A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid
2016
IEEE Transactions on Information Forensics and Security
In this paper, we propose an authentication and authorization scheme for mitigating outsider and insider threats in the smart grid by verifying the user authorization and performing the user authentication ...
Therefore, a secure and efficient mutual authentication and authorization scheme is needed in the smart grid to prevent various insider and outsider attacks on many different devices. ...
To the best of our knowledge, there is no such scheme in the literature providing authentication and authorization for various users accessing different devices in the SG system. ...
doi:10.1109/tifs.2015.2512525
fatcat:yxkfuy5ozze35px3ht4otndca4
State of the Art Authentication, Access Control, and Secure Integration in Smart Grid
2015
Energies
We also review the existing authentication schemes for the vehicle-to-grid (V2G) communication network along with various available secure integration and access control schemes. ...
This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers ...
Device-to-Device Authentication In the smart home environment, various smart devices and HAs communicate with each other via HAN. Secure communication among devices is a vital for SG security. ...
doi:10.3390/en81011883
fatcat:mgasu2xbgfatpnz3dcuq65xmqa
Design and Implementation of Distributed Identity and Access Management Framework for Internet of Things (IoT) Enabled Distribution Automation
2022
Tanzania Journal of Science
The smart grid and Internet of Things (IoT) technologies play vital roles in improving the quality of services offered in traditional electrical grid. ...
The results show that the scheme can prevent impersonated and non-legitimate system nodes and users from accessing the system by imposing role-based access control (RBAC) at the cluster level. ...
Several researchers have proposed security architectures, frameworks and schemes to improve the security and integrity of the distributed IoT devices deployed in various domains like smart health, smart ...
doi:10.4314/tjs.v48i1.4
fatcat:2h2bnoh3inhkxncn6vud4tk77a
Authentication Method for Privacy Protection in Smart Grid Environment
2014
Journal of Applied Mathematics
Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this ...
Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. ...
AMI within smart grid plays an important role in connecting smart device and electrical grid and it receives and transmits the important information such as electricity consumption and user consumption ...
doi:10.1155/2014/280978
fatcat:njdkxhebcvgvjpviy7fm6sfj4q
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture
2018
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
Before allowing any entity to have an access over a network and its associated resources, it is required to authenticate the entity, which may be a device or a user, and then verify the authorization and ...
The authors believe that QoS and security can work in parallel without adding extra burden in the Smart Grid infrastructure. ...
It is strongly required in the Smart Grid system as various users with different roles access billions of devices in the network. ...
doi:10.4108/eai.10-1-2018.153551
fatcat:of7oukwpsffwna4zbsbs6dsvxi
Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication
2015
International Journal of Science and Research (IJSR)
The proposed scheme has been evaluated as effective, robust, ease of access and wide adaptability of the scheme for the various smart phone platforms. ...
In case, somebody once see a user entering the graphical password can easily remember or guess the pattern and can take access to the device. ...
The user will have to correctly match the words and their codes for a particular word. The second-level authentication pattern consists of various small images of different objects and colors in 3x3 ...
doi:10.21275/v4i11.sub159264
fatcat:6ibxzkhjkbat3hdfqyxls7wuci
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey
[article]
2018
arXiv
pre-print
Thus, AMI plays a significant role in the smooth functioning of smart grids. AMI is a privileged target for security attacks as it is made up of systems that are highly vulnerable to such attacks. ...
In addition, AMI also provides intelligent management of various power-related applications and services based on the data collected from smart meters. ...
Deploying AMI in smart grid should guarantee confidentiality of user privacy along with authentication for meter readings and control messages. ...
arXiv:1806.00121v1
fatcat:kbbuv36djnby3i4rlm4fapw2ja
Secure Two Factor Authentication of Protocol using Key Exchange Method
2018
International Journal for Research in Applied Science and Engineering Technology
Nowadays since data can be accessed anywhere and with any network connected device, it is very necessary to provide a better security system to cloud storage. ...
And for downloading of data also a unique key is generated automatically without which the data cannot be downloaded. ...
[1] Hwang and Li proposed a new remote user authentication scheme using smart cards. Smart Check Digits is used to generate a user authentication method which can be used remotely. ...
doi:10.22214/ijraset.2018.4528
fatcat:i2pdqpaeqnempl3b4jrnyvl3pi
A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks
2022
Sensors
A novel privacy-preserving method for smart grid-based home area networks (HAN) is proposed in this research. ...
Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network. ...
Acknowledgments: This work was supported in part by the National Research Foundation (NRF), Korea, under Project BK21 FOUR (F21YY8102068) and in part by King Saud University, Riyadh, Saudi Arabia, through ...
doi:10.3390/s22062269
pmid:35336439
pmcid:PMC8950649
fatcat:q3zl5jflwfbcxdaommyf7yy2oe
A Secure key Distribution and Management Scheme for Home Area Network in Smart Grid
2013
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
In order to achieve data confidentiality, privacy, and authentication in AMI, various crypto algorithms are used, such as demand key distribution and management schemes. ...
In this paper, we propose a secure key distribution for Home Area Network (HAN) in smart grid. ...
In work [3] , a device authentication mechanism and key establishment scheme for smart grid Home Area Network with few security properties is proposed. ...
doi:10.24297/ijct.v12i8.3015
fatcat:inec6mogqvbutfmz42ujr4uzlm
A Survey on Privacy-preserving Schemes for Smart Grid Communications
[article]
2016
arXiv
pre-print
Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids. ...
In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. ...
Following a different approach, authors in [67] and [55] specifically focus on how cloud computing (CC) could be used for energy management, information management and security of the Smart Grid. ...
arXiv:1611.07722v1
fatcat:rfw2j642ljajpcwxlaf5q5pmhy
Press touch code: A finger press based screen size independent authentication scheme for smart devices
2017
PLoS ONE
To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. ...
Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. ...
Acknowledgments This work is supported by the RDU grants RDU160353 and RDU160107, which are funded by ...
doi:10.1371/journal.pone.0186940
pmid:29084262
pmcid:PMC5662178
fatcat:tegpcgs7yzbvhmdlgz7bubjub4
Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment
2020
Applied Sciences
and anywhere in smart grid (SG) environments. ...
With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart building, and smart home services at anytime ...
Smart grid device (SD i ) Trusted authority (TA) Generates a random number x i , a i for SD i Computes Figure 6 . Smart grid device registration process of the proposed scheme. ...
doi:10.3390/app10051758
fatcat:ccuo7adzrfeefh4ga3exrcbeme
The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid
2020
IEEE Open Journal of the Communications Society
The Electric Smart Grid (ESG) is referred to as the next generation electricity power network. ...
The ESG is an intelligent critical infrastructure subject to various security vulnerabilities and especially data privacy breaches. ...
ACKNOWLEDGMENT The research leading to these results has received funding from the European Unions Horizon 2020 research and innovation programme under grant agreement No 833955. ...
doi:10.1109/ojcoms.2020.3037517
fatcat:2qhvityrlrdjvawlkx54wmpkna
Ensuring a Secure and Resilient Smart Grid: Cyber-Attacks and Countermeasures
[article]
2015
arXiv
pre-print
This paper surveys the latest on Smart Grid security. It focuses on the deep understanding of the risk in terms of threats, vulnerabilities and consequences that arise from cyber-attacks. ...
Since field devices in the Smart Grid often have limited storage space, the authors in [56] addressed the authentication issue from a storage load minimization perspective. ...
For instance, users may have multiple roles, but conflict of interest of those roles must be prevented. ...
arXiv:1502.00237v2
fatcat:qcltyph5enhlxlbslbn7xftiea
« Previous
Showing results 1 — 15 out of 6,630 results