2015
DOI: 10.1002/sec.1217
|View full text |Cite
|
Sign up to set email alerts
|

HIBaSS: hierarchical identity‐based signature scheme for AMI downlink transmission

Abstract: The advanced metering infrastructure (AMI) is the key to demand‐side management system in smart grid. The communication over AMI consists of plenty important data, which have different security requirements. In this paper, we propose a hierarchical identity‐based signature scheme (HIBaSS) to enhance the sender authentication for downlink transmission of AMI. The downlink in AMI mainly distributes control messages such as price and tariff information to the smart meters. Unlike the metering data in the uplink t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The security of AMI networks has been extensively addressed in the literature, however, the vast majority of the researches considered single recipient (unicast) communication 24 . Furthermore, the security schemes proposed for multirecipient communication mainly target broadcast encryption 15,25,26 . Secure multicast communication requires fine grain access control and is barely investigated for AMI networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The security of AMI networks has been extensively addressed in the literature, however, the vast majority of the researches considered single recipient (unicast) communication 24 . Furthermore, the security schemes proposed for multirecipient communication mainly target broadcast encryption 15,25,26 . Secure multicast communication requires fine grain access control and is barely investigated for AMI networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The SG downlink communication has been considered in several schemes [20]- [22]. However, these schemes consider only broadcast downlink communication and cannot support multicast communication.…”
Section: Related Workmentioning
confidence: 99%
“…Identity‐based cryptographic schemes have been widely studied recently. Unlike well‐known symmetric cryptographic schemes (e.g., advanced encryption scheme), ID‐based cryptographic schemes are relatively inefficient.…”
Section: Related Workmentioning
confidence: 99%
“…It is inefficient if not impossible to implement traditional cryptographic systems, symmetric or public, while providing full security control over the data transmission for the utility companies. Identity‐based (ID‐based) security schemes fit here mainly for three reasons: (i) ID‐based security schemes utilize the identities of participants to generate public keys so that public key distribution is simplified; (ii) keys and other secret parameters can be updated easily to accommodate status change of participants; and (iii) an authentication center is required to control domain parameters as well as domain secrets. By adopting ID‐based security schemes, a utility company shall be in charge of the network security efficiently even if the transmissions are carried over the Internet, which is the case in the proposed ICT framework.…”
Section: Introductionmentioning
confidence: 99%