2016 7th India International Conference on Power Electronics (IICPE) 2016
DOI: 10.1109/iicpe.2016.8079534
|View full text |Cite
|
Sign up to set email alerts
|

Survey on authentication and encryption techniquesfor smart grid communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…A replay assault successfully obtained access to the SCADA system that managed the centrifuges and was launched using the malware known as Stux Net. This directly caused the centrifuge control system to become corrupt, which made around 1000 of the centrifuges useless [122]. Figure 12 shows a replay attack.…”
Section: Replay Attackmentioning
confidence: 99%
“…A replay assault successfully obtained access to the SCADA system that managed the centrifuges and was launched using the malware known as Stux Net. This directly caused the centrifuge control system to become corrupt, which made around 1000 of the centrifuges useless [122]. Figure 12 shows a replay attack.…”
Section: Replay Attackmentioning
confidence: 99%
“…Additionally, something possibly as trivial as securing that the reading from the end-user’s smart meters are sending correct billing information, or that the utilities companies receive the correct information is essential [ 116 ]. As for any other communication systems, security enhancement for SG communication can be achieved at different layer of the protocol by utilizing the techniques from the conventional upper layer cryptography [ 117 , 118 , 119 , 120 , 121 ] to the physical layer security [ 122 , 123 , 124 , 125 ]. Different communication technologies, wired and wireless, interconnects and are required to operate the grid securely.…”
Section: Challenges Of Smart Grid Communicationmentioning
confidence: 99%
“…Also something possibly as trivial as securing that the reading from the end-user's smart meters are sending correct billing information, or that the utilities companies receive the correct information is essential [102]. As for any other communication systems, security enhancement for smart grid communication can be achieved at different layer of the protocol by utilizing the techniques from the conventional upper layer cryptography [103][104][105][106][107] to the physical layer security [108][109][110][111] Personal data act, Section 13 sets requirements for satisfactory information security [112]. Based on this, the Norwegian Electrotechnical Committee (NEK) emphasizes on the following three aspects in relation to security in smart grids: confidentiality, integrity and availability, as well as the following four elements [113].…”
Section: Securitymentioning
confidence: 99%