788 Hits in 4.1 sec

Hybrid Cryptography Algorithm with Precomputation for Advanced Metering Infrastructure Networks

Samer Khasawneh, Michel Kadoch
2017 Journal on spesial topics in mobile networks and applications  
Elliptic Curve Integrated Encryption Scheme (ECIES) and Advanced Encryption Scheme (AES) are chosen as the building blocks for the proposed scheme.  ...  Two-way communication has been identified as the smart grid flagship feature that enables the smart grid to attain its outcomes over the legacy power grid.  ...  The proposal employs elliptic curve cryptography, where a precomputation stage is introduced to minimize the computation overhead of elliptic curve encryption by eliminating the time required to perform  ... 
doi:10.1007/s11036-017-0956-0 fatcat:bq6efgw4n5ah5jvhdzkp2snwrq

Salsa20 based lightweight security scheme for smart meter communication in smart grid

S. M. Salim Reza, Md Murshedul Arifeen, Sieh Kiong Tiong, Md Akhteruzzaman, Nowshad Amin, Mohammad Shakeri, Afida Ayob, Aini Hussain
2020 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
The traditional power gird is altering dramatically to a smart power grid with the escalating development of information and communication technology (ICT).  ...  In this paper, we have proposed a security mechanism consolidating elliptic curve cryptography (ECC) and Salsa20 stream cipher algorithm to ensure security of the network as well as addressing the problem  ...  Utilizing elliptic curve cryptography, the SM and the other smart devices will share their identity for authentication purpose.  ... 
doi:10.12928/telkomnika.v18i1.14798 fatcat:hct4nsku5fhqvp6myva4c4ilbi

Secured Data Transmission Using Elliptic Curve Cryptography

K.S.Abitha, Anjali pandey
2015 International Journal of Innovative Research in Computer and Communication Engineering  
of AODV algorithm using ECC(Elliptic Curve Cryptography).  ...  Secured data transmission using elliptic curve cryptography can be defined as transmission of data. This paper proposes an survey about Secured data transmission using elliptic curve cryptography.  ...  The analysis and discussion show that the proposed protocol is versatile, and hence suitable for secure smart grid communications, [6] A novel key management scheme which combines symmetric key technique  ... 
doi:10.15680/ijircce.2015.0303003 fatcat:s5g5ovojijg5bj56ngg3rv4ho4

Novel Technique for Securing IoT Systems by using Multiple ECC and Ceaser Cipher Cryptography

Ramakrishna Hegde, Soumyasri S M
2021 International journal of computer science and mobile computing  
Alternatively, Diffie-Hellman (DH) and Multi Curve Elliptic Curve Cryptography (ECC) supplement the privacy schemes, basically in asymmetric cryptography.  ...  So, we need to develop Lightweight encryption algorithm for IoT devices for secure communication and secure data transmission in IoT environment.  ...  Elliptic Curve Cryptography is a promising asymmetric cryptographic algorithm with an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields [1] .  ... 
doi:10.47760/ijcsmc.2021.v10i02.001 fatcat:zlk3bannivbcpjczbudpva5dru

Authentication techniques in smart grid: a systematic review

Malik Qasaimeh, Rawan Turab, Raad S. Al-Qassas
2019 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
Smart Grid (SG) provides enhancement to existing grids with two-way communication between the utility, sensors, and consumers, by deploying smart sensors to monitor and manage power consumption.  ...  This provides a basis for the design and use of optimized SG authentication approaches.  ...  PUF to derive keys Hardware PS20 [35] Enhanced elliptic curve cryptography-based authentication Cryptography PS21 [36] Lightweight elliptic curve approach using third party Cryptography PS22 [31  ... 
doi:10.12928/telkomnika.v17i3.11437 fatcat:dgd6isfh3vesfcw5up6oiuehjq

Privacy-preserving data aggregation in resource-constrained sensor nodes in Internet of Things: A review [article]

Inayat Ali, Sonia Sabir, Eraj Khan
2018 arXiv   pre-print
Since IoT has many application areas including smart home, smart grids, smart healthcare system, smart and intelligent transportation and many more.  ...  Most of these applications are fueled by the resource-constrained sensor network, such as Smart healthcare system is powered by Wireless Body Area Network (WBAN) and Smart home and weather monitoring systems  ...  Acknowledgment This work is a part of our project "Privacy preserving data aggregation techniques in e-health care system" that is funded by my host institution as a part of master degree thesis.  ... 
arXiv:1812.04216v1 fatcat:ajbxpbburjhbxg6satjiazdwx4

Editorial on Wireless Networking Technologies for Smart Cities

Jaime Lloret, Syed Hassan Ahmed, Danda B. Rawat, Waleed Ejaz, Wei Yu
2018 Wireless Communications and Mobile Computing  
Similarly, to make a smart city, a strong communications infrastructure is required for connecting smart objects, people, and sensors. For instance, audio and  ...  Recently, despite the IoT devices constraints, such as their energy consumption [2], a number of smart devices appeared on a large scale, such as smart beds for monitoring and health data gathering during  ...  Acknowledgments We also would like to thank editorial staff, editor in chief, contributing authors, reviewers, and production staff for bringing our special issue to the level of success.  ... 
doi:10.1155/2018/1865908 fatcat:xcq4wnu6nrdtblnqnvh73laeoq

Using ID-based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure

Shaik Mullapathi Farooq, S. M. Suhail Hussain, Taha Selim Ustun, Atif Iqbal
2020 IEEE Access  
P1, P2 Points on the elliptic curve a, b, c, u, v Integers H1, H2 Hash value generated by SHA256 q Prime number I. INTRODUCTION Smart grid is considered as next generation power system.  ...  ID based authentication is based on elliptic curve cryptography with bilinear pairing operations.  ... 
doi:10.1109/access.2020.3038813 fatcat:aqvaty4gbvf7pk2ttvtf6ubezq

Security Architecture for Low Resource Devices in Smart City using Cloud

Muneer Ahmad Dar
2020 JOIV: International Journal on Informatics Visualization  
In this paper, we propose a novel security architecture which first uses the Elliptic Curve Diffie Helman Key Exchange Algorithms to exchange the keys between the two low power devices (Smartphone).  ...  The data is encrypted using the private keys of a device and then send to the cloud for safe storage. The data can be only accessed by the communicating device with the same key.  ...  The smart devices must be able to communicate in a secure way. The Elliptic Curve Key exchange is proposed which is computationally feasible for low power devices [2] .  ... 
doi:10.30630/joiv.4.3.407 doaj:0733b5d869c24b3f94cb4944eb193382 fatcat:nwgjfk5nvvhx3ezixq674eensm

Cybersecurity in Smart Grids

Taha Selim Ustun
2022 Energies  
The increasing use of communication in power-system operation and control is a double-edged sword [...]  ...  Elliptic curve cryptography is utilized for security. In addition to theoretical work, cybersecurity studies require projects with lab implementation and hardware demonstrations [13] .  ...  Recognizing the importance of mitigating FDI attacks, researchers in [12] developed a novel two-tier secure smart-grid architecture to secure power-system measurements in smart grids.  ... 
doi:10.3390/en15155458 fatcat:44chvp3ihreddnubeslnvp5qfa

A novel multi-stage distributed authentication scheme for smart meter communication

Manjunath Hegde, Adnan Anwar, Karunakar Kotegar, Zubair Baig, Robin Doss
2021 PeerJ Computer Science  
Numerous authentication schemes have been proposed for the smart grid, but most of these methods are applicable for two party communication.  ...  In this article, we propose a distributed, dynamic multistage authenticated key agreement scheme for smart meter communication.  ...  ADDITIONAL INFORMATION AND DECLARATIONS Funding The authors received no funding for this work. Competing Interests The authors declare that they have no competing interests.  ... 
doi:10.7717/peerj-cs.643 fatcat:j7n37t2rcbepxg7gazng4w3nay

An Efficient Cryptography Key Management for Secure Communications in Smart Metering

In Smart Grid systems, Smart Meter (SM) is one of the most important devices.  ...  In order to ensure the security of smart meter data, the cryptography based encryption techniques are used in the SG.  ...  [22] has introduced the Authenticated Key Agreement (AKA) scheme with elliptic curve cryptography (ECC) for the smart grid communication.  ... 
doi:10.35940/ijitee.i7846.0881019 fatcat:6a4ie7wxbbczho4kcasgml4fi4

Fog Computing: Comprehensive Approach for Security Data Theft Attack Using Elliptic Curve Cryptography and Decoy Technology

Mai Trung Dong, Xianwei Zhou
2016 OALib  
Elliptic Curve Cryptography (ECC) and decoy technology in such a constrained environment along with the other two aspects of ECC, namely its security and efficiency.  ...  This article, by exploitation advantages of Fog computing Paradigm, analyzes its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks, Wireless Sensor  ...  The primary advantage that elliptic curve systems have over systems based on the multiplicative group of a finite field is the absence of a sub exponential-time algorithm that could find discrete logs  ... 
doi:10.4236/oalib.1102802 fatcat:hntozyqqnzgmbiiq6jwqw5lbea

Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography

Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu
2017 Wireless Communications and Mobile Computing  
To reduce computation cost and achieve better security, we construct a lightweight data aggregation scheme against internal attackers in the smart grid environment using Elliptic Curve Cryptography (ECC  ...  The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks.  ...  To reduce both computation and communication costs, we propose a lightweight data aggregation scheme based on the Elliptic Curve Cryptography (ECC) [18, 19] , which can obtain the same security level  ... 
doi:10.1155/2017/3194845 fatcat:dv6dv7a4hnfd5dfi4snjuevckm

Types of Lightweight Cryptographies in Current Developments for Resource Constrained Machine Type Communication Devices: Challenges and Opportunities

Shafi Ullah, Raja Zahilah, Ilyas Khan, A. Alshehri, T.M. Yazdani
2022 IEEE Access  
This paper offers in-depth studies on different types and techniques of hardware and software-based lightweight cryptographies for machine-type communication devices in machine-to-machine communication  ...  Machine-type communication devices have become a vital part of the autonomous industrial internet of things and industry 4.0.  ...  ACKNOWLEDGMENT Tulha Moaiz Yazdani would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project R-2022-84.  ... 
doi:10.1109/access.2022.3160000 fatcat:fub6ilfhhrhndfwtsrfugwp5nm
« Previous Showing results 1 — 15 out of 788 results