scholarly journals Securing Metering Infrastructure of Smart Grid: A Machine Learning and Localization Based Key Management Approach

Energies ◽  
2016 ◽  
Vol 9 (9) ◽  
pp. 691 ◽  
Author(s):  
Imtiaz Parvez ◽  
Arif Sarwat ◽  
Longfei Wei ◽  
Aditya Sundararajan

Due to the wide range of applications in public and military domains, wireless sensor network (WSN) is evolving as a popular technology. This WSN consists of a large number of sensors that are spread across a geographical area thatare self-configuring in nature. These nodes are of low cost and resource-constrained nodes. Because these reasons the network becomes vulnerable to many network attacks. There are many types of attacks among which one of the serious attacks is the sinkhole attack, which is one of the destructive routing attacks. It causes the adversary node to attract all or most of the traffic from the neighbors by broadcasting false routing updates of having the shortest path to the central station. This paper is a survey on various methods implemented to overcome sinkhole attacks like Hop Count Monitoring scheme, Key Management Approach, Message-Digest Algorithm.


2011 ◽  
Vol 2011 ◽  
pp. 1-8 ◽  
Author(s):  
Swapna Iyer

The invention of “smart grid” promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will focus on these threats and risks especially relating to cyber security. Cyber security is a vital topic, since the smart grid uses high level of computation like the IT. We will also see cryptography and key management techniques that are required to overcome these attacks. Privacy of consumers is another important security concern that this paper will deal with.


Sign in / Sign up

Export Citation Format

Share Document