823 Hits in 3.7 sec

Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment

SungJin Yu, KiSung Park, JoonYoung Lee, YoungHo Park, YoHan Park, SangWoo Lee, BoHeung Chung
2020 Applied Sciences  
In 2019, Kumar et al. presented a secure authentication protocol for demand response management in the SG system.  ...  Furthermore, we showed that the proposed protocol achieves secure mutual authentication between the SG devices and the UC using Burrows–Abadi–Needham (BAN) logic analysis.  ...  Formal Security Analysis Using BAN Logic We performed BAN logic [13] analysis to verify that our protocol provides secure mutual authentication.  ... 
doi:10.3390/app10051758 fatcat:ccuo7adzrfeefh4ga3exrcbeme

Automatic Generation of Certifiable Space Communication Software

Johann Schumann, Ewen Denney
2007 2007 IEEE Aerospace Conference  
Automatic, tamper-proof formal certification techniques are used to provide explicit guarantees about important reliability and security properties and the absence of implementation errors.  ...  We are integrating and adapting a set of existing tools in order to provide a unified end-to-end approach to the design, analysis, implementation, and certification of space communication software.  ...  RELATED WORK Modeling and formal analysis of security protocols is a wide field with a long tradition. One of the most wellknown formalisms is the BAN logic [3] and its many successors.  ... 
doi:10.1109/aero.2007.352903 fatcat:2u2p5l6zyfeb5hpmtqwtyxfvde

Lightweight authentication protocol in edge-based smart grid environment

Chien-Ming Chen, Lili Chen, Yanyu Huang, Sachin Kumar, Jimmy Ming-Tai Wu
2021 EURASIP Journal on Wireless Communications and Networking  
Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG.  ...  However, an SG also poses certain challenges that need to be addressed. For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG.  ...  To establish the security of the proposed protocol, a security analysis is presented in Sect. 5, concluding with a formal security analysis using formal proof and BAN logic.  ... 
doi:10.1186/s13638-021-01930-6 fatcat:65hvpgpotrhhthevvngpj7xeeq

Secure Distribution of Protected Content in Information-Centric Networking

Muhammad Bilal, Sangheon Pack
2019 IEEE Systems Journal  
For effective caching of encrypted contents in ICN, we propose a secure distribution of protected content (SDPC) scheme, which ensures that only authenticated consumers can access the content.  ...  The protection of a content against unauthorized access requires consumer authentication and involves the conventional end-to-end encryption.  ...  Formal Analysis using BAN Logic BAN logic [29] is widely used for the formal analysis of security protocols, till recently [38] [39] .  ... 
doi:10.1109/jsyst.2019.2931813 fatcat:ttfbghf7i5d4zj7xh6gqe42pwu

Secure Distribution of Protected Content in Information-Centric Networking

Muhammad Bilal
2020 Figshare  
For effective caching of encrypted contents in ICN, we propose a secure distribution of protected content (SDPC) scheme, which ensures that only authenticated consumers can access the content.  ...  The protection of a content against unauthorized access requires consumer authentication and involves the conventional end-to-end encryption.  ...  Scyther Implementation Results Although BAN logic provides a foundation for the formal analysis of security protocols, a few attacks can be undetectable even with BAN logic [36] .  ... 
doi:10.6084/m9.figshare.12167505 fatcat:j6zmodiwrbcorptkwdqlki4czi

Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges [article]

Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro
2021 arXiv   pre-print
For each of the above domains, we highlight the most essential techniques, peculiarities, advantages, disadvantages, lessons learned, and future directions.  ...  This paper tackles the cited problems and presents a comprehensive survey on the security threats, solutions, and challenges faced when deploying and operating SATCOM systems.  ...  security properties by using the formal analysis or Protocol.  ... 
arXiv:2112.11324v2 fatcat:mdrumzffujdwzmzqwajk3hkxbm

SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks

SungJin Yu, YoungHo Park
2020 Sensors  
We analyze the security of SLUA-WSN through the informal and formal analysis, including Burrows–Abadi–Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols  ...  To resolve the security weaknesses of Mo and Chen's scheme, we propose a secure and lightweight three-factor-based user authentication protocol for WSN, called SLUA-WSN.  ...  .; formal analysis, S.Y. and Y.P.; writing-original draft preparation, S.Y. and Y.P.; writing-review and editing, S.Y. and Y.P.; supervision, Y.P.  ... 
doi:10.3390/s20154143 pmid:32722503 pmcid:PMC7436245 fatcat:gbb4ii4ocbhe5cgiufvqqp6kbi

Integrated Distributed Authentication Protocol for Smart Grid Communications

Neetesh Saxena, Bong Jun Choi
2018 IEEE Systems Journal  
In the smart grid, an integrated distributed authentication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.  ...  In addition, a lightweight authentication protocol is required to handle frequent authentications among billions of devices.  ...  Formal Proof of the Properties of the Protocol In order to justify our analysis, we use the BAN-Logic to provide a formal proof of our scheme.  ... 
doi:10.1109/jsyst.2016.2574699 fatcat:4lvxnx2wdzfqzlp6imnjb4uv3u

Formal Verification of Safety & Security Related Timing Constraints for a Cooperative Automotive System [chapter]

Li Huang, Eun-Young Kang
2019 Lecture Notes in Computer Science  
To identify the potential impacts of security related threats on safety properties of interconnected automotive systems, this paper presents analysis techniques that support verification and validation  ...  formal verification.  ...  This work is supported by the EASY project funded by NSFC, a collaborative research between Sun Yat-Sen University and University of Southern Denmark.  ... 
doi:10.1007/978-3-030-16722-6_12 fatcat:y3sleinwqjeubppqso6n3pelgm

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew Martin
2019 IEEE Communications Surveys and Tutorials  
Based on the presented threats, we derive a set of security and privacy requirements for SG metering networks.  ...  In this respect, the smart metering infrastructure (SMI) plays an important role in controlling, monitoring and managing multiple domains in the SG.  ...  [225] proposed a formal analysis method for dependable SCADA systems.  ... 
doi:10.1109/comst.2019.2899354 fatcat:67bz5glcfbbldpqagxmhvy2ssm

A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid

A. Huseinovic, S. Mrdovic, K. Bicakci, S. Uludag
2020 IEEE Access  
Implementing security controls in a scalable manner could be facilitated with a formal framework and automated analysis tools [126] . What is different in SG?  ...  private keys stored on SG devices used for device authentication.  ... 
doi:10.1109/access.2020.3026923 fatcat:cpdqhwe2era6hmewqvmmja7dny

Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems

Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis
2019 IEEE Access  
In this paper, we examine the contribution of the IDPSs in the SG paradigm, providing an analysis of 37 cases.  ...  For instance, if a cyberattack bypasses the essential encryption and authorization mechanisms, then the IDPS systems can act as a secondary protection service, informing the system operator for the presence  ...  Similarly, in [43] the authors investigate various encryption and authentication protocols for SG.  ... 
doi:10.1109/access.2019.2909807 fatcat:v5edxwbgorfixndrlgy6olnq6a


Yi Yang, Xinran Wang, Sencun Zhu
2006 Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '06  
First, SDAP uses a novel probabilistic grouping technique to dynamically partition the nodes in a tree topology into multiple logical groups (subtrees) of similar sizes.  ...  Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a sensor network.  ...  Acknowledgement: We would like to thank our shepherd Srikanth Krishnamurthy for his suggestions on improving this paper. We also thank the anonymous reviewers for their comments and suggestions.  ... 
doi:10.1145/1132905.1132944 dblp:conf/mobihoc/YangWZ06 fatcat:xm3x5l7l75endivcgma3ovmha4

A Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network

2022 International Journal of Intelligent Engineering and Systems  
Here, the encrypted formal and informal authentication.  ...  aggregator and transferred to the center of operation, [10] proposed a technique that offers for grouping where the data are authenticated.  ... 
doi:10.22266/ijies2022.0228.11 fatcat:bjwkk7bhobbptcs3rcwaasxju4

A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems

Ahmed Patel, Hitham Alhussian, Jens Myrup Pedersen, Bouchaib Bounabat, Joaquim Celestino Júnior, Sokratis Katsikas
2017 Computers & security  
logic analysis, it detects and prevents intrusions more efficiently.  ...  In the final analysis, the CSIDPS architecture is designed toward contributing to de facto norms for SG ecosystems.  ...  Acknowledgements Ahmed Patel, co-author, wishes to thank CAPES (Coordenação de Aperfeiçoamento de Pessoal de Nível Superior) for sponsoring his one year stay as Senior Visiting Professor through the "Projeto  ... 
doi:10.1016/j.cose.2016.07.002 fatcat:g5ftx3fexvbenc4shzum5lr7ze
« Previous Showing results 1 — 15 out of 823 results