2019
DOI: 10.1002/ett.3587
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the security of a cloud‐based smart grid AMI network by leveraging on the features of quantum key distribution

Abstract: In the last decade, there have been many research proposals on the potentials of incorporating cloud computing technology to the electrical power grid as it evolves rapidly to the smart grid. The advanced metering infrastructure (AMI) is one domain of the smart grid that can be greatly impacted by cloud computing technology with regards to an improved capability for data storage and computations, which will be a serious burden to the AMI in an evolved smart grid environment. In our previous study, a cloud‐base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…For cost efficiency, a group of smart meters which are connected to a same aggregator may share a single quantum channel and a same QKD-generated secret key [69]. However, this will compromise the unconditional security strength brought by QKD protocols, because each individual secret key is known by more than a single pair of sender and receiver nodes.…”
Section: B Efficient Qkd Protocols Deployment With a Large Number Of Control Devicesmentioning
confidence: 99%
See 3 more Smart Citations
“…For cost efficiency, a group of smart meters which are connected to a same aggregator may share a single quantum channel and a same QKD-generated secret key [69]. However, this will compromise the unconditional security strength brought by QKD protocols, because each individual secret key is known by more than a single pair of sender and receiver nodes.…”
Section: B Efficient Qkd Protocols Deployment With a Large Number Of Control Devicesmentioning
confidence: 99%
“…Similar to [76] and [69] wants to protect the data privacy of individual consumers, but for the case where smart meters are not connected directly to the control center. In [69], smart meters are organized into multiple groups, where all smart meters within a group are connected directly only to a data aggregator. As illustrated in Fig.…”
Section: Other Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Some other reported techniques in literature include support vector machine, deep recurrent neural network (RNN), Lempel-Ziv algorithms, regression models, feasible generalised least squares models, integrated embedded system designed and developed for automation of the substation as a measure for clearing power theft, application of wireless data transmission and reception techniques employed for power monitoring and theft detection, a quantum key distribution model for a cloud-based security of the AMI, GSMbased prepaid energy meter presented to curb meter bypass, temperature-dependent predictive model which uses smart meter data and data from distribution transformer to detect electricity theft in an area, reconstructed user load profile using compressed distributed sensing based on random walk to demonstrate monitoring of customer's consumption for possible electricity theft, advanced wireless technology for monitoring of power theft, predictive models for TLs in electrical distribution networks [4,19,38,41,49,[51][52][53][54][55][56][57] etc.…”
Section: Related Workmentioning
confidence: 99%