2017 9th International Conference on Information and Knowledge Technology (IKT) 2017
DOI: 10.1109/ikt.2017.8258622
|View full text |Cite
|
Sign up to set email alerts
|

How the control over smart meters is lost in the Yan et al. lightweight AKA scheme for smart grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…-Implementing intrusion detection systems to detect and mitigate abnormal network traffic patterns This involves adversaries employing reinforcement learning to dynamically adjust jamming patterns to disrupt communication between smart meters and the central management system. Thereby, causing delay and or unavailability of service [82] Adversarial attacks on smart meters' data -Implementing anomaly detection algorithms to flag unusual readings (regardless of how small the deviation is), for manual inspection and verification [83].…”
Section: Ami Software and Communication Protocol Vulnerabilities [80]...mentioning
confidence: 99%
“…-Implementing intrusion detection systems to detect and mitigate abnormal network traffic patterns This involves adversaries employing reinforcement learning to dynamically adjust jamming patterns to disrupt communication between smart meters and the central management system. Thereby, causing delay and or unavailability of service [82] Adversarial attacks on smart meters' data -Implementing anomaly detection algorithms to flag unusual readings (regardless of how small the deviation is), for manual inspection and verification [83].…”
Section: Ami Software and Communication Protocol Vulnerabilities [80]...mentioning
confidence: 99%
“…Meanwhile, Yan et al [24] introduced a lightweight approach designed to provide a key agreement and mutual authentication mechanism. This solution, however, was later shown to be susceptible to various attacks like Denial of Service (DoS) and replay attacks as noted by Shariat and Safkhani [34]. Mahmood et al [25] proposed a solution that relied on ECC to facilitate peer-to-peer communication within the Smart Grid (SG).…”
Section: Related Workmentioning
confidence: 99%
“…Its applications are discussed in [4], and they contribute to the rapid improvement of AI.With the advent of the Internet of Things, it will be possible for more "Things" than ever before to exchange data with one another. In the future, the IoT will have an impact on many other spheres, including but not limited to: business models [5][6][7][8][9], agricultural [10,11], transportation [12][13][14], autonomous industrial processes [15][16][17], homes, infrastructure, security, trade standards, and many more. While the eventual widespread use of Internet of Things (IoT) technologies has many potential benefits, there are also many challenges that must be overcome, such as safety and privacy issues.. Security and privacy in the context of the Internet of Things (IoT) apply not only to the means by which the data generated and sent by IoT devices may be safeguarded, but also to the identities of users in the IoT ecosystem and the ethics of their use of the technology.…”
Section: Introductionmentioning
confidence: 99%