Sha et al., 2016 - Google Patents
A secure and efficient framework to read isolated smart grid devicesSha et al., 2016
View PDF- Document ID
- 7066930989359956819
- Author
- Sha K
- Alatrash N
- Wang Z
- Publication year
- Publication venue
- IEEE Transactions on Smart Grid
External Links
Snippet
With increasing deployments of smart grid systems, a large quantity of energy usage and grid status data have been collected by smart grid devices like smart meters. To secure these critical and sensitive data, it is crucial to prevent unauthorized readings from these …
- 238000004891 communication 0 abstract description 34
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sha et al. | A secure and efficient framework to read isolated smart grid devices | |
Kumar et al. | Lightweight authentication and key agreement for smart metering in smart energy networks | |
Garg et al. | Secure and lightweight authentication scheme for smart metering infrastructure in smart grid | |
Kumar et al. | ECCAuth: A secure authentication protocol for demand response management in a smart grid system | |
Abbasinezhad-Mood et al. | An anonymous ECC-based self-certified key distribution scheme for the smart grid | |
Saleem et al. | FESDA: Fog-enabled secure data aggregation in smart grid IoT network | |
Wang et al. | Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure | |
Zhang et al. | A lightweight authentication scheme with privacy protection for smart grid communications | |
Saxena et al. | Authentication and authorization scheme for various user roles and devices in smart grid | |
He et al. | An enhanced public key infrastructure to secure smart grid wireless communication networks | |
Choudhury et al. | A strong user authentication framework for cloud computing | |
Wu et al. | Fault-tolerant and scalable key management for smart grid | |
Yan et al. | An efficient security protocol for advanced metering infrastructure in smart grid | |
Anzalchi et al. | A survey on security assessment of metering infrastructure in smart grid systems | |
Uludag et al. | Secure and scalable data collection with time minimization in the smart grid | |
Yan et al. | A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid | |
Sureshkumar et al. | Design of robust mutual authentication and key establishment security protocol for cloud-enabled smart grid communication | |
US20220103369A1 (en) | Security system and related methods | |
Liu et al. | Secure digital certificate-based data access control scheme in blockchain | |
Ayub et al. | Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication | |
Das et al. | Data security in the smart grid environment | |
Tahavori et al. | Lightweight and secure PUF-based authenticated key agreement scheme for smart grid | |
Zhang et al. | Efficient and Privacy‐Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks | |
CN107864040A (en) | A kind of intelligent grid big data information management system based on safe cloud computing | |
Li et al. | Design and implementation of an SM2-based security authentication scheme with the key agreement for smart grid communications |