A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions
2012
2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)
In this paper, we propose an approach based on PUF (physically unclonable function) technology for providing strong hardware based authentication of smart meters and efficient key management to assure ...
In particular, as data travels through several networks, secure end-to-end communication based on strong authentication mechanisms and a robust and scalable key management schemes are crucial for assuring ...
Navaratne from the Smart Meter Integration Lab (SMIL) of Purdue University for their valuable information on smart meters and providing smart meters for the proof-of-concept implementation. ...
doi:10.1109/smartgridcomm.2012.6486004
dblp:conf/smartgridcomm/NabeelKDB12
fatcat:e6rpzkko2ra55gq45ebwzqkshq
Physical Unclonable Function (PUF)-Based Sustainable Cybersecurity
2021
IEEE Consumer Electronics Magazine
The article "A Secure Hardware-Assisted AMI Authentication Scheme for Smart Cities" proposes a hardware-assisted framework for advanced metering infrastructure (AMI) networks to achieve end-to-end key ...
& THIS SPECIAL SECTION investigates the potential use of physically unclonable functions (PUFs) as a hardware security approach for sustainable cybersecurity. ...
doi:10.1109/mce.2021.3065857
fatcat:3oyojhsnjjbubl3ikqdranvwgm
Salsa20 based lightweight security scheme for smart meter communication in smart grid
2020
TELKOMNIKA (Telecommunication Computing Electronics and Control)
Among thousands of electronic devices connected to the grid through communication network, smart meter (SM) is the core networking device. ...
Therefore, for protecting the network from the adversaries it is required to design lightweight security mechanism for SM, as conventional cryptography schemes poses extensive computational cost, processing ...
In [10] the authors have proposed a novel authentication scheme based on ring oscillator physically unclonable functions for AMI network. ...
doi:10.12928/telkomnika.v18i1.14798
fatcat:hct4nsku5fhqvp6myva4c4ilbi
Cyber Security for Smart Grid � The Backbone of Social Economy
2016
Journal of Cyber Security and Mobility
Aging equipments and manual meter reading, power line failure detection and power quality measurements result in lot of power losses and delays. ...
Electricity theft, authentication, authorization, trust ranking, distributed denial of service attack, man in the middle attack are the real challenges for smart grid. ...
Physically Unclonable Function (PUF) technology hardware based. f. Authenticated symmetric encryption algorithm.
Biographies V. M. ...
doi:10.13052/jcsm2245-1439.514
fatcat:iqnxdtq6z5bzxl5e3cx62aqmau
Cyber-physical systems: A security perspective
2015
2015 20th IEEE European Test Symposium (ETS)
This paper focuses on security and privacy concerns at different levels of the composition and presents system level solutions for ensuring the security and trust of modern cyber-physical systems. 978- ...
Considering the remarkable progress in CPS technologies during recent years, advancement in security and trust measures is much needed to counter the security violations and privacy leakage of integration ...
The massive deployment of advanced metering infrastructure (AMI) and home energy management system has mandated a transformative shift of the classical grid into a more reliable and secure grid, resulting ...
doi:10.1109/ets.2015.7138763
dblp:conf/ets/KonstantinouMSH15
fatcat:ab6mjbsj7zhyhjixe5z7qjexye
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey
[article]
2018
arXiv
pre-print
This survey work highlights the key security issues of advanced metering infrastructures and focuses on how key management techniques can be utilized for safeguarding AMI. ...
Advanced Metering Infrastructure (AMI) is one of the key components in smart grids. An AMI comprises of systems and networks, that collects and analyzes data received from smart meters. ...
We provide a comprehensive survey of the key management system of advanced metering infrastructure in smart grid. ...
arXiv:1806.00121v1
fatcat:kbbuv36djnby3i4rlm4fapw2ja
Hybrid Key Management Scheme for Secure AMI Communications
2016
Procedia Computer Science
To ensure confidentiality, integrity and authenticity, a Key Management Scheme (KMS) for hybrid communication modes is proposed. ...
Advanced Metering Infrastructure (AMI) is an essential attribute of Smart Grid. ...
., Research Associate, Centre for Computational Engineering and Networking, and Mr. M. ...
doi:10.1016/j.procs.2016.07.260
fatcat:cf7dwizobzhntlrdbkxjl5ic2i
Encryption key management for secure communication in smart advanced metering infrastructures
2013
2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)
By applying certificateless public key cryptography for smart meter key management, our approach eliminates certificate management overhead at the utility. ...
Because of these important benefits, conventional power grid systems are being replaced with new, advanced smart grid systems utilizing Advanced Metering Infrastructures (AMIs). ...
Their approach utilizes a Physically Unclonable Function (PUF) hardware device for authentication and key management. ...
doi:10.1109/smartgridcomm.2013.6688007
dblp:conf/smartgridcomm/SeoDB13
fatcat:dqrwknxzq5eannkexm37yzdiga
Cyber-Physical System Security Open Challenges in Smart Water Network
2020
Zenodo
According to the SWAN forum, the other SWN layers are: 1) physical, sensing and control, 2) collection and communication, 3) data management and display and 4) data fusion and analysis. ...
Moreover, the impact of these attacks on SWNs is discussed and recommendations for security procedures to be followed by water utilities are proposed. ...
This threat can be mitigated by implementing a secure booting scheme which involves a lightweight physical layer authentication such as unclonable function [3] and weighted hash function cryptographic ...
doi:10.5281/zenodo.3661100
fatcat:5ufvl5rovfeddphaknhx6p6xim
A Novel Approach for Detecting and Mitigating the Energy Theft Issues in the Smart Metering Infrastructure
2018
Technology and Economics of Smart Grids and Sustainable Energy
This novel method successfully detects and mitigates energy theft in the Smart Metering and Advanced Metering Infrastructure. ...
detection algorithm, Meter Data Tampering Algorithm (MDTA) and we suggest inserting a one-way function, named as Unique String Authentication Procedure (USAP) into the smart meter which is also stored ...
There have been few improvements with the use of physical unclonable functions, so that the hardware cannot be compromised and non-interactive distribution network between smart meters are geared with ...
doi:10.1007/s40866-018-0053-x
fatcat:agivqgn6hrabrlrwin4h2x3n7u
A lightweight security scheme for advanced metering infrastructures in smart grid
2020
Bulletin of Electrical Engineering and Informatics
In this paper, a lightweight security scheme has been proposed consolidating ChaCha20 data encryption method, chaos based key generation and public key -based authentication scheme. ...
It consists of smart meter (SM) at customers end, communicat ion network, meter data management system (MDMS), software applicat ions, interfaces. ...
To provide authentication and integrity, the authors in [8] proposed a mechanism that uses low cost hardware named physically unclonable function (PUF) and CSI based encryption mechanis m. ...
doi:10.11591/eei.v9i2.2086
fatcat:kxkqkfwxtfddbb552nx7t4t5ay
Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy
2020
Sensors
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. ...
authentication, thus possible to track the sources and reasons of any cyber attack. ...
) and use-cases in the energy utilities. ...
doi:10.3390/s21010028
pmid:33374599
pmcid:PMC7793093
fatcat:h2b4djvqojdehjxrku4nkjl2dq
Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication
2018
IEEE Transactions on Smart Grid
In this regard, we utilize the lightweight cryptographic primitives such as Physically Uncloneable Functions (PUFs) and one-way hash function, etc. ...
In this paper, we propose a novel privacy-aware authenticated key agreement scheme which can not only ensure secure communication between the smart meters and the service provider, but also the physical ...
ACKNOWLEDGMENT This research was supported by the National Research Foundation, Prime Minister's Office, Singapore under its Corporate Laboratory@University Scheme, National University of Singapore, and ...
doi:10.1109/tsg.2018.2844403
fatcat:vhpepzi3ivanfijptdzau2ivrq
Hybrid Cryptography Algorithm with Precomputation for Advanced Metering Infrastructure Networks
2017
Journal on spesial topics in mobile networks and applications
Elliptic Curve Integrated Encryption Scheme (ECIES) and Advanced Encryption Scheme (AES) are chosen as the building blocks for the proposed scheme. ...
In this paper, we propose a sophisticated hybrid encryption scheme that incorporates public and symmetric key encryptions to secure smart metering network. ...
The model is based on using weak Physically Unclonable Functions (PUFs) as a security primitive to provide strong hardware based authentication for smart meters and collectors. ...
doi:10.1007/s11036-017-0956-0
fatcat:bq6efgw4n5ah5jvhdzkp2snwrq
Introduction to Cyber-Physical System Security: A Cross-Layer Perspective
2017
IEEE Transactions on Multi-Scale Computing Systems
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. ...
Compromise of these systems in critical infrastructure will cause catastrophic consequences. ...
In recent years, physical unclonable function (PUF), which enables the challenge-response authentication for secure communications, gains significant popularity. ...
doi:10.1109/tmscs.2016.2569446
fatcat:fxgrfxbiufcwtawupcjwe5n3ti
« Previous
Showing results 1 — 15 out of 141 results