Proceedings of the 6th International Wireless Communications and Mobile Computing Conference 2010
DOI: 10.1145/1815396.1815666
|View full text |Cite
|
Sign up to set email alerts
|

Securing RDS broadcast messages for smart grid applications

Abstract: Efforts to reduce peak electrical demand has led to the introduction of demand response programs for residences. Demand response programs allow customers to reduce or shift their electrical consumption from peak periods in response to dynamic prices of electricity. Utility companies broadcasts the prices to the customers who then respond by reducing consumption during peak periods or shift the consumption to off-peak periods. Similarly, direct load control programs entice consumers with special rates or other … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…A significant amount of research has been carried out to protect the smart grid systems. Multicast authentication schemes such as TELSA, Biba, HORS, and OTS [3,23] were proposed for authenticating entities such as utility companies and control centers when messages or control commands are sent to smart meters. To authenticate smart meters or other smart devices to the control center, batch verification schemes [24][25][26][27] were developed to improve the efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…A significant amount of research has been carried out to protect the smart grid systems. Multicast authentication schemes such as TELSA, Biba, HORS, and OTS [3,23] were proposed for authenticating entities such as utility companies and control centers when messages or control commands are sent to smart meters. To authenticate smart meters or other smart devices to the control center, batch verification schemes [24][25][26][27] were developed to improve the efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…Three methods are compared in [14] for authenticating demand response messages in SG, namely Bins and Balls (BiBa), Hash to Obtain Random Subsets Extension (HORSE), and Elliptic Curve Digital Signature Algorithm (ECDSA). It is demonstrated that ECDSA offers higher security in contrast with BiBa and HORSE, at the expense of increased computational complexity, particularly at the receiver end.…”
Section: Related Research Workmentioning
confidence: 99%
“…We compare the performance of our proposed authentication scheme with ECDSA. The reason for considering ECDSA is that it is demonstrated to be a secure authentication protocol for SG demand response communications in [14]. In our simulations, we employed AES-128 algorithm to encrypt the packets to be transmitted using the shared session key, , generated during the proposed authentication mechanism.…”
Section: Comparative Evaluationmentioning
confidence: 99%
“…The BAN GW responds to their authentication requests. The authentication process is simulated with the ECDSA signature verification scheme, which has been already proposed in existing literature as an authentication scheme for SG communication [13]. Thus, the malicious smart meters attempt to consume the rather constrained memory resources available at the BAN GW in order to deny legitimate authentication requests from the uninfected HAN GWs.…”
Section: Performance Evaluationmentioning
confidence: 99%