Filters








141 Hits in 4.5 sec

Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions

Mohamed Nabeel, Sam Kerr, Xiaoyu Ding, Elisa Bertino
2012 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)  
In this paper, we propose an approach based on PUF (physically unclonable function) technology for providing strong hardware based authentication of smart meters and efficient key management to assure  ...  In particular, as data travels through several networks, secure end-to-end communication based on strong authentication mechanisms and a robust and scalable key management schemes are crucial for assuring  ...  Navaratne from the Smart Meter Integration Lab (SMIL) of Purdue University for their valuable information on smart meters and providing smart meters for the proof-of-concept implementation.  ... 
doi:10.1109/smartgridcomm.2012.6486004 dblp:conf/smartgridcomm/NabeelKDB12 fatcat:e6rpzkko2ra55gq45ebwzqkshq

Physical Unclonable Function (PUF)-Based Sustainable Cybersecurity

Himanshu Thapliyal, Saraju Mohanty
2021 IEEE Consumer Electronics Magazine  
The article "A Secure Hardware-Assisted AMI Authentication Scheme for Smart Cities" proposes a hardware-assisted framework for advanced metering infrastructure (AMI) networks to achieve end-to-end key  ...  & THIS SPECIAL SECTION investigates the potential use of physically unclonable functions (PUFs) as a hardware security approach for sustainable cybersecurity.  ... 
doi:10.1109/mce.2021.3065857 fatcat:3oyojhsnjjbubl3ikqdranvwgm

Salsa20 based lightweight security scheme for smart meter communication in smart grid

S. M. Salim Reza, Md Murshedul Arifeen, Sieh Kiong Tiong, Md Akhteruzzaman, Nowshad Amin, Mohammad Shakeri, Afida Ayob, Aini Hussain
2020 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
Among thousands of electronic devices connected to the grid through communication network, smart meter (SM) is the core networking device.  ...  Therefore, for protecting the network from the adversaries it is required to design lightweight security mechanism for SM, as conventional cryptography schemes poses extensive computational cost, processing  ...  In [10] the authors have proposed a novel authentication scheme based on ring oscillator physically unclonable functions for AMI network.  ... 
doi:10.12928/telkomnika.v18i1.14798 fatcat:hct4nsku5fhqvp6myva4c4ilbi

Cyber Security for Smart Grid � The Backbone of Social Economy

Vandana Rohokale, Ramjee Prasad
2016 Journal of Cyber Security and Mobility  
Aging equipments and manual meter reading, power line failure detection and power quality measurements result in lot of power losses and delays.  ...  Electricity theft, authentication, authorization, trust ranking, distributed denial of service attack, man in the middle attack are the real challenges for smart grid.  ...  Physically Unclonable Function (PUF) technology hardware based. f. Authenticated symmetric encryption algorithm. Biographies V. M.  ... 
doi:10.13052/jcsm2245-1439.514 fatcat:iqnxdtq6z5bzxl5e3cx62aqmau

Cyber-physical systems: A security perspective

Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, Yier Jin
2015 2015 20th IEEE European Test Symposium (ETS)  
This paper focuses on security and privacy concerns at different levels of the composition and presents system level solutions for ensuring the security and trust of modern cyber-physical systems. 978-  ...  Considering the remarkable progress in CPS technologies during recent years, advancement in security and trust measures is much needed to counter the security violations and privacy leakage of integration  ...  The massive deployment of advanced metering infrastructure (AMI) and home energy management system has mandated a transformative shift of the classical grid into a more reliable and secure grid, resulting  ... 
doi:10.1109/ets.2015.7138763 dblp:conf/ets/KonstantinouMSH15 fatcat:ab6mjbsj7zhyhjixe5z7qjexye

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey [article]

Amrita Ghosal, Mauro Conti
2018 arXiv   pre-print
This survey work highlights the key security issues of advanced metering infrastructures and focuses on how key management techniques can be utilized for safeguarding AMI.  ...  Advanced Metering Infrastructure (AMI) is one of the key components in smart grids. An AMI comprises of systems and networks, that collects and analyzes data received from smart meters.  ...  We provide a comprehensive survey of the key management system of advanced metering infrastructure in smart grid.  ... 
arXiv:1806.00121v1 fatcat:kbbuv36djnby3i4rlm4fapw2ja

Hybrid Key Management Scheme for Secure AMI Communications

Nithin George, S. Nithin, Sasi K. Kottayil
2016 Procedia Computer Science  
To ensure confidentiality, integrity and authenticity, a Key Management Scheme (KMS) for hybrid communication modes is proposed.  ...  Advanced Metering Infrastructure (AMI) is an essential attribute of Smart Grid.  ...  ., Research Associate, Centre for Computational Engineering and Networking, and Mr. M.  ... 
doi:10.1016/j.procs.2016.07.260 fatcat:cf7dwizobzhntlrdbkxjl5ic2i

Encryption key management for secure communication in smart advanced metering infrastructures

Seung-Hyun Seo, Xiaoyu Ding, Elisa Bertino
2013 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)  
By applying certificateless public key cryptography for smart meter key management, our approach eliminates certificate management overhead at the utility.  ...  Because of these important benefits, conventional power grid systems are being replaced with new, advanced smart grid systems utilizing Advanced Metering Infrastructures (AMIs).  ...  Their approach utilizes a Physically Unclonable Function (PUF) hardware device for authentication and key management.  ... 
doi:10.1109/smartgridcomm.2013.6688007 dblp:conf/smartgridcomm/SeoDB13 fatcat:dqrwknxzq5eannkexm37yzdiga

Cyber-Physical System Security Open Challenges in Smart Water Network

Haitham Hassan M. Mahmoud, Wenyan Wu
2020 Zenodo  
According to the SWAN forum, the other SWN layers are: 1) physical, sensing and control, 2) collection and communication, 3) data management and display and 4) data fusion and analysis.  ...  Moreover, the impact of these attacks on SWNs is discussed and recommendations for security procedures to be followed by water utilities are proposed.  ...  This threat can be mitigated by implementing a secure booting scheme which involves a lightweight physical layer authentication such as unclonable function [3] and weighted hash function cryptographic  ... 
doi:10.5281/zenodo.3661100 fatcat:5ufvl5rovfeddphaknhx6p6xim

A Novel Approach for Detecting and Mitigating the Energy Theft Issues in the Smart Metering Infrastructure

Pallab Ganguly, Mita Nasipuri, Sourav Dutta
2018 Technology and Economics of Smart Grids and Sustainable Energy  
This novel method successfully detects and mitigates energy theft in the Smart Metering and Advanced Metering Infrastructure.  ...  detection algorithm, Meter Data Tampering Algorithm (MDTA) and we suggest inserting a one-way function, named as Unique String Authentication Procedure (USAP) into the smart meter which is also stored  ...  There have been few improvements with the use of physical unclonable functions, so that the hardware cannot be compromised and non-interactive distribution network between smart meters are geared with  ... 
doi:10.1007/s40866-018-0053-x fatcat:agivqgn6hrabrlrwin4h2x3n7u

A lightweight security scheme for advanced metering infrastructures in smart grid

S. M. Salim Reza, Afida Ayob, Md Murshedul Arifeen, Nowshad Amin, Mohd Hanif Md Saad, Aini Hussain
2020 Bulletin of Electrical Engineering and Informatics  
In this paper, a lightweight security scheme has been proposed consolidating ChaCha20 data encryption method, chaos based key generation and public key -based authentication scheme.  ...  It consists of smart meter (SM) at customers end, communicat ion network, meter data management system (MDMS), software applicat ions, interfaces.  ...  To provide authentication and integrity, the authors in [8] proposed a mechanism that uses low cost hardware named physically unclonable function (PUF) and CSI based encryption mechanis m.  ... 
doi:10.11591/eei.v9i2.2086 fatcat:kxkqkfwxtfddbb552nx7t4t5ay

Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy

Rameez Asif, Kinan Ghanem, James Irvine
2020 Sensors  
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article.  ...  authentication, thus possible to track the sources and reasons of any cyber attack.  ...  ) and use-cases in the energy utilities.  ... 
doi:10.3390/s21010028 pmid:33374599 pmcid:PMC7793093 fatcat:h2b4djvqojdehjxrku4nkjl2dq

Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication

Prosanta Gope, Biplab Sikdar
2018 IEEE Transactions on Smart Grid  
In this regard, we utilize the lightweight cryptographic primitives such as Physically Uncloneable Functions (PUFs) and one-way hash function, etc.  ...  In this paper, we propose a novel privacy-aware authenticated key agreement scheme which can not only ensure secure communication between the smart meters and the service provider, but also the physical  ...  ACKNOWLEDGMENT This research was supported by the National Research Foundation, Prime Minister's Office, Singapore under its Corporate Laboratory@University Scheme, National University of Singapore, and  ... 
doi:10.1109/tsg.2018.2844403 fatcat:vhpepzi3ivanfijptdzau2ivrq

Hybrid Cryptography Algorithm with Precomputation for Advanced Metering Infrastructure Networks

Samer Khasawneh, Michel Kadoch
2017 Journal on spesial topics in mobile networks and applications  
Elliptic Curve Integrated Encryption Scheme (ECIES) and Advanced Encryption Scheme (AES) are chosen as the building blocks for the proposed scheme.  ...  In this paper, we propose a sophisticated hybrid encryption scheme that incorporates public and symmetric key encryptions to secure smart metering network.  ...  The model is based on using weak Physically Unclonable Functions (PUFs) as a security primitive to provide strong hardware based authentication for smart meters and collectors.  ... 
doi:10.1007/s11036-017-0956-0 fatcat:bq6efgw4n5ah5jvhdzkp2snwrq

Introduction to Cyber-Physical System Security: A Cross-Layer Perspective

Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark Tehranipoor
2017 IEEE Transactions on Multi-Scale Computing Systems  
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc.  ...  Compromise of these systems in critical infrastructure will cause catastrophic consequences.  ...  In recent years, physical unclonable function (PUF), which enables the challenge-response authentication for secure communications, gains significant popularity.  ... 
doi:10.1109/tmscs.2016.2569446 fatcat:fxgrfxbiufcwtawupcjwe5n3ti
« Previous Showing results 1 — 15 out of 141 results