scispace - formally typeset
P

Paria Jokar

Researcher at University of British Columbia

Publications -  13
Citations -  1061

Paria Jokar is an academic researcher from University of British Columbia. The author has contributed to research in topics: Smart grid & Key management. The author has an hindex of 9, co-authored 13 publications receiving 786 citations.

Papers
More filters
Journal ArticleDOI

Electricity Theft Detection in AMI Using Customers’ Consumption Patterns

TL;DR: A novel consumption pattern-based energy theft detector, which leverages the predictability property of customers' normal and malicious consumption patterns, and provides a high and adjustable performance with a low-sampling rate.
Journal ArticleDOI

Efficient Authentication and Key Management Mechanisms for Smart Grid Communications

TL;DR: An efficient scheme that mutually authenticates a smart meter of a home area network and an authentication server in SG by utilizing an initial password is proposed and an efficient key management protocol based on the enhanced identity-based cryptography for secure SG communications using the public key infrastructure is proposed.
Proceedings ArticleDOI

Specification-based Intrusion Detection for home area networks in smart grids

TL;DR: This paper presents a layered specification-based Intrusion Detection Systems for HA# designed to target ZigBee technology, and addresses the physical and medium access control (MAC) layers.
Journal ArticleDOI

A survey on security issues in smart grids

TL;DR: This paper focuses on security and privacy concerns in the context of the smart grid, and surveys the existing literature on different security aspects of thesmart grid and provides directions for further research.
Proceedings ArticleDOI

Smart grid authentication and key management for unicast and multicast communications

TL;DR: The first step of designing and implementing security for any system such as a smart grid is an authentication scheme followed by a key management protocol, and other security aspects like integrity, authorization and confidentiality can be implemented as long as a strong key management Protocol has already been designed and addressed.