2021
DOI: 10.1016/j.egyr.2021.08.125
|View full text |Cite
|
Sign up to set email alerts
|

Securing communications between smart grids and real users; providing a methodology based on user authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 60 publications
0
4
0
Order By: Relevance
“…According to the results, the suggested solution reduced the detection time (4.67 s) without raising the end-user overload. Two-way authentication between the smart meter and the power-company security associate was the suggested approach by Chen et al [48]. The suggested technique assessed how cyberattacks on the smart grid behaved.…”
Section: Detectionmentioning
confidence: 99%
“…According to the results, the suggested solution reduced the detection time (4.67 s) without raising the end-user overload. Two-way authentication between the smart meter and the power-company security associate was the suggested approach by Chen et al [48]. The suggested technique assessed how cyberattacks on the smart grid behaved.…”
Section: Detectionmentioning
confidence: 99%
“…Furthermore, the proposed scheme can also be secure under Random Oracle Model (ROM). In [109], researchers have developed a key management scheme based on ECC to mitigate MITM and re-transmission attacks between smart meters and power companies (outside the HAN). The results revealed that the false factor is directly proportional to detection time.…”
Section: ) Cyber-security For Communication Channel Attacksmentioning
confidence: 99%
“…Based on the distribution and demand side management of SGs, as well as the classification of SG technologies (i.e., communication technology, information provision, computing intelligence, and cybersecurity in Figure 1), the related works on the applications of SGs using various techniques are classified in Table 1. Neural networks [10,11,21], smart meters [12][13][14]22], and artificial intelligence [15] were adopted for power control; cyberphysical systems [18,23,24], big data [16,19,25], machine learning [17,18,26], AI [20,27] were adopted for demand side management, and network security [28][29][30][31][32] was used for communication and information transmission. All of them were implemented in smart manufacturing applications.…”
Section: Smart Manufacturing Using Distribution and Demand Side Manag...mentioning
confidence: 99%
“…Two-way authentication mechanisms play a vital role in ensuring the security of information exchanges between the SG and users [29]. Additionally, assessing system risks within the physical infrastructure of SG networks [30,31] is an integral part of maintaining their robustness and security.…”
Section: Smart Manufacturing Using Distribution and Demand Side Manag...mentioning
confidence: 99%