2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016
DOI: 10.1109/iceeot.2016.7755614
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy for smart grid using scalable key management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…The main obstacle for implementing AMI security scheme is the tightly bounded memory and low computation capability of the smart meters which calls for a lightweight and resilient security scheme. The key management-based encryption approach has been recognized in the literature as a notable security system for the smart grid, which incorporates a Trusted Third Party (TTP) [8]- [13]. Almost all TTP management solutions make the premise that the TPP can be entirely trusted.…”
Section: Introductionmentioning
confidence: 99%
“…The main obstacle for implementing AMI security scheme is the tightly bounded memory and low computation capability of the smart meters which calls for a lightweight and resilient security scheme. The key management-based encryption approach has been recognized in the literature as a notable security system for the smart grid, which incorporates a Trusted Third Party (TTP) [8]- [13]. Almost all TTP management solutions make the premise that the TPP can be entirely trusted.…”
Section: Introductionmentioning
confidence: 99%