2021
DOI: 10.1016/j.net.2021.05.006
|View full text |Cite
|
Sign up to set email alerts
|

Smart grid and nuclear power plant security by integrating cryptographic hardware chip

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…The second criterion in our comparison was the cryptography scheme used to ensure transactions and user identities. Several cryptographic schemes were adopted in the works reviewed above, such as the advanced encryption standard (AES) [48], ECDSA [9], IBS [24], and PKI [28] all of which have certain advantages and disadvantages. ECC and a session key agreement (SKA) were adopted by the authors of [21] and [11] respectively, which are vulnerable to eavesdropping and key compromise.…”
Section: Power Consumptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The second criterion in our comparison was the cryptography scheme used to ensure transactions and user identities. Several cryptographic schemes were adopted in the works reviewed above, such as the advanced encryption standard (AES) [48], ECDSA [9], IBS [24], and PKI [28] all of which have certain advantages and disadvantages. ECC and a session key agreement (SKA) were adopted by the authors of [21] and [11] respectively, which are vulnerable to eavesdropping and key compromise.…”
Section: Power Consumptionmentioning
confidence: 99%
“…In BC technology, all transactions are also hashed using SHA-265, encrypted with ECC and timestamped [9], which helps to prevent attackers from being able to change, modify or steal sensitive data. In SGs, cybersecurity is the biggest challenge [52], according to the guidelines issued by NIST [48].…”
Section: Power Consumptionmentioning
confidence: 99%
“…For the past 20 years, FPGA chips have been widely used in nuclear plant sectors and complicated electronic equipment for instrumentation and operation control. The FPGA was utilized in the power plant for GSM-based wireless [10] monitoring [19] that enabled security and message authentication on the mobile that kept the boiler temperature, pressure, and loads below the threshold limits.…”
Section: Related Workmentioning
confidence: 99%
“…Trust-based key management [32] is used to accomplish secure and efficient wireless multicast communication which can be applied for the security of destination-sequenced distance vector (DSDV), optimized link state routing (OLSR) [33], and ad hoc on-demand distance vector (AODV) [34] routing protocols. For device-to-device communication in the wireless system, the delay, memory, and hardware resources utilization [35,36] are a major concern. It has been identified in different topological communication [37] such as in Zigbee IEEE 802.14 [38,39], wireless sensor network, network-on-chip communication, wireless monitoring of plant information, and security.…”
Section: Identity-basedmentioning
confidence: 99%