2015
DOI: 10.1109/tsg.2015.2424160
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Communication Architecture for Distributed Microgrid Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
27
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(27 citation statements)
references
References 21 publications
0
27
0
Order By: Relevance
“…Table 3 presents the comparative analysis in terms of key size and total number of keys stored. In the proposed scheme, if there are n IEDs in the network, each one stores only K i-auth , K IED /PK IED and K g keys while [7] needs to store k c , two KS keys, and 2(n − 1) session secret keys and thus have a high communication overhead specially in the broadcast scenario. In order to calculate the packetization delay t S , we considered only the encryption and authentication process while t R is the time to verify the messages at the receiver.…”
Section: Theoretical Analysismentioning
confidence: 99%
“…Table 3 presents the comparative analysis in terms of key size and total number of keys stored. In the proposed scheme, if there are n IEDs in the network, each one stores only K i-auth , K IED /PK IED and K g keys while [7] needs to store k c , two KS keys, and 2(n − 1) session secret keys and thus have a high communication overhead specially in the broadcast scenario. In order to calculate the packetization delay t S , we considered only the encryption and authentication process while t R is the time to verify the messages at the receiver.…”
Section: Theoretical Analysismentioning
confidence: 99%
“…The security must be fully considered from the commencement of data collection up to their reception at the control and management center. Intensive review of the previous works shows that the security of SG is a very interesting topic and so many papers have discussed this challenging requirement. To have a taxonomy of these works, we can mention the works that have considered the key management in SG, the many works that have paid attention to false data injection attack, the miscellaneous works that have proposed privacy‐preserving schemes, and the few works that have taken the advantage of lattice‐based cryptosystem into account …”
Section: Introductionmentioning
confidence: 99%
“…The ongoing trend emphasizes the importance of the security of the control system, particularly the security of the feedback loop, and raises concerns regarding the adequacy of existing communication technologies for the security challenges of the evolving DC MG ecosystem [4]. Specifically, the control feedback loop is commonly closed via off-the-shelf communication solutions such as IEEE 802.11 [5].…”
Section: Introductionmentioning
confidence: 99%
“…In contrast to AC distribution systems, DC MGs provide significant installation, operation and maintenance flexibility due to high penetration of renewable DERs that are interfaced to the DC infrastructure through power electronic converters [1], [2]. Specifically, the extensive use of power electronic converters provides for implementation of advanced control and optimization mechanisms in DC MGs, where the feedback loop is typically closed via external communication network [3].The ongoing trend emphasizes the importance of the security of the control system, particularly the security of the feedback loop, and raises concerns regarding the adequacy of existing communication technologies for the security challenges of the evolving DC MG ecosystem [4]. Specifically, the control feedback loop is commonly closed via off-the-shelf communication solutions such as IEEE 802.11 [5].…”
mentioning
confidence: 99%