A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
2020
Applied Sciences
In 2019, Kumar et al. presented a secure authentication protocol for demand response management in the SG system. ...
Furthermore, we showed that the proposed protocol achieves secure mutual authentication between the SG devices and the UC using Burrows–Abadi–Needham (BAN) logic analysis. ...
Formal Security Analysis Using BAN Logic We performed BAN logic [13] analysis to verify that our protocol provides secure mutual authentication. ...
doi:10.3390/app10051758
fatcat:ccuo7adzrfeefh4ga3exrcbeme
Automatic Generation of Certifiable Space Communication Software
2007
2007 IEEE Aerospace Conference
Automatic, tamper-proof formal certification techniques are used to provide explicit guarantees about important reliability and security properties and the absence of implementation errors. ...
We are integrating and adapting a set of existing tools in order to provide a unified end-to-end approach to the design, analysis, implementation, and certification of space communication software. ...
RELATED WORK Modeling and formal analysis of security protocols is a wide field with a long tradition. One of the most wellknown formalisms is the BAN logic [3] and its many successors. ...
doi:10.1109/aero.2007.352903
fatcat:2u2p5l6zyfeb5hpmtqwtyxfvde
Lightweight authentication protocol in edge-based smart grid environment
2021
EURASIP Journal on Wireless Communications and Networking
Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG. ...
However, an SG also poses certain challenges that need to be addressed. For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG. ...
To establish the security of the proposed protocol, a security analysis is presented in Sect. 5, concluding with a formal security analysis using formal proof and BAN logic. ...
doi:10.1186/s13638-021-01930-6
fatcat:65hvpgpotrhhthevvngpj7xeeq
Secure Distribution of Protected Content in Information-Centric Networking
2019
IEEE Systems Journal
For effective caching of encrypted contents in ICN, we propose a secure distribution of protected content (SDPC) scheme, which ensures that only authenticated consumers can access the content. ...
The protection of a content against unauthorized access requires consumer authentication and involves the conventional end-to-end encryption. ...
Formal Analysis using BAN Logic BAN logic [29] is widely used for the formal analysis of security protocols, till recently [38] [39] . ...
doi:10.1109/jsyst.2019.2931813
fatcat:ttfbghf7i5d4zj7xh6gqe42pwu
Secure Distribution of Protected Content in Information-Centric Networking
2020
Figshare
For effective caching of encrypted contents in ICN, we propose a secure distribution of protected content (SDPC) scheme, which ensures that only authenticated consumers can access the content. ...
The protection of a content against unauthorized access requires consumer authentication and involves the conventional end-to-end encryption. ...
Scyther Implementation Results Although BAN logic provides a foundation for the formal analysis of security protocols, a few attacks can be undetectable even with BAN logic [36] . ...
doi:10.6084/m9.figshare.12167505
fatcat:j6zmodiwrbcorptkwdqlki4czi
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges
[article]
2021
arXiv
pre-print
For each of the above domains, we highlight the most essential techniques, peculiarities, advantages, disadvantages, lessons learned, and future directions. ...
This paper tackles the cited problems and presents a comprehensive survey on the security threats, solutions, and challenges faced when deploying and operating SATCOM systems. ...
security properties by using the formal analysis or
Protocol. ...
arXiv:2112.11324v2
fatcat:mdrumzffujdwzmzqwajk3hkxbm
SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
2020
Sensors
We analyze the security of SLUA-WSN through the informal and formal analysis, including Burrows–Abadi–Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols ...
To resolve the security weaknesses of Mo and Chen's scheme, we propose a secure and lightweight three-factor-based user authentication protocol for WSN, called SLUA-WSN. ...
.; formal analysis, S.Y. and Y.P.; writing-original draft preparation, S.Y. and Y.P.; writing-review and editing, S.Y. and Y.P.; supervision, Y.P. ...
doi:10.3390/s20154143
pmid:32722503
pmcid:PMC7436245
fatcat:gbb4ii4ocbhe5cgiufvqqp6kbi
Integrated Distributed Authentication Protocol for Smart Grid Communications
2018
IEEE Systems Journal
In the smart grid, an integrated distributed authentication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications. ...
In addition, a lightweight authentication protocol is required to handle frequent authentications among billions of devices. ...
Formal Proof of the Properties of the Protocol In order to justify our analysis, we use the BAN-Logic to provide a formal proof of our scheme. ...
doi:10.1109/jsyst.2016.2574699
fatcat:4lvxnx2wdzfqzlp6imnjb4uv3u
Formal Verification of Safety & Security Related Timing Constraints for a Cooperative Automotive System
[chapter]
2019
Lecture Notes in Computer Science
To identify the potential impacts of security related threats on safety properties of interconnected automotive systems, this paper presents analysis techniques that support verification and validation ...
formal verification. ...
This work is supported by the EASY project funded by NSFC, a collaborative research between Sun Yat-Sen University and University of Southern Denmark. ...
doi:10.1007/978-3-030-16722-6_12
fatcat:y3sleinwqjeubppqso6n3pelgm
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
2019
IEEE Communications Surveys and Tutorials
Based on the presented threats, we derive a set of security and privacy requirements for SG metering networks. ...
In this respect, the smart metering infrastructure (SMI) plays an important role in controlling, monitoring and managing multiple domains in the SG. ...
[225] proposed a formal analysis method for dependable SCADA systems. ...
doi:10.1109/comst.2019.2899354
fatcat:67bz5glcfbbldpqagxmhvy2ssm
A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid
2020
IEEE Access
Implementing security controls in a scalable manner could be facilitated with a formal framework and automated analysis tools [126] . What is different in SG? ...
private keys stored on SG devices used for device authentication. ...
doi:10.1109/access.2020.3026923
fatcat:cpdqhwe2era6hmewqvmmja7dny
Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems
2019
IEEE Access
In this paper, we examine the contribution of the IDPSs in the SG paradigm, providing an analysis of 37 cases. ...
For instance, if a cyberattack bypasses the essential encryption and authorization mechanisms, then the IDPS systems can act as a secondary protection service, informing the system operator for the presence ...
Similarly, in [43] the authors investigate various encryption and authentication protocols for SG. ...
doi:10.1109/access.2019.2909807
fatcat:v5edxwbgorfixndrlgy6olnq6a
First, SDAP uses a novel probabilistic grouping technique to dynamically partition the nodes in a tree topology into multiple logical groups (subtrees) of similar sizes. ...
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a sensor network. ...
Acknowledgement: We would like to thank our shepherd Srikanth Krishnamurthy for his suggestions on improving this paper. We also thank the anonymous reviewers for their comments and suggestions. ...
doi:10.1145/1132905.1132944
dblp:conf/mobihoc/YangWZ06
fatcat:xm3x5l7l75endivcgma3ovmha4
A Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network
2022
International Journal of Intelligent Engineering and Systems
Here, the encrypted
formal and informal authentication. ...
aggregator and transferred to the center of operation,
[10] proposed a technique that offers for grouping where the data are authenticated. ...
doi:10.22266/ijies2022.0228.11
fatcat:bjwkk7bhobbptcs3rcwaasxju4
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems
2017
Computers & security
logic analysis, it detects and prevents intrusions more efficiently. ...
In the final analysis, the CSIDPS architecture is designed toward contributing to de facto norms for SG ecosystems. ...
Acknowledgements Ahmed Patel, co-author, wishes to thank CAPES (Coordenação de Aperfeiçoamento de Pessoal de Nível Superior) for sponsoring his one year stay as Senior Visiting Professor through the "Projeto ...
doi:10.1016/j.cose.2016.07.002
fatcat:g5ftx3fexvbenc4shzum5lr7ze
« Previous
Showing results 1 — 15 out of 823 results