2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.447
|View full text |Cite
|
Sign up to set email alerts
|

eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid

Abstract: International audienceAdvanced Metering Infrastructure (AMI) is composed of systems and networks for measuring, collecting, storing, analyzing, and exploiting energy usage related data. AMI is an enabling technology for Smart Grid (SG) and hence represents a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, security has been identified as one of the most challenging topics in AMI development, and designing an efficient Key Management Sche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 22 publications
0
11
0
Order By: Relevance
“…Each communication entity needs to obtain the certified public keys from the certificate authority before the communication is initiated [53]. There has been a lot of research based on key management procedures concerning the ESG [54], [55], [56], [57], [58]. In [59] several encryption algorithms are presented, concluding to Advanced Encryption Standard (AES) algorithm as the most appropriate for ensuring security in the ESG.…”
Section: ) Privacy Preservation During Data Aggregationmentioning
confidence: 99%
“…Each communication entity needs to obtain the certified public keys from the certificate authority before the communication is initiated [53]. There has been a lot of research based on key management procedures concerning the ESG [54], [55], [56], [57], [58]. In [59] several encryption algorithms are presented, concluding to Advanced Encryption Standard (AES) algorithm as the most appropriate for ensuring security in the ESG.…”
Section: ) Privacy Preservation During Data Aggregationmentioning
confidence: 99%
“…Due to the openness of SG network, message authentication has vital significance for dynamic microgrid partition. Therefore, a large number of security protocols 429 have been designed for this purpose. All these protocols can be categorized into three types: symmetric-key-based protocols, traditional public-key-based protocols, and identity-based protocols.…”
Section: Related Workmentioning
confidence: 99%
“…Liu et al 25 proposed a key management scheme to secure both unicast and multicast communications, which is based on a trusted third party. Benmalek and Challal 24 is a key graph management approach that is an enhancement of LKH. Perrig et al 28 presented a message authentication protocol based on hash chain.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, key management or key establishment cryptographic protocols are used to provide a secure communication channel . There have been a large number of key establishment protocols proposed in the literature, and examples include those presented in the previous studies …”
Section: Introductionmentioning
confidence: 99%