Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6,630 Hits in 6.6 sec

Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid

Neetesh Saxena, Bong Jun Choi, Rongxing Lu
2016 IEEE Transactions on Information Forensics and Security  
In this paper, we propose an authentication and authorization scheme for mitigating outsider and insider threats in the smart grid by verifying the user authorization and performing the user authentication  ...  Therefore, a secure and efficient mutual authentication and authorization scheme is needed in the smart grid to prevent various insider and outsider attacks on many different devices.  ...  To the best of our knowledge, there is no such scheme in the literature providing authentication and authorization for various users accessing different devices in the SG system.  ... 
doi:10.1109/tifs.2015.2512525 fatcat:yxkfuy5ozze35px3ht4otndca4

State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

Neetesh Saxena, Bong Choi
2015 Energies  
We also review the existing authentication schemes for the vehicle-to-grid (V2G) communication network along with various available secure integration and access control schemes.  ...  This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers  ...  Device-to-Device Authentication In the smart home environment, various smart devices and HAs communicate with each other via HAN. Secure communication among devices is a vital for SG security.  ... 
doi:10.3390/en81011883 fatcat:mgasu2xbgfatpnz3dcuq65xmqa

Design and Implementation of Distributed Identity and Access Management Framework for Internet of Things (IoT) Enabled Distribution Automation

Ally T Bitebo, Hellen Maziku, Ndyetabura , Hamisi, Charles N Tarimo, Kwame S Ibwe, Abdi T. Abdalla
2022 Tanzania Journal of Science  
The smart grid and Internet of Things (IoT) technologies play vital roles in improving the quality of services offered in traditional electrical grid.  ...  The results show that the scheme can prevent impersonated and non-legitimate system nodes and users from accessing the system by imposing role-based access control (RBAC) at the cluster level.  ...  Several researchers have proposed security architectures, frameworks and schemes to improve the security and integrity of the distributed IoT devices deployed in various domains like smart health, smart  ... 
doi:10.4314/tjs.v48i1.4 fatcat:2h2bnoh3inhkxncn6vud4tk77a

Authentication Method for Privacy Protection in Smart Grid Environment

Do-Eun Cho, Sang-Soo Yeo, Si-Jung Kim
2014 Journal of Applied Mathematics  
Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this  ...  Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush.  ...  AMI within smart grid plays an important role in connecting smart device and electrical grid and it receives and transmits the important information such as electricity consumption and user consumption  ... 
doi:10.1155/2014/280978 fatcat:njdkxhebcvgvjpviy7fm6sfj4q

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture

C. Chrysoulas, N. Pitropakis
2018 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
Before allowing any entity to have an access over a network and its associated resources, it is required to authenticate the entity, which may be a device or a user, and then verify the authorization and  ...  The authors believe that QoS and security can work in parallel without adding extra burden in the Smart Grid infrastructure.  ...  It is strongly required in the Smart Grid system as various users with different roles access billions of devices in the network.  ... 
doi:10.4108/eai.10-1-2018.153551 fatcat:of7oukwpsffwna4zbsbs6dsvxi

Access Control Model for Cloud Platforms Using Multi-Tier Graphical Authentication

2015 International Journal of Science and Research (IJSR)  
The proposed scheme has been evaluated as effective, robust, ease of access and wide adaptability of the scheme for the various smart phone platforms.  ...  In case, somebody once see a user entering the graphical password can easily remember or guess the pattern and can take access to the device.  ...  The user will have to correctly match the words and their codes for a particular word.  The second-level authentication pattern consists of various small images of different objects and colors in 3x3  ... 
doi:10.21275/v4i11.sub159264 fatcat:6ibxzkhjkbat3hdfqyxls7wuci

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey [article]

Amrita Ghosal, Mauro Conti
2018 arXiv   pre-print
Thus, AMI plays a significant role in the smooth functioning of smart grids. AMI is a privileged target for security attacks as it is made up of systems that are highly vulnerable to such attacks.  ...  In addition, AMI also provides intelligent management of various power-related applications and services based on the data collected from smart meters.  ...  Deploying AMI in smart grid should guarantee confidentiality of user privacy along with authentication for meter readings and control messages.  ... 
arXiv:1806.00121v1 fatcat:kbbuv36djnby3i4rlm4fapw2ja

Secure Two Factor Authentication of Protocol using Key Exchange Method

Pasupuleti Naveen
2018 International Journal for Research in Applied Science and Engineering Technology  
Nowadays since data can be accessed anywhere and with any network connected device, it is very necessary to provide a better security system to cloud storage.  ...  And for downloading of data also a unique key is generated automatically without which the data cannot be downloaded.  ...  [1] Hwang and Li proposed a new remote user authentication scheme using smart cards. Smart Check Digits is used to generate a user authentication method which can be used remotely.  ... 
doi:10.22214/ijraset.2018.4528 fatcat:i2pdqpaeqnempl3b4jrnyvl3pi

A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks

Wajahat Ali, Ikram Ud Din, Ahmad Almogren, Byung-Seo Kim
2022 Sensors  
A novel privacy-preserving method for smart grid-based home area networks (HAN) is proposed in this research.  ...  Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network.  ...  Acknowledgments: This work was supported in part by the National Research Foundation (NRF), Korea, under Project BK21 FOUR (F21YY8102068) and in part by King Saud University, Riyadh, Saudi Arabia, through  ... 
doi:10.3390/s22062269 pmid:35336439 pmcid:PMC8950649 fatcat:q3zl5jflwfbcxdaommyf7yy2oe

A Secure key Distribution and Management Scheme for Home Area Network in Smart Grid

Halim Halimi, Aristotel Tentov
2013 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
In order to achieve data confidentiality, privacy, and authentication in AMI, various crypto algorithms are used, such as demand key distribution and management schemes.  ...  In this paper, we propose a secure key distribution for Home Area Network (HAN) in smart grid.  ...  In work [3] , a device authentication mechanism and key establishment scheme for smart grid Home Area Network with few security properties is proposed.  ... 
doi:10.24297/ijct.v12i8.3015 fatcat:inec6mogqvbutfmz42ujr4uzlm

A Survey on Privacy-preserving Schemes for Smart Grid Communications [article]

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang
2016 arXiv   pre-print
Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids.  ...  In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications.  ...  Following a different approach, authors in [67] and [55] specifically focus on how cloud computing (CC) could be used for energy management, information management and security of the Smart Grid.  ... 
arXiv:1611.07722v1 fatcat:rfw2j642ljajpcwxlaf5q5pmhy

Press touch code: A finger press based screen size independent authentication scheme for smart devices

M. S. A. Noman Ranak, Saiful Azad, Nur Nadiah Hanim Binti Mohd Nor, Kamal Z. Zamli, Muhammad Khurram Khan
2017 PLoS ONE  
To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes.  ...  Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards.  ...  Acknowledgments This work is supported by the RDU grants RDU160353 and RDU160107, which are funded by  ... 
doi:10.1371/journal.pone.0186940 pmid:29084262 pmcid:PMC5662178 fatcat:tegpcgs7yzbvhmdlgz7bubjub4

Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment

SungJin Yu, KiSung Park, JoonYoung Lee, YoungHo Park, YoHan Park, SangWoo Lee, BoHeung Chung
2020 Applied Sciences  
and anywhere in smart grid (SG) environments.  ...  With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart building, and smart home services at anytime  ...  Smart grid device (SD i ) Trusted authority (TA) Generates a random number x i , a i for SD i Computes Figure 6 . Smart grid device registration process of the proposed scheme.  ... 
doi:10.3390/app10051758 fatcat:ccuo7adzrfeefh4ga3exrcbeme

The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid

Anna Triantafyllou, Jose Antonio Perez Jimenez, Alejandro del Real Torres, Thomas Lagkas, Konstantinos Rantos, Panagiotis Sarigiannidis
2020 IEEE Open Journal of the Communications Society  
The Electric Smart Grid (ESG) is referred to as the next generation electricity power network.  ...  The ESG is an intelligent critical infrastructure subject to various security vulnerabilities and especially data privacy breaches.  ...  ACKNOWLEDGMENT The research leading to these results has received funding from the European Unions Horizon 2020 research and innovation programme under grant agreement No 833955.  ... 
doi:10.1109/ojcoms.2020.3037517 fatcat:2qhvityrlrdjvawlkx54wmpkna

Ensuring a Secure and Resilient Smart Grid: Cyber-Attacks and Countermeasures [article]

Charalambos Konstantinou
2015 arXiv   pre-print
This paper surveys the latest on Smart Grid security. It focuses on the deep understanding of the risk in terms of threats, vulnerabilities and consequences that arise from cyber-attacks.  ...  Since field devices in the Smart Grid often have limited storage space, the authors in [56] addressed the authentication issue from a storage load minimization perspective.  ...  For instance, users may have multiple roles, but conflict of interest of those roles must be prevented.  ... 
arXiv:1502.00237v2 fatcat:qcltyph5enhlxlbslbn7xftiea
« Previous Showing results 1 — 15 out of 6,630 results