2011
DOI: 10.1109/tpwrd.2011.2158671
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Smart-Metering Protocol Over Power-Line Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 61 publications
(32 citation statements)
references
References 7 publications
0
32
0
Order By: Relevance
“…In this direction, a scheme was proposed that deals with key generation, revocation management and share keys between devices, and secure transmission of meter-reading data [36]. An encryption key management technique based on certificateless public key cryptography was proposed that provides end-to-end security in AMI, but the approach generates a huge overhead [37].…”
Section: Related Workmentioning
confidence: 99%
“…In this direction, a scheme was proposed that deals with key generation, revocation management and share keys between devices, and secure transmission of meter-reading data [36]. An encryption key management technique based on certificateless public key cryptography was proposed that provides end-to-end security in AMI, but the approach generates a huge overhead [37].…”
Section: Related Workmentioning
confidence: 99%
“…Abdullah et al [21] presented studies on the attacks and vulnerabilities of smart meters in a NAN and list node attack as the least attended, yet significantly dangerous, to the smart grid network. Most of the schemes discussed in [22][23][24][25][26] show a vulnerability to node capture attacks. A successful attack could reveal shared keys, thereby permitting an attacker to participate in encryption and decryption processes or, in a worst case scenario, inject false data into the smart grid network to comprise other nodes.…”
Section: Node Capture Attackmentioning
confidence: 99%
“…In this paper, [9] the security of PLC is explained. This protocol uses public key cryptographic approach.…”
Section: Communicationmentioning
confidence: 99%