19,960 Hits in 4.6 sec

A Hybrid Cryptography Scheme for NILM Data Security

Ruijue Feng, Zhidong Wang, Zhifeng Li, Haixia Ma, Ruiyuan Chen, Zhengbin Pu, Ziqiu Chen, Xianyu Zeng
2020 Electronics  
Using fine-grained data analysis, non-invasive load monitoring (NILM) can reveal the detail of electricity customers' habits, which is helpful in the improvement of refined management and better user experience  ...  At the same time, the effectiveness of the scheme was verified, and the scheme computing cost depended on the efficiency of encryption and decryption, or signature and verification of the RSA algorithm  ...  On the one hand, the communication network needs to have enough bandwidth to meet the transmission requirements of large NILM data.  ... 
doi:10.3390/electronics9071128 fatcat:55kjjcxt3feobfysqtpd6likii

Privacy Protection Based Secure Data Transaction Protocol for Smart Sensor Meter in Smart Grid

Woong Go, SeulKi Choi, Jin Kwak
2013 International Journal of Distributed Sensor Networks  
A smart grid is a data communications network integrated with an electrical grid that collects and analyzes near-real-time data on power transmission, distribution, and consumption.  ...  This architecture can control the use of electricity. In particular, users can monitor and regulate the electricity consumption of each home appliance in real time.  ...  A smart grid communication network will comprise several different subsystems-it is truly a network of networks.  ... 
doi:10.1155/2013/829721 fatcat:afes7tocqfbg3i42fvey6sstta

Application of Data Encryption Technology in Electric Power Informationization

Cai Yingkai, Zhang Ye, Cao Shilong, Mu Rong, H. Li, G. Vilardi
2020 E3S Web of Conferences  
And this article has launched a detailed analysis on the application of data encryption technology in the construction of electric power information.  ...  At the same time, it has carried out an in-depth discussion with the practical application of the two-layer encryption method in the informationization of electric power enterprises.  ...  Figure 1 . 1 Equal assurance evaluation of network information system Figure 2 . 2 Data Encryption Technology in Electric Power Informationization Figure 3 . 3 Double-layer encryption diagram (3) Security  ... 
doi:10.1051/e3sconf/202020402003 fatcat:nvloclapsrandbu7nulevdtu34

LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid

Aarti Amod Agarkar, Himanshu Agrawal
2019 Heliyon  
Privacy protection refers to safeguarding leakage of private information of the customers. In the context of Smart Grid, majority of the studies are based on addressing consumer side privacy.  ...  There is no previous evidence of use of R-LWE based encryption for prosumer's privacy protection in smart grid.  ...  CG communicates to PCC and informs the collective amount of electricity supply from its PCG.  ... 
doi:10.1016/j.heliyon.2019.e01321 pmid:30911691 pmcid:PMC6416661 fatcat:n7g7kavgbbdprikc3j2vm7fr5a

Transmission of frequency balance instructions and secure data sharing based on chaos encryption in smart grid-based energy systems applications

Mehmet Rida Tur, Hidayet Ogras
2021 IEEE Access  
System based on the framework of the Electricity Transmission Coordination Association (UCTE), a major part of the European Network.  ...  This situation makes the analysis of electrical power systems more and more difficult.  ... 
doi:10.1109/access.2021.3058106 fatcat:x6gcq25mvncx5dnsfijtrxif4m

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures

Robin Berthier, Jorjeta G. Jetcheva, Daisuke Mashima, Jun Ho Huh, David Grochocki, Rakesh B. Bobba, Alvaro A. Cardenas, William H. Sanders
2013 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)  
One major challenge in this endeavor is that of finding the sweet spot between the confidentiality requirements for protecting sensitive AMI traffic through encryption, and the monitoring necessary for  ...  Lessons learned from traditional cyber systems indicate that achieving resiliency requires the joint deployment of strong protective measures on the one hand, and monitoring and response mechanisms on  ...  ACKNOWLEDGMENTS This material is based upon work supported in part by the Department of Energy under Award Number DE-OE0000097 and by Fujitsu Laboratories of America.  ... 
doi:10.1109/smartgridcomm.2013.6687999 dblp:conf/smartgridcomm/BerthierJMHGBCS13 fatcat:ty55d4tqzrcefg3nsqtrsmfkyy

DSK-Based Authentication Technique for Secure Smart Grid Wireless Communication [chapter]

Mohan S. Khedkar, Vijay Shelake
2016 Advances in Computing Applications  
In this paper the concept of dynamic secret is applied to design dynamic secret based authentication and encryption scheme for smart grid wireless communication.  ...  smart grid AMI network.  ...  The electrical power industry is in the process of integrating its distribution system with communication networks and control techniques to form a bidirectional power and information flow infrastructure  ... 
doi:10.1007/978-981-10-2630-0_10 fatcat:zxhk3fzco5efli6k2kn65lhll4

Analysis on the Security Enhancement Model of Communication System Based on Chaotic Encryption and Analytic Hierarchy Process

Qianfei Huang
2017 DEStech Transactions on Social Science Education and Human Science  
The communication of the information network is completed by the communication protocol.  ...  In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process.  ...  The communication of the information network is completed by the communication protocol.  ... 
doi:10.12783/dtssehs/asshm2016/8364 fatcat:7lfpn64ikve2bb53jpheqrkz54

Event-oriented dynamic security service for demand response in smart grid employing mobile networks

Longhua Guo, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li
2015 China Communications  
As one of core technologies of smart grid employing mobile networks, Demand Response (DR) helps improving efficiency, reliability and security for electric power grid infrastructure.  ...  The works in [19] [20] [21] concentrate on the security problem existing in the communication of smart grid.  ...  One of the most important and typical information for electricity users is the changed electricity load.  ... 
doi:10.1109/cc.2015.7385529 fatcat:spbrwe4s3fhghmgiyoavu5cecq

A Secure and Anonymous Communication Scheme for Charging Information in Vehicle-to-Grid

Jingtang Luo, Shiying Yao, Jiamin Zhang, Weiting Xu, Yun He, Min Zhang
2020 IEEE Access  
With electric vehicle's charging information, the utilities can increase the efficiency and reliability of Vehicle-to-Grid (V2G) while the electric vehicle consumers can better manage their energy consumption  ...  Moreover, the proposed scheme is more resistant to traffic analysis since it preserves the anonymity of charging information by splitting and forwarding them pseudo-randomly.  ...  The V2G communication topology is built on the powerline communication (PLC) network.  ... 
doi:10.1109/access.2020.3005400 fatcat:berernp6jrakjpejfbp3tkeep4

Cyber Vulnerabilities in Smart Grid and Safety Measures for Energy Meters in Advanced Metering System and Smart Meter Communications

Afida Ayob
2019 International Journal of Advanced Trends in Computer Science and Engineering  
Besides, to ensure security of the network communication, a solution has been proposed using Elliptic Curve Cryptography (ECC) in combination with Salsa20 stream cipher algorithm.  ...  A smart grid (SG) utilizes many electronic devices that can communicate within the system and remain internally connected through implementing advanced Information and Communication Technologies (ICT).  ...  Performance Analysis of Salsa20-based encryption for Smart Meter Communication The performance of the prescribed encryption tool has been evaluated quantitively in terms of processing time and power consumption  ... 
doi:10.30534/ijatcse/2019/4881.62019 fatcat:nextqvm5e5ga3dbm4hnlmcfiqi

TTAS: Trusted Token Authentication Service of Securing SCADA Network in Energy Management System for Industrial Internet of Things

Yu-Sheng Yang, Shih-Hsiung Lee, Wei-Che Chen, Chu-Sing Yang, Yuen-Min Huang, Ting-Wei Hou
2021 Sensors  
Therefore, this paper proposes an encryption and verification mechanism based on the trusted token authentication service and Transport Layer Security (TLS) protocol to prevent attackers from physical  ...  There are many network security threats and vulnerabilities in a SCADA network system.  ...  Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/s21082685 pmid:33920332 fatcat:whzjquirefcopomptc67ms6hmi

A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack

Minmin Xie, Yong Wang, Chunming Zou, Yingjie Tian, Naiwang Guo
2020 Journal of Computer and Communications  
In order to verify the IEC 61850 protocol communication problems, we used the simulation software to build the main operating equipment in the IEC 61850 network environment of the communication system.  ...  Research on information identity authentication, message integrity and confidentiality do not pay much attention, so the realiza-  ...  Security threats faced by communications on the IEC 61850 protocol network M. M. Xie et al.  ... 
doi:10.4236/jcc.2020.811007 fatcat:oh3b7eliivhfrgiidqgkj4mr6i

Replay Attack and Defense of Electric Vehicle Charging on GB/T 27930-2015 Communication Protocol

Yafei Li, Yong Wang, Min Wu, Haiming Li
2019 Journal of Computer and Communications  
However, as the protocol adopts the way of broadcast communication and plaintext to transmit data, the data frame does not contain the source address and the destination address, making the Electric Vehicle  ...  frames one by one with the program written by C++.  ...  Conflicts of Interest The authors declare no conflicts of interest regarding the publication of this paper.  ... 
doi:10.4236/jcc.2019.712003 fatcat:ds5nfbwpvfgt3eszrqjrq757p4

Preventing Cryptographic Attacks in Iot using Lightweight P-Box Permutation Encryption

Internet of Things (IoT) is a leading technology, where numerous sensors with the ability to exchange information over the internet are involved.  ...  Efficient working of the IoT, involves continuous exchange of information between the nodes which should be executed in trusted environment as this data is confidential and only trusted nodes should handle  ...  Smart appliances are connected to Smart meters which in turn calculates and records our hourly, daily consumption of electricity, in regular intervals of time and communicates that information back to  ... 
doi:10.35940/ijitee.f4128.049620 fatcat:kgdbey5effhflc3m4kgs6kzcwq
« Previous Showing results 1 — 15 out of 19,960 results