A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
On Lightweight Authentication for Smart Grid Network
2015
International Journal of Computer Applications
In the last 6-7 years, there is a rapid growth in the development of Smart Grid Network on earth. ...
In this multilayer environment, there are different layers of communications such as Appliance to Home Area Network (HAN), HAN to Building Area Network (BAN) and BAN to Neighbourhood Area Network (NAN) ...
Also J-PAKE protects passwords without relying on Public Key Infrastructure (PKI).The study, concludes that MCPAKE and MCEPAKE protocols incur lower load than PAKE, EPAKE and JPAKE for computations using ...
doi:10.5120/ijca2015905307
fatcat:6j6mjoc3xvca5mnr7244yhl4ei
Securing critical infrastructure
2014
The 10th International Conference on Digital Technologies 2014
This paper will provide an overview of the cyber threat landscape in smart grid infrastructure from a Machine-to-Machine (M2M) communication perspective and discuss the role of PKI and authentication protocols ...
This complexity can only be dealt with effectively with the rollout of complex ICT systems that will play a significant role in managing, planning, and securing the energy infrastructure. ...
Smart grid is a generic term for the application of computer intelligence and computer networking to electricity distribution systems [5] . ...
doi:10.1109/dt.2014.6868731
fatcat:wqep7kzf3vdupaftqoknnwbxgy
An enhanced public key infrastructure to secure smart grid wireless communication networks
2014
IEEE Network
These networks have limited bandwidth, and their sensor nodes have limited computation and energy resources. ...
In this article, we first identify the requirements to secure smart grid wireless communication networks, and argue that public key infrastructure (PKI) is a promising solution. ...
doi:10.1109/mnet.2014.6724101
fatcat:3fmm2wye6rbjfmdnpeg64b3lmi
Addressing cloud computing security issues
2012
Future generations computer systems
Grid and cloud computing Grid Computing emerged in the early 1990s, as high performance computers were inter-connected via fast data communication links, with the aim of supporting complex calculations ...
The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data ...
According to Merrill Lynch, what makes cloud computing new and differentiates it from Grid Computing is virtualization: ''Cloud computing, unlike grid computing, leverages virtualization to maximize computing ...
doi:10.1016/j.future.2010.12.006
fatcat:j7wh6nux25ha7hlpuknlw443xi
Self-organised Key Management for the Smart Grid
[chapter]
2015
Lecture Notes in Computer Science
Smart Grid poses special requirements compared to traditional networks; however, the review of previous work reveals that existing schemes are not complete. ...
Here we propose a scalable and distributed key management scheme for the Smart Grid based on the Web-of-Trust concept. ...
On the other hand, upgrading such a large and complex system, like the Smart Grid, could introduce new vulnerabilities and expose it to common cyberthreats, as have been described in relevant survey articles ...
doi:10.1007/978-3-319-19662-6_21
fatcat:yzvsfyrgtfgivgkosxccnc4kyq
Analysis and Improvement of Pairing-Free Certificate-Less Two-Party Authenticated Key Agreement Protocol for Grid Computing
2014
International Journal of Security Privacy and Trust Management
Nonetheless, certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the demands of grid computing. ...
The predominant grid authentication mechanisms use public key infrastructure (PKI). ...
in hierarchical PKIs, certificate revocation, and poor usability. ...
doi:10.5121/ijsptm.2014.3103
fatcat:u6hcftm7fbeprai6gmqn3dik7a
An Empirical Study of Security Issues in Grid Middleware
2019
Figshare
With the passing of each day, Grid computing and Cloud computing are becoming an important integral part of various applications. ...
The information security issues are there all over the field of Grid computing. ...
The X.509 certificate [2] works as follows -Asymmetric key algorithms of cryptography are used in which the encryption and decryption keys are different. ...
doi:10.6084/m9.figshare.7824908.v1
fatcat:nf2vmmnlprao7ixvgcqlgtmckq
Securing the Electric Vehicle Charging Infrastructure
[article]
2022
arXiv
pre-print
Smart and V2G chargers connect EVs to the power grid using a charging device which includes a data connection to exchange information and control commands between various entities in the EV ecosystem. ...
Such control assists in balancing electricity supply and demand across a green electricity system and could reduce costs for consumers. ...
, grid network operators, among others. ...
arXiv:2105.02905v2
fatcat:ztn7u2g4z5gslbelnt2ndqiaxe
Cyber Vulnerabilities in Smart Grid and Safety Measures for Energy Meters in Advanced Metering System and Smart Meter Communications
2019
International Journal of Advanced Trends in Computer Science and Engineering
Besides, to ensure security of the network communication, a solution has been proposed using Elliptic Curve Cryptography (ECC) in combination with Salsa20 stream cipher algorithm. ...
As the connected devices have significant limitations in terms of resource and computational processing power, it calls for developing a lightweight safety measures for those devices which would require ...
Some traditional cryptography techniques are used to prevent such attacks such as PKI-dependent schemes or digital signatures. ...
doi:10.30534/ijatcse/2019/4881.62019
fatcat:nextqvm5e5ga3dbm4hnlmcfiqi
Security Analysis of Two Recent Pairing-Free Certificateless Two-Party Authenticated Key Agreement Protocols for Smart Grid
[article]
2022
arXiv
pre-print
Until now, various protocols have been proposed, and these protocols are being introduced and operated not only in smart grid, but also in smart cities, healthcare, and vehicle ad hoc networks. ...
Smart grids are intelligent power transmission networks that monitor and control communication participants and grid nodes to ensure bidirectional flow of information and power between all nodes. ...
ACKNOWLEDGMENT We thank the anonymous reviewers, associate editors, and Editor-in-Chief for their valuable feedback on the paper. ...
arXiv:2203.01504v2
fatcat:wc3sqh2u4nbdrlfxrn4fpdvowq
A Certificateless Authenticated Key Agreement Scheme for the Power IoT
2021
Energies
And the traditional public key infrastructure (PKI) and identity-based public key cryptography (IB-PKC) exist the problems of certificate management and key escrow. ...
Power Internet of Things (IoT) is the application of IoT technology in the field of power grid, which can better control all kinds of power equipment, power personnel and operating environment. ...
Data Availability Statement: No new data were created or analyzed in this study. Data sharing is not applicable to this article.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/en14196317
fatcat:b6oqmnnmejdh5cqbtroitffrby
Never Mind Pearl Harbor--What about a Cyber Love Canal?
2015
IEEE Security and Privacy
with each other and all other networked computers. ...
If a computer professional has trouble reasoning about which computers (that look like computers) in the house might expose the Bash vulnerability today, how will anyone reason effectively about risk and ...
doi:10.1109/msp.2015.37
fatcat:obf3wkwhenee7kyfhboe7je5fa
Encryption key management for secure communication in smart advanced metering infrastructures
2013
2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)
However, the increased use of ICT makes smart grid systems vulnerable to cyber-attacks, such as spoofing, eavesdropping and man-in-the-middle attacks. ...
IEEE SmartGridComm 2013 Symposium -Smart Grid Cyber Security and Privacy 978-1-4799-1526-2/13/$31.00 ©2013 IEEE the EAX' mode, where EAX' is a variant of the EAX mode [2], is specified in ANSI C12.22 as ...
According to recent work [6] , key management mechanisms for securing the smart grid should be based on Public Key Cryptography (PKC) and a Public Key Infrastructure (PKI), as they have lower key management ...
doi:10.1109/smartgridcomm.2013.6688007
dblp:conf/smartgridcomm/SeoDB13
fatcat:dqrwknxzq5eannkexm37yzdiga
A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things
2019
IEEE Access
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things. ...
We also identify and discuss the main challenges of implementing such methods in the context of IoT applications and devices, together with the main avenues for conducting further research in the area. ...
The proposed model delegates a major portion of the heavy PKI computations to the edge router, and the responsibilities of this router include gathering the public keys of all nodes in the 6LoWPAN network ...
doi:10.1109/access.2019.2900957
fatcat:fbpg4ydg55bg5okyljo67hycqq
Re-thinking Grid Security Architecture
2008
2008 IEEE Fourth International Conference on eScience
Recent developments in open systems security, and revisiting basic security concepts in networking and computing including the OSI Security Architecture and the concepts used in the Trusted Computing Base ...
Via this paper we aim to share some observations on current security models and solutions found in Grid architectures and deployments today and identify architectural limitations in solving complex access ...
Authentication in Grids is based on PKI and can use different types of (user) credentials (PKI, SAML, Kerberos tickets, password, etc.). ...
doi:10.1109/escience.2008.53
dblp:conf/eScience/DemchenkoLKG08
fatcat:b6l3sodzzbbe5b2sgs2j4ofoja
« Previous
Showing results 1 — 15 out of 489 results