P
Paria Jokar
Researcher at University of British Columbia
Publications - 13
Citations - 1061
Paria Jokar is an academic researcher from University of British Columbia. The author has contributed to research in topics: Smart grid & Key management. The author has an hindex of 9, co-authored 13 publications receiving 786 citations.
Papers
More filters
Journal ArticleDOI
Electricity Theft Detection in AMI Using Customers’ Consumption Patterns
TL;DR: A novel consumption pattern-based energy theft detector, which leverages the predictability property of customers' normal and malicious consumption patterns, and provides a high and adjustable performance with a low-sampling rate.
Journal ArticleDOI
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications
TL;DR: An efficient scheme that mutually authenticates a smart meter of a home area network and an authentication server in SG by utilizing an initial password is proposed and an efficient key management protocol based on the enhanced identity-based cryptography for secure SG communications using the public key infrastructure is proposed.
Proceedings ArticleDOI
Specification-based Intrusion Detection for home area networks in smart grids
TL;DR: This paper presents a layered specification-based Intrusion Detection Systems for HA# designed to target ZigBee technology, and addresses the physical and medium access control (MAC) layers.
Journal ArticleDOI
A survey on security issues in smart grids
TL;DR: This paper focuses on security and privacy concerns in the context of the smart grid, and surveys the existing literature on different security aspects of thesmart grid and provides directions for further research.
Proceedings ArticleDOI
Smart grid authentication and key management for unicast and multicast communications
TL;DR: The first step of designing and implementing security for any system such as a smart grid is an authentication scheme followed by a key management protocol, and other security aspects like integrity, authorization and confidentiality can be implemented as long as a strong key management Protocol has already been designed and addressed.