Handbook of Real-Time Computing 2020
DOI: 10.1007/978-981-4585-87-3_39-1
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Integrity Protection for Real-Time Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Chameleon Hashing has been adopted to secure the integrity of energy usage data in Advanced Metering Infrastructure (AMI) [21] and industrial control systems [9,10] to enable aggregated energy readings to be protected, so that any tampering of the data can be detected by the energy provider. The aim is to provide an end-to-end data integrity protection between the smart meter and the backend service provider such that when the concentrator in AMI tampered with the energy readings, this can be detected by checking the chameleon hash value.…”
Section: Chameleon Hashingmentioning
confidence: 99%
“…Chameleon Hashing has been adopted to secure the integrity of energy usage data in Advanced Metering Infrastructure (AMI) [21] and industrial control systems [9,10] to enable aggregated energy readings to be protected, so that any tampering of the data can be detected by the energy provider. The aim is to provide an end-to-end data integrity protection between the smart meter and the backend service provider such that when the concentrator in AMI tampered with the energy readings, this can be detected by checking the chameleon hash value.…”
Section: Chameleon Hashingmentioning
confidence: 99%