2015 11th International Computer Engineering Conference (ICENCO) 2015
DOI: 10.1109/icenco.2015.7416320
|View full text |Cite
|
Sign up to set email alerts
|

An efficient distributed approach for key management in microgrids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…and f 5 (•), α and β(d, t j ) are random variables that are uniformly distributed over the interval [0.1, 0.6] [1]. For attack f 3 (•), t s (d) is a uniform random variable in [0,42], and the duration of the attack, i.e., t f (d) − t s (d), is a uniform random variable in [8,48], and hence, the maximum value of t f (d) = 48. Applying the electricity theft attack's functions on each SM's readings results inX SM i dataset which contains 536 honest samples (days) and 3, 216 malicious samples.…”
Section: B: Electricity Theft Attacksmentioning
confidence: 99%
“…and f 5 (•), α and β(d, t j ) are random variables that are uniformly distributed over the interval [0.1, 0.6] [1]. For attack f 3 (•), t s (d) is a uniform random variable in [0,42], and the duration of the attack, i.e., t f (d) − t s (d), is a uniform random variable in [8,48], and hence, the maximum value of t f (d) = 48. Applying the electricity theft attack's functions on each SM's readings results inX SM i dataset which contains 536 honest samples (days) and 3, 216 malicious samples.…”
Section: B: Electricity Theft Attacksmentioning
confidence: 99%
“…Currently, several AKA schemes for microgrids have been discussed, but some have proved insecure and vulnerable to different attacks. In 2015, Baza et al [7] proposed a distributed key management scheme for microgrids, utilizing the one-way function tree technique. However, the scheme is not flexible enough for nodes to join or leave the microgrid because this necessitates updating the partial key, which also increases the risk of inconsistency.…”
Section: Related Workmentioning
confidence: 99%
“…This solution cannot cope with (C1), presented in the previous section. In [18] the functionality of the proposed distributed key management approach for microgrids is based on an oneway function tree. In this case, partial key update is needed when nodes join or leave the microgrid (C1).…”
Section: Related Workmentioning
confidence: 99%