Grid Security Architecture

Author(s):  
Jose Montenegro ◽  
Javier Lopez ◽  
Jose Vivas
2016 ◽  
Vol 10 (2) ◽  
pp. 1-10 ◽  
Author(s):  
Aftab Ahmad

The authors present a protocol and security architecture for the smart grid in an advanced metering infrastructure (AMI). Various levels of the hierarchical grid are isolated in protocol planes for preventing propagation of attacks. The utility meters are interconnected via the wireless technologies in order for metering functions, as well as location identification and reporting for attackers. An amended version of Bell Labs security framework (aka, ITU-X.805) protects every component with added first response security apparatus, forensic component and a location determination algorithm for fortifying the PHY of WLAN interconnecting the meters.


2007 ◽  
Author(s):  
Rachid Saadi ◽  
Jean Marc Pierson ◽  
Lionel Brunie

Author(s):  
Massimiliano Pala ◽  
Shreyas Cholia ◽  
Scott A. Rea ◽  
Sean W. Smith

One of the most successful working examples of virtual organizations, computational Grids need authentication mechanisms that inter-operate across domain boundaries. Public Key Infrastructures (PKIs) provide sufficient flexibility to allow resource managers to securely grant access to their systems in such distributed environments. However, as PKIs grow and services are added to enhance both security and usability, users and applications must struggle to discover available resources-particularly when the Certification Authority (CA) is alien to the relying party. This chapter presents a successful story about how to overcome these limitations by deploying the PKI Resource Query Protocol (PRQP) into the grid security architecture. We also discuss the future of Grid authentication by introducing the Public Key System (PKS) and its key features to support federated identities.


Author(s):  
Yuri Demchenko ◽  
Cees de Laat ◽  
Oscar Koeroo ◽  
David Groep

Sign in / Sign up

Export Citation Format

Share Document