2015
DOI: 10.3390/en81011883
|View full text |Cite
|
Sign up to set email alerts
|

State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

Abstract: Abstract:The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
30
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 63 publications
(31 citation statements)
references
References 92 publications
1
30
0
Order By: Relevance
“…If an adversary gains unauthorized access to the grid control system, she can perform various types of security attacks. Some types of attacks, such as reply attacks [2], are difficult to detect. In this paper, we consider a traditional Supervisory Control and Data Acquisition (SCADA) control scenario.…”
Section: Introductionmentioning
confidence: 99%
“…If an adversary gains unauthorized access to the grid control system, she can perform various types of security attacks. Some types of attacks, such as reply attacks [2], are difficult to detect. In this paper, we consider a traditional Supervisory Control and Data Acquisition (SCADA) control scenario.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, other standardized authentication protocols also exist, such as remote authentication dial-in user service (RADIUS) and Diameter protocols for the 2G, 3G, and 4G cellular networks [11].…”
Section: A Motivation and Research Problemmentioning
confidence: 99%
“…Furthermore, the authentication provided by DLMS/COSEM, OpenADR, RADIUS, and Diameter are not sufficient, and also OpenADR is costly [11]. The DLMS (application layer communication protocol) and COSEM (data model) together provide an interface model for metering applications [14].…”
Section: A Motivation and Research Problemmentioning
confidence: 99%
“…There exist various security and privacy challenges in the V2G system that can massively affect practical usage of this next generation technology [12]. The information shared by the EVs and other V2G entities, such as LAG, Certification/Registration Authority (CA/RA), and CC must be secured over the network, and privacy of the personal and confidential information must be maintained.…”
Section: Introductionmentioning
confidence: 99%