Filters








3,014 Hits in 6.3 sec

Survey on Security Performance of Fog Computing and Existing Encryption Techniques

Sakshi Tripathi, Rakesh Kumar, Rajesh Nigam
2020 International Journal of Computer Applications  
The essential problem in fog computing is its security because of finite resources.  ...  In this survey, discussing the security concern of fog computing and will try to find the solution better than the existing solution as well.  ...  Smart Meter Fog computing helps in the improvement of the bandwidth capacity of the hardware.  ... 
doi:10.5120/ijca2020920433 fatcat:dkcpjypiljglpjquy6cc2w4334

Smart meter aggregation via secret-sharing

George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin
2013 Proceedings of the first ACM workshop on Smart energy grid security - SEGS '13  
We provide support for computing non-linear functions on encrypted readings, implemented by adapting to our setting efficient secret-sharing-based secure multi-party computation techniques.  ...  The protocol involves minimal, off-line support from the meters-a few keyed hash computations and no communication overhead.  ...  Our solution is based on extending these mechanisms with ideas from modern secret-sharing-based secure multi-party computation literature [4, 6] .  ... 
doi:10.1145/2516930.2516944 dblp:conf/ccs/DanezisFKB13 fatcat:izjdkdp7o5di3e7lo36colpgwy

A survey on Advanced Metering Infrastructure

Ramyar Rashed Mohassel, Alan Fung, Farah Mohammadi, Kaamran Raahemifar
2014 International Journal of Electrical Power & Energy Systems  
This survey paper is an excerpt of a more comprehensive study on Smart Grid (SG) and the role of Advanced Metering Infrastructure (AMI) in SG.  ...  There is no clear or fully agreed boundary and definition for intelligence of a Smart Grid, as there are a number of factors involved in designing such a system.  ...  Table 3 summarizes theft techniques in conventional meters and their effect on smart meters.  ... 
doi:10.1016/j.ijepes.2014.06.025 fatcat:7vymdr3tqvck3notpop5n2wnmy

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey [article]

Amrita Ghosal, Mauro Conti
2018 arXiv   pre-print
Advanced Metering Infrastructure (AMI) is one of the key components in smart grids. An AMI comprises of systems and networks, that collects and analyzes data received from smart meters.  ...  One of the most effective and challenging topic's identified, is the Key Management System (KMS), for sustaining the security concerns in AMI.  ...  The multi-group key graph technique used here efficiently handles the rekeying operations, while meeting the limitations of smart meters in terms of memory and bandwidth capacities.  ... 
arXiv:1806.00121v1 fatcat:kbbuv36djnby3i4rlm4fapw2ja

A blind processing framework to facilitate openness in smart grid communications

Mehmet Hadi Gunes, Murat Yuksel, Hayreddin Ceker
2015 Computer Networks  
In order to ensure the privacy and integrity of communicating parties at the distribution level, we propose to utilize the smart meters as a gateway between intra-network (i.e., HAN) and inter-network  ...  In this paper, we propose secure communication and computation services for smart grid to transform the current "closed cyber architecture" to an "open cyber architecture".  ...  In the event that a smart meter must reduce power usage, the smart meter may shut down devices based on priorities set by the homeowner [21] .  ... 
doi:10.1016/j.comnet.2015.05.004 fatcat:fat5bqm5m5dqpjj56at6e6jvum

Scalable Multi-group Key Management for Advanced Metering Infrastructure

Mourad Benmalek, Yacine Challal, Abdelmadjid Bouabdallah
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
In this paper, we propose a new Scalable multi-group key management for AMI (SAMI) to secure data communications in an Advanced Metering Infrastructure.  ...  For this reason, Key Management has been identified as one of the most challenging topics in AMI development.  ...  being exchanged between smart meters and utility system.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.27 dblp:conf/IEEEcit/BenmalekCB15 fatcat:4j43dinni5earhwufcb7tybfaa

Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources

Tiago Mendes, Radu Godina, Eduardo Rodrigues, João Matias, João Catalão
2015 Energies  
The paper discusses Home Area Networks (HAN) communication technologies for smart home and domestic application integration.  ...  A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M) communications that interacts with the surrounding environment.  ...  smart meters in Europe [58] .  ... 
doi:10.3390/en8077279 fatcat:3j2vdrhohrb23l4htw4lsns7ga

Peer-to-peer networks for virtual home environments

C. Loeser, W. Mueller, F. Berger, H.-J. Eikerling
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
We elaborate on the basic integration methodology and extend it to a general, security preserving, architectural concept based on a two level integration concept for inhome and interhome networks.  ...  The example of a Quality of Service based video streaming management demonstrates one of the potential advanced application for which peer-to-peer can be used in addition.  ...  [6] introduced a virtual home environment architecture based on multi agent systems classifying communication w.r.t. the distance of the user (in-building, neighborhood, suburban, global).  ... 
doi:10.1109/hicss.2003.1174817 dblp:conf/hicss/LoeserMBE03 fatcat:vzuqvplwazbn3hpk7l2u2bzwwa

Efficient Privacy-Preserving Multi-dimensional Data Aggregation Scheme in Smart Grid

Yang Ming, Xuanyi Zhang, Xiaoqin Shen
2019 IEEE Access  
Therefore, this paper proposes an efficient privacy-preserving multi-dimensional data aggregation (P 2 MDA) scheme in smart grid by virtue of homomorphic encryption and superincreasing sequence.  ...  The security analysis indicates that the proposed scheme is proved to be secure in the random oracle model, satisfying all security and privacy requirements.  ...  System model. meter and gateway, and saving communication bandwidth between smart meter and gateway, gateway and control center. 1) TRUSTED THIRD PARTY (TTP) The trusted third party is a trusted entity  ... 
doi:10.1109/access.2019.2903533 fatcat:kwazpki3b5ck5f5ddqgwrpjfym

A survey on smart grid communication system

Miles H.F. Wen, Ka-Cheong Leung, Victor O.K. Li, Xingze He, C.-C. Jay Kuo
2015 APSIPA Transactions on Signal and Information Processing  
This paper explores the design goals and functions of the smart grid communication system, followed by an in-depth investigation on the communication requirements.  ...  Discussions on some of the recent developments related to smart grid communication systems are also introduced.  ...  A key management scheme also has to be computationally efficient because of the limited computational and communication power of smart meters.  ... 
doi:10.1017/atsip.2015.9 fatcat:jmbp263btjc3nnoyhd6l5e4cxm

An enhanced public key infrastructure to secure smart grid wireless communication networks

Daojing He, Sammy Chan, Yan Zhang, Mohsen Guizani, Chun Chen, Jiajun Bu
2014 IEEE Network  
These networks have limited bandwidth, and their sensor nodes have limited computation and energy resources.  ...  On the other hand, with the development of the smart grid, more third-party service providers will be involved, which will introduce some new security and privacy risks into the system.  ... 
doi:10.1109/mnet.2014.6724101 fatcat:3fmm2wye6rbjfmdnpeg64b3lmi

A Smart Water Metering Deployment Based on the Fog Computing Paradigm

Dimitrios Amaxilatis, Ioannis Chatzigiannakis, Christos Tselios, Nikolaos Tsironis, Nikos Niakas, Simos Papadogeorgos
2020 Applied Sciences  
better overall computational, security and privacy capabilities to the system.  ...  In this paper, we look into smart water metering infrastructures that enable continuous, on-demand and bidirectional data exchange between metering devices, water flow equipment, utilities and end-users  ...  System Architecture, Software Services and Deployment The main entities of the fog computing-based smart water metering system presented in this paper are: (i) the smart meters deployed throughout the  ... 
doi:10.3390/app10061965 fatcat:x77ljzeqhvec3ingcsig2czhhy

An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds

Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, Viktor Prasanna
2011 2011 IEEE 4th International Conference on Cloud Computing  
Here, we present an analysis of security and privacy issues in a Smart Grids software architecture operating on different Cloud environments, in the form of a taxonomy.  ...  However, the security and privacy concerns inherent in an informationrich Smart Grid environment are further exacerbated by their deployment on Clouds.  ...  Limited security and coarse grained access control is provided for IaaS storage and compute services.  ... 
doi:10.1109/cloud.2011.107 dblp:conf/IEEEcloud/SimmhanKCP11 fatcat:g4nhyvszebcofj5ipddfuu65dy

Bandwidth Efficient Secure Authentication and Encryption Techniques on IEC-60870-5-104 for Remote Outstations

Kinan Ghanem, Jidapa Hansawangkit, Rameez Asif, Stephen Ugwuanyi, Ross McPherson, James Irvine
2021 2021 International Conference on Smart Applications, Communications and Networking (SmartNets)  
This work is based on the contributions and analysis from several ongoing technical projects and research activities of applying several security approaches in smart grid, namely, secondary substation  ...  The bandwidth requirements of Secure Authentication (SA), Transport Layer Security (TLS) and Internet Protocol Security (IPsec) encryption needed to secure future smart grid is presented along with a comparison  ...  A novel smart meter authentication scheme as proposed in [7] secured smart grid communication based on Verifiable Random Function (VRF) using Elliptic Curve Cryptography (ECC).  ... 
doi:10.1109/smartnets50376.2021.9555411 fatcat:kxhsfeutgvfxliuyzwmkgzl4vi

Big Data management in smart grid: concepts, requirements and implementation

Houda Daki, Asmaa El Hannani, Abdelhak Aqqal, Abdelfattah Haidine, Aziz Dahbi
2017 Journal of Big Data  
In essence, smart grids bring profound changes in the information systems that drive them: new information flows coming from the electricity grid, new players such as decentralized producers of renewable  ...  energies, new uses such as electric vehicles and connected houses and new communicating equipments such as smart meters, sensors and remote control points.  ...  Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.  ... 
doi:10.1186/s40537-017-0070-y fatcat:cfpfielxorc7lfk6mqrsxmanhe
« Previous Showing results 1 — 15 out of 3,014 results