Res. Eng. Technol. Manag. 1–6 (2014)

    Google Scholar 

  4. Cacciaguerra, F.: Introduction to power line communication (November 2003). http://en.kioskea.net/contents/cpl/cpl-intro.php3. Accessed June 2011

  5. Carcelle, X.: Power Line Communications in Practice. Artech house, London (2006)

    Google Scholar 

  6. Celebi, H.B.: Noise and multipath characteristics of power line communication channels. Doctoral Thesis, University of South Florida, Florida (2010)

    Google Scholar 

  7. Consumer Focus UK GOV: Smart meters – what are they and how can I find out more? (Consumer Focus) (2013). http://www.consumerfocus.org.uk/get-advice/energy/smart-meters-what-are-they-and-how-can-i-find-out-more/benefits-and-disadvantages-of-smart-meters. Accessed 29 August 2013

  8. Diffie, W.: The first ten years of public key cryptography. Proc. IEEE 76(5), 560–577 (1998)

    Article  Google Scholar 

  9. Dostert, K.: Telecommunications over the power distribution grid; possibilities and limitations. In: International Symposium on Power Line Communications and its Applications, Essen, Germany (1997)

    Google Scholar 

  10. Fernandes, A.D., Dave, P.: Power Line Communication in Energy Markets. CYPRESS, San Jose (2011)

    Google Scholar 

  11. Fink, D., Jeung, R.J.: Connectivity Solutions Based on Power Line Communication to Rural and Remote Areas. Information and Communication University, Korea (2008)

    Google Scholar 

  12. Grosse, E., Upandhyay, M.: Authentication at scale. IEEE Comput. Reliab. Soc. 11, 15–22 (2013)

    Google Scholar 

  13. Haldankar, C., Kuwelkar, S.: Implementation of AES and blowfish algorithm. IJRET: Int. J. Res. Eng. Technol. 3(3), 143–146 (2014)

    Google Scholar 

  14. Hosseinpournajarkolaei, A., Hosseinian-Far, A.: Channel characterization for broadband power line communication system. In: 6th SASTech International Symposium. Sastech, Kuala Lampur (2012)

    Google Scholar 

  15. Hosseinpournajarkolaei, A., Jahankhani, H., Hosseinian-Far, A.: Vulnerability considerations for power line communication’s (PLC) supervisory control and data acquisition. Int. J. Electron. Secur. Digit. Forensics 6(2), 104–114 (2014)

    Article  Google Scholar 

  16. Hosseinpournajarkolaei, A., Lota, J., Hosny, W.: Data transfer over low-voltage european power distribution. In: 47th Power Engineering Conference. IEEE, UPEC, London (2012)

    Google Scholar 

  17. Industry Canada: Consultation Paper on Broadband over Power Line Communication Systems (2005). https://www.ic.gc.ca/eic/site/smt-gst.nsf/vwapj/bpl-e.pdf/$FILE/bpl-e.pdf. Accessed August 2015

  18. Lu, X., Wang, W., Ma, J.: Authentication and integrity in the smart grid: an empirical study in substation automation systems. Int. J. Distrib. Sens. Netw. 2012, 1–13 (2012)

    Google Scholar 

  19. Selander, L.: Load profile and communication channel characteristics of the low voltage grid. DistribuTech DA/DSM Europe 98, London (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amin Hosseinian-Far .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Hosseinpour, A., Hosseinian-Far, A., Jahankhani, H., Ghadrdanizadi, A. (2015). Security and Feasibility of Power Line Communication System. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23276-8_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23275-1

  • Online ISBN: 978-3-319-23276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics