2020
DOI: 10.3390/s20061581
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-User, Single-Authentication Protocol for Smart Grid Architectures

Abstract: In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Table 3 shows that most of the Encryption issues do not clearly define the algorithms they use, although there are some articles that use Multi-dimensional Data aggregation and even Cognitive Risk Control. Multi-dimensional Data aggregation [42,[55][56][57]60,62,64] Cognitive Risk Control [37,82] Not Defined [19,20,[22][23][24]26,28,29,31,35,36,38,39,43,[45][46][47][48]50,[52][53][54]58,61,63,73,[76][77][78][79]81,[98][99][100][101][102][103][104][105]…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 3 shows that most of the Encryption issues do not clearly define the algorithms they use, although there are some articles that use Multi-dimensional Data aggregation and even Cognitive Risk Control. Multi-dimensional Data aggregation [42,[55][56][57]60,62,64] Cognitive Risk Control [37,82] Not Defined [19,20,[22][23][24]26,28,29,31,35,36,38,39,43,[45][46][47][48]50,[52][53][54]58,61,63,73,[76][77][78][79]81,[98][99][100][101][102][103][104][105]…”
Section: Discussionmentioning
confidence: 99%
“…The works of Alonso et al [70] and Cavalieri [89] using the IEC61850 Protocol can be highlighted, showing us an applicable field of research with a view to homogenizing the algorithms and protocols used by Smart Grids and achieve an integration of all elements that conform them. Green-RPL [53] Local positive degree coupling [44] IEE 802.11s [33] Web Of Energy [67] Dynamic Barrier Coverage [68] IEC61850 [70,89] Wind-driven bacterian foraging algorithm [86] Data Slicing [87] TSUBE energy trading algorithm [91] Stochastic Geometry [92] Rectangular quadrature amplitude modulation [37] Policy-based group authentication algorithm [103] Mapping interface integration COIIoT [99,104] Nash Equilibrium (NE) and the Bayesian NE [105] Wireless sensor network protocol [35,50,53,63,73,[76][77][78]98,108,110] Algorithmic Approach [36,37,48,52,93,107,109] Furthermore, Figure 6c shows the Protocols Applied in Smart Grid Algorithms, pointing out that these technologies are varied and abundant, since 46% concentrate 14 different protocols applied among members or nodes of the Smart Grid. In addition, 34% is located in wireless connections of Sensor Networks and 20% Algorithmic Approaches inside these networks.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Authentication is a process of associating the incoming activation requests with the already set authentication rights [ 71 ]. These authentication rights are stored in file systems or databases.…”
Section: Advanced Privacy Preserving Scheme and Its Countermeasuresmentioning
confidence: 99%
“…Another scheme for preserving demand-response security in the ESG was presented by Alfakeeh et. al in [111] promoting a group authentication technique. Based on this technique, a single public key operation is employed in order for the utility server to authenticate the ESG smart devices.…”
Section: B Authentication Mechanisms In Esgmentioning
confidence: 99%