2011 IEEE PES Innovative Smart Grid Technologies 2011
DOI: 10.1109/isgt-asia.2011.6167151
|View full text |Cite
|
Sign up to set email alerts
|

Smart grid authentication and key management for unicast and multicast communications

Abstract: One of the most important and challenging area in the smart grid context is security and privacy section. Smart grid is a vulnerable system and can be attacked even from aboard, attacks that may cause different level of issues and harms on the devices and society. So, research community has paid attention to this topic and the reasons of required security and privacy for the smart grid. The first step of designing and implementing security for any system such as a smart grid is an authentication scheme followe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 74 publications
(49 citation statements)
references
References 11 publications
0
49
0
Order By: Relevance
“…So, we mainly compare signing and verification costs of SDMGP with those of current protocols. Moreover, there are a lot of identity-based protocols for SG, [17][18][19]21,22,26 but only So et al, 17 Gentry and Silverberg, 21 and Liu et al 22 provide signing and verification algorithms. So, we only choose these three protocols for comparison.…”
Section: Computation Costmentioning
confidence: 99%
“…So, we mainly compare signing and verification costs of SDMGP with those of current protocols. Moreover, there are a lot of identity-based protocols for SG, [17][18][19]21,22,26 but only So et al, 17 Gentry and Silverberg, 21 and Liu et al 22 provide signing and verification algorithms. So, we only choose these three protocols for comparison.…”
Section: Computation Costmentioning
confidence: 99%
“…Nicanfar et al [18] developed a key management protocol for data communication between the utility server and customers' smart meters based on an ID-based public/private key pair model [33]. Although this protocol aims to reduce the computation overhead, the synchronization process still demands considerable computation efforts.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, this scheme is vulnerable to replay attacks and message integrity can be easily violated. Authentication and key management protocols for unicast and multicast communications are discussed by Nicanfar et al [59]. These protocols provide resistance against various security attacks and generate low overheads.…”
Section: Obj-4: Resistance To Attacks and Failuresmentioning
confidence: 99%