Meter-HES Mutual Authentication in the Smart Grid AMI Environment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mutual Authentication with Smart Cards

The World Wide Web has become the de facto interface for consumer oriented electronic commerce. So far the interaction between consumers and merchants is mostly limited to providing information about products and credit card based payments for mail orders. This is largely due to the lack of security currently available for commercial transactions. At the moment the only security mechanism prese...

متن کامل

Efficient and fault-diagnosable authentication architecture for AMI in smart grid

The recently emerging advanced metering infrastructure (AMI) is envisioned to be one of the most prominent features of smart grid. Security, especially authentication, is crucial for the success of large-scale AMI deployment. Unfortunately, AMI’s natural requirements—efficiency, scalability, fault diagnoses, and reliability—cannot be fully satisfied by existing authentication schemes. To valida...

متن کامل

Secure Key Management Scheme for Ami in Smart Grid

The smart grid has been introduced as the next generation power grid. Advanced Metering Infrastructure (AMI) is one of the key components in this grid. It provides bidirectional communication between consumers and management entities in the utility side. This bidirectional nature communication flow has made AMI vulnerable to various cyber attacks. So, cyber security has become an important conc...

متن کامل

A Lightweight Authentication Protocol in Smart Grid

Smart grids allow automated meter readings and facilitate two-way communications between the smart meters and utility control centers. As the smart grid becomes more intelligent, it becomes increasingly vulnerable to cyberattacks. Smart grid security mainly focuses on mutual authentication and key management techniques. An impeding factor in grid security is the memory and processing constraint...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2016

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2016.10.12.05