489 Hits in 4.5 sec

On Lightweight Authentication for Smart Grid Network

Vaidehi Dudhwadkar, Himanshu Agarwal, Aarti Agarkar, Pratish Ray
2015 International Journal of Computer Applications  
In the last 6-7 years, there is a rapid growth in the development of Smart Grid Network on earth.  ...  In this multilayer environment, there are different layers of communications such as Appliance to Home Area Network (HAN), HAN to Building Area Network (BAN) and BAN to Neighbourhood Area Network (NAN)  ...  Also J-PAKE protects passwords without relying on Public Key Infrastructure (PKI).The study, concludes that MCPAKE and MCEPAKE protocols incur lower load than PAKE, EPAKE and JPAKE for computations using  ... 
doi:10.5120/ijca2015905307 fatcat:6j6mjoc3xvca5mnr7244yhl4ei

Securing critical infrastructure

Michael Schukat
2014 The 10th International Conference on Digital Technologies 2014  
This paper will provide an overview of the cyber threat landscape in smart grid infrastructure from a Machine-to-Machine (M2M) communication perspective and discuss the role of PKI and authentication protocols  ...  This complexity can only be dealt with effectively with the rollout of complex ICT systems that will play a significant role in managing, planning, and securing the energy infrastructure.  ...  Smart grid is a generic term for the application of computer intelligence and computer networking to electricity distribution systems [5] .  ... 
doi:10.1109/dt.2014.6868731 fatcat:wqep7kzf3vdupaftqoknnwbxgy

An enhanced public key infrastructure to secure smart grid wireless communication networks

Daojing He, Sammy Chan, Yan Zhang, Mohsen Guizani, Chun Chen, Jiajun Bu
2014 IEEE Network  
These networks have limited bandwidth, and their sensor nodes have limited computation and energy resources.  ...  In this article, we first identify the requirements to secure smart grid wireless communication networks, and argue that public key infrastructure (PKI) is a promising solution.  ... 
doi:10.1109/mnet.2014.6724101 fatcat:3fmm2wye6rbjfmdnpeg64b3lmi

Addressing cloud computing security issues

Dimitrios Zissis, Dimitrios Lekkas
2012 Future generations computer systems  
Grid and cloud computing Grid Computing emerged in the early 1990s, as high performance computers were inter-connected via fast data communication links, with the aim of supporting complex calculations  ...  The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data  ...  According to Merrill Lynch, what makes cloud computing new and differentiates it from Grid Computing is virtualization: ''Cloud computing, unlike grid computing, leverages virtualization to maximize computing  ... 
doi:10.1016/j.future.2010.12.006 fatcat:j7wh6nux25ha7hlpuknlw443xi

Self-organised Key Management for the Smart Grid [chapter]

Foivos F. Demertzis, Georgios Karopoulos, Christos Xenakis, Andrea Colarieti
2015 Lecture Notes in Computer Science  
Smart Grid poses special requirements compared to traditional networks; however, the review of previous work reveals that existing schemes are not complete.  ...  Here we propose a scalable and distributed key management scheme for the Smart Grid based on the Web-of-Trust concept.  ...  On the other hand, upgrading such a large and complex system, like the Smart Grid, could introduce new vulnerabilities and expose it to common cyberthreats, as have been described in relevant survey articles  ... 
doi:10.1007/978-3-319-19662-6_21 fatcat:yzvsfyrgtfgivgkosxccnc4kyq

Analysis and Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol for Grid Computing

Amr Farouk, Mohamed M. Fouad, Ahmed A. Abdelhafez
2014 International Journal of Security Privacy and Trust Management  
Nonetheless, certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the demands of grid computing.  ...  The predominant grid authentication mechanisms use public key infrastructure (PKI).  ...  in hierarchical PKIs, certificate revocation, and poor usability.  ... 
doi:10.5121/ijsptm.2014.3103 fatcat:u6hcftm7fbeprai6gmqn3dik7a

An Empirical Study of Security Issues in Grid Middleware

Dr. Jayeshkumar Madhubhai Patel
2019 Figshare  
With the passing of each day, Grid computing and Cloud computing are becoming an important integral part of various applications.  ...  The information security issues are there all over the field of Grid computing.  ...  The X.509 certificate [2] works as follows -Asymmetric key algorithms of cryptography are used in which the encryption and decryption keys are different.  ... 
doi:10.6084/m9.figshare.7824908.v1 fatcat:nf2vmmnlprao7ixvgcqlgtmckq

Securing the Electric Vehicle Charging Infrastructure [article]

Roberto Metere, Myriam Neaimeh, Charles Morisset, Carsten Maple, Xavier Bellekens, Ricardo M. Czekster
2022 arXiv   pre-print
Smart and V2G chargers connect EVs to the power grid using a charging device which includes a data connection to exchange information and control commands between various entities in the EV ecosystem.  ...  Such control assists in balancing electricity supply and demand across a green electricity system and could reduce costs for consumers.  ...  , grid network operators, among others.  ... 
arXiv:2105.02905v2 fatcat:ztn7u2g4z5gslbelnt2ndqiaxe

Cyber Vulnerabilities in Smart Grid and Safety Measures for Energy Meters in Advanced Metering System and Smart Meter Communications

Afida Ayob
2019 International Journal of Advanced Trends in Computer Science and Engineering  
Besides, to ensure security of the network communication, a solution has been proposed using Elliptic Curve Cryptography (ECC) in combination with Salsa20 stream cipher algorithm.  ...  As the connected devices have significant limitations in terms of resource and computational processing power, it calls for developing a lightweight safety measures for those devices which would require  ...  Some traditional cryptography techniques are used to prevent such attacks such as PKI-dependent schemes or digital signatures.  ... 
doi:10.30534/ijatcse/2019/4881.62019 fatcat:nextqvm5e5ga3dbm4hnlmcfiqi

Security Analysis of Two Recent Pairing-Free Certificateless Two-Party Authenticated Key Agreement Protocols for Smart Grid [article]

Yong-Jin Kim, Dok-Jun An, Son-Gyong Kim, Kum-Sok Sin, You-Jin Jong, Ok-Chol Ri
2022 arXiv   pre-print
Until now, various protocols have been proposed, and these protocols are being introduced and operated not only in smart grid, but also in smart cities, healthcare, and vehicle ad hoc networks.  ...  Smart grids are intelligent power transmission networks that monitor and control communication participants and grid nodes to ensure bidirectional flow of information and power between all nodes.  ...  ACKNOWLEDGMENT We thank the anonymous reviewers, associate editors, and Editor-in-Chief for their valuable feedback on the paper.  ... 
arXiv:2203.01504v2 fatcat:wc3sqh2u4nbdrlfxrn4fpdvowq

A Certificateless Authenticated Key Agreement Scheme for the Power IoT

Wenchao Cui, Rui Cheng, Kehe Wu, Yuling Su, Yuqing Lei
2021 Energies  
And the traditional public key infrastructure (PKI) and identity-based public key cryptography (IB-PKC) exist the problems of certificate management and key escrow.  ...  Power Internet of Things (IoT) is the application of IoT technology in the field of power grid, which can better control all kinds of power equipment, power personnel and operating environment.  ...  Data Availability Statement: No new data were created or analyzed in this study. Data sharing is not applicable to this article. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/en14196317 fatcat:b6oqmnnmejdh5cqbtroitffrby

Never Mind Pearl Harbor--What about a Cyber Love Canal?

Sean W. Smith, John S. Erickson
2015 IEEE Security and Privacy  
with each other and all other networked computers.  ...  If a computer professional has trouble reasoning about which computers (that look like computers) in the house might expose the Bash vulnerability today, how will anyone reason effectively about risk and  ... 
doi:10.1109/msp.2015.37 fatcat:obf3wkwhenee7kyfhboe7je5fa

Encryption key management for secure communication in smart advanced metering infrastructures

Seung-Hyun Seo, Xiaoyu Ding, Elisa Bertino
2013 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)  
However, the increased use of ICT makes smart grid systems vulnerable to cyber-attacks, such as spoofing, eavesdropping and man-in-the-middle attacks.  ...  IEEE SmartGridComm 2013 Symposium -Smart Grid Cyber Security and Privacy 978-1-4799-1526-2/13/$31.00 ©2013 IEEE the EAX' mode, where EAX' is a variant of the EAX mode [2], is specified in ANSI C12.22 as  ...  According to recent work [6] , key management mechanisms for securing the smart grid should be based on Public Key Cryptography (PKC) and a Public Key Infrastructure (PKI), as they have lower key management  ... 
doi:10.1109/smartgridcomm.2013.6688007 dblp:conf/smartgridcomm/SeoDB13 fatcat:dqrwknxzq5eannkexm37yzdiga

A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things

Manisha Malik, Maitreyee Dutta, Jorge Granjal
2019 IEEE Access  
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things.  ...  We also identify and discuss the main challenges of implementing such methods in the context of IoT applications and devices, together with the main avenues for conducting further research in the area.  ...  The proposed model delegates a major portion of the heavy PKI computations to the edge router, and the responsibilities of this router include gathering the public keys of all nodes in the 6LoWPAN network  ... 
doi:10.1109/access.2019.2900957 fatcat:fbpg4ydg55bg5okyljo67hycqq

Re-thinking Grid Security Architecture

Yuri Demchenko, Cees de Laat, Oscar Koeroo, David Groep
2008 2008 IEEE Fourth International Conference on eScience  
Recent developments in open systems security, and revisiting basic security concepts in networking and computing including the OSI Security Architecture and the concepts used in the Trusted Computing Base  ...  Via this paper we aim to share some observations on current security models and solutions found in Grid architectures and deployments today and identify architectural limitations in solving complex access  ...  Authentication in Grids is based on PKI and can use different types of (user) credentials (PKI, SAML, Kerberos tickets, password, etc.).  ... 
doi:10.1109/escience.2008.53 dblp:conf/eScience/DemchenkoLKG08 fatcat:b6l3sodzzbbe5b2sgs2j4ofoja
« Previous Showing results 1 — 15 out of 489 results