2016
DOI: 10.1007/978-3-319-33630-5_3
|View full text |Cite
|
Sign up to set email alerts
|

Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid

Abstract: Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authenticat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(15 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…Although the TESLA protocol exhibits symmetric properties, it does not support the scalability of new IoT devices joining a system or the loss of the predefined keychain packets owing to weak communication [11]. Therefore, improvements and updates are proposed to the original TESLA protocol to achieve more security services and scalability.…”
Section: Updated Tesla Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the TESLA protocol exhibits symmetric properties, it does not support the scalability of new IoT devices joining a system or the loss of the predefined keychain packets owing to weak communication [11]. Therefore, improvements and updates are proposed to the original TESLA protocol to achieve more security services and scalability.…”
Section: Updated Tesla Protocolsmentioning
confidence: 99%
“…C. µTESLA PROTOCOL µTESLA protocol aims to simplify the functionality of the TESLA protocol from a broadcast authentication into a unicast authentication, where the sender (base station) authenticates the receivers individually [1], [11], [14]. The protocol relies on the condition that the receiver should review a value related to the time interval of the transmitting base station, to ensure that the key is not disclosed yet.…”
Section: B Staggered Teslamentioning
confidence: 99%
“…For instance, assumed that the sender broadcasts 20 packets then the propagation delay is almost 13 seconds. In the same vein, Camara et al [209] proposed Infinite Timed Efficient Stream Loss-tolerant Authentication (inf-TESLA). The protocol provides a multicast delayed authentication to stream synchrophasor data for controlling the phasor measurement unit (PMU) that is deployed in the wide field area of electric power network.…”
Section: Load Management Wirelessmentioning
confidence: 99%
“…Summary: Table XIV summarises the proposed approaches that preserve privacy as well as mitigate the forwarding point compromise threats. In addition, we presented the advantages and disadvantages of the proposed schemes [207] [208] [209].…”
Section: Assest Management Wireless Sm Nan Simulation 24mentioning
confidence: 99%
See 1 more Smart Citation