[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sha et al., 2016 - Google Patents

A secure and efficient framework to read isolated smart grid devices

Sha et al., 2016

View PDF
Document ID
7066930989359956819
Author
Sha K
Alatrash N
Wang Z
Publication year
Publication venue
IEEE Transactions on Smart Grid

External Links

Snippet

With increasing deployments of smart grid systems, a large quantity of energy usage and grid status data have been collected by smart grid devices like smart meters. To secure these critical and sensitive data, it is crucial to prevent unauthorized readings from these …
Continue reading at drive.google.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Sha et al. A secure and efficient framework to read isolated smart grid devices
Kumar et al. Lightweight authentication and key agreement for smart metering in smart energy networks
Garg et al. Secure and lightweight authentication scheme for smart metering infrastructure in smart grid
Kumar et al. ECCAuth: A secure authentication protocol for demand response management in a smart grid system
Abbasinezhad-Mood et al. An anonymous ECC-based self-certified key distribution scheme for the smart grid
Saleem et al. FESDA: Fog-enabled secure data aggregation in smart grid IoT network
Wang et al. Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure
Zhang et al. A lightweight authentication scheme with privacy protection for smart grid communications
Saxena et al. Authentication and authorization scheme for various user roles and devices in smart grid
He et al. An enhanced public key infrastructure to secure smart grid wireless communication networks
Choudhury et al. A strong user authentication framework for cloud computing
Wu et al. Fault-tolerant and scalable key management for smart grid
Yan et al. An efficient security protocol for advanced metering infrastructure in smart grid
Anzalchi et al. A survey on security assessment of metering infrastructure in smart grid systems
Uludag et al. Secure and scalable data collection with time minimization in the smart grid
Yan et al. A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid
Sureshkumar et al. Design of robust mutual authentication and key establishment security protocol for cloud-enabled smart grid communication
US20220103369A1 (en) Security system and related methods
Liu et al. Secure digital certificate-based data access control scheme in blockchain
Ayub et al. Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication
Das et al. Data security in the smart grid environment
Tahavori et al. Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
Zhang et al. Efficient and Privacy‐Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks
CN107864040A (en) A kind of intelligent grid big data information management system based on safe cloud computing
Li et al. Design and implementation of an SM2-based security authentication scheme with the key agreement for smart grid communications