An Energy Efficient Authentication Scheme based on Chebyshev Chaotic Map for Smart Grid Environments

Author(s):  
Liping Zhang ◽  
Yue Zhu ◽  
Wei Ren ◽  
Yinghan Wang ◽  
Kim-Kwang Raymond Choo ◽  
...  
2018 ◽  
Vol 15 (5) ◽  
pp. 824-839 ◽  
Author(s):  
Santanu Chatterjee ◽  
Sandip Roy ◽  
Ashok Kumar Das ◽  
Samiran Chattopadhyay ◽  
Neeraj Kumar ◽  
...  

2021 ◽  
Vol 13 (5) ◽  
pp. 2549
Author(s):  
Shahid Mahmood ◽  
Moneeb Gohar ◽  
Jin-Ghoo Choi ◽  
Seok-Joo Koh ◽  
Hani Alquhayz ◽  
...  

Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets. The revolution of SGs has also introduced new avenues of security threats. Although Digital Certificates provide countermeasures, however, one of the issues that exist, is how to efficiently distribute certificate revocation information among Edge devices. The conventional mechanisms, including certificate revocation list (CRL) and online certificate status protocol (OCSP), are subjected to some limitations in energy efficient environments like SG infrastructure. To address the aforementioned challenges, this paper proposes a scheme incorporating the advantages and strengths of the fog computing. The fog node can be used for this purpose with much better resources closer to the edge. Keeping the resources closer to the edge strengthen the security aspect of smart grid networks. Similarly, a fog node can act as an intermediate Certification Authority (CA) (i.e., Fog Node as an Intermediate Certification Authority (FONICA)). Further, the proposed scheme has reduced storage, communication, processing overhead, and latency for certificate verification at edge devices. Furthermore, the proposed scheme reduces the attack surface, even if the attacker becomes a part of the network.


2014 ◽  
Vol 2014 ◽  
pp. 1-8
Author(s):  
Sang-Soo Yeo ◽  
Dae-il Park ◽  
Young-Ae Jung

This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.


2013 ◽  
Vol 340 ◽  
pp. 908-912
Author(s):  
Ke Zhang

The smart grid is an ideal solution of the future electricity system, and scheduling aspects of the smart grid, the nerve center of the most intelligent can best embody the intelligent characteristic, this article summarizes the development of smart grid technologies, energy-saving scheduling, and the smart grid ofsignificance analysis to explore the implementation of energy-saving dispatch to the power industry, an energy efficient scheduling model and highlight the superiority of the energy-saving scheduling in order to ensure the smooth implementation of energy-saving scheduling.


2016 ◽  
Vol 13 (10) ◽  
pp. 119-136 ◽  
Author(s):  
Yan Wang ◽  
Qingxu Deng ◽  
Genghao Liu ◽  
Xiuping Hao ◽  
Baoyan Song

Sign in / Sign up

Export Citation Format

Share Document