2014 IEEE International Conference on Smart Grid Communications (SmartGridComm) 2014
DOI: 10.1109/smartgridcomm.2014.7007776
|View full text |Cite
|
Sign up to set email alerts
|

Efficient generation and distribution of CRLs for IEEE 802.11s-based Smart Grid AMI networks

Abstract: In this paper, we propose a novel algorithm for reducing the size of certificate revocation lists (CRLs) created and distributed for IEEE 802.11s-based Smart Grid Advanced Metering Infrastructure (AMI) networks. Rather than maintaining a huge-size single CRL that introduces unnecessary search time and storage, the idea is to generate groups of smart meters (SMs) within the AMI network and create CRLs based on these groups. Creating groups is appropriate in AMI networks since the SMs are stationary in contrary … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Comparing with the other methods, the Bloom Filter has the best results as expected because it enables faster checking by efficient hash operations. However, Bloom filter suffers from false-positives which degrades its efficiency by requiring access to the server [12]. Our approach does not have such a problem.…”
Section: Computation Overheadmentioning
confidence: 99%
See 2 more Smart Citations
“…Comparing with the other methods, the Bloom Filter has the best results as expected because it enables faster checking by efficient hash operations. However, Bloom filter suffers from false-positives which degrades its efficiency by requiring access to the server [12]. Our approach does not have such a problem.…”
Section: Computation Overheadmentioning
confidence: 99%
“…• Traditional CRL Method: Each smart meter keeps the whole CRL [13] locally which is distributed by the UC. • Bloom Filter Method: A Bloom filter [12] is used to store revoked certificates information. Note that, we employed murmur hash function, which is a non-cryptographic hash function suitable for fast hash-based lookup, to build this Bloom filter.…”
Section: B Baselines and Performance Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11]- [13], we have introduced the problem of certificate revocation in AMI networks. Unlike this work that focuses only on AMI networks, this paper broadens our investigations to include certificate revocation in different applications of the smart grid.…”
Section: Related Workmentioning
confidence: 99%
“…Existing works on smart grid security such as [9], [10] use P KC, but they do not provide any schemes for certificate revocation, even though it is a required component. In [11]- [13], we have made the first attempt to study certificate revocation in Automatic Metering Infrastructure (AM I) networks. In this paper, we broaden our investigation to include certificate revocation in different smart grid applications.…”
mentioning
confidence: 99%