scispace - formally typeset
Journal ArticleDOI

A Key Management Scheme for Secure Communications of Information Centric Advanced Metering Infrastructure in Smart Grid

Reads0
Chats0
TLDR
An Information Centric AMI (ICN-AMI) structure and a novel key management scheme (KMS) for a large number of smart meters (SMs) in this system to ensure confidentiality, integrality and authentication is proposed.
Abstract
Advanced metering infrastructure (AMI), as the totality of systems and networks to measure, collect, store, analyze, and use energy usage data, is supposed to be the core component in smart grid. In AMI, there are numerous challenges among which cyber security is a major one that needs to be addressed with priority. The information centric networking (ICN) is a promising architecture for the future Internet that disseminates content based on named data instead of named hosts. The congestion control and self-security can enable more scalable, secure, collaborative, and pervasive networking, these make the ICN a potential network architecture for smart grid. This paper aims to apply the ICN approach on AMI system, which we termed as information centric AMI (ICN-AMI). To the best of our knowledge, this is the first attempt to distribute contents (or requests for contents) based on ICN in AMI system. Moreover, a simulation-based performance evaluation is employed to evaluate the effectiveness of the proposed ICN-AMI approach in traffic control for developing AMI system in smart grid. In addition, we proposed a novel key management scheme (KMS) for a large number of smart meters in this system to ensure confidentiality, integrality, and authentication. To validate the scheme, the security analysis, comparisons are done to demonstrate that the proposed information centric KMS (ICN-KMS) is possible and a promising solution for ICN-AMI system.

read more

Citations
More filters
Journal ArticleDOI

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey

TL;DR: This survey highlights the key security issues of AMIs and focuses on how key management techniques can be utilized for safeguarding AMI, and provides a review of the existing works in literature that deal with secure KMS in AMI.
Journal ArticleDOI

A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle

TL;DR: A secure mechanism for big data collection in large scale IoV is proposed for improved security performance and efficiency and two different secure protocols are proposed for business data and confidential data collection.
Journal ArticleDOI

A Survey on Energy Internet Communications for Sustainability

TL;DR: The motivation and key concepts of EI are first introduced, followed by the key technologies and standardizations enabling the EI communications as well as security issues.
Journal ArticleDOI

AuthPrivacyChain: A Blockchain-Based Access Control Framework with Privacy Protection in Cloud

TL;DR: This work proposes a blockchain-based access control framework with privacy protection called AuthPrivacyChain, which can not only prevent hackers and administrators from illegally accessing resources, but also protect authorized privacy.
Journal ArticleDOI

Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach

TL;DR: Wang et al. as mentioned in this paper proposed a blockchain-empowered security and privacy protection scheme with traceable and direct revocation for COVID-19 medical records, which performs the blockchain for uniform identity authentication and all public keys, revocation lists, etc are stored on a blockchain.
References
More filters
Proceedings ArticleDOI

Networking named content

TL;DR: Content-Centric Networking (CCN) is presented, which treats content as a primitive - decoupling location from identity, security and access, and retrieving content by name, using new approaches to routing named content.
Journal ArticleDOI

Networking named content

TL;DR: Content-Centric Networking (CCN) is presented which uses content chunks as a primitive---decoupling location from identity, security and access, and retrieving chunks of content by name, and simultaneously achieves scalability, security, and performance.
Journal ArticleDOI

A survey of information-centric networking

TL;DR: This work compares and discusses design choices and features of proposed ICN architectures, focusing on the following main components: named data objects, naming and security, API, routing and transport, and caching.
Journal ArticleDOI

Secure group communications using key graphs

TL;DR: It is shown that the group key management service, using any of the three rekeying strategies, is scalable to large groups with frequent joins and leaves, and the average measured processing time per join/leave increases linearly with the logarithm of group size.
Journal ArticleDOI

Smart home energy management system using IEEE 802.15.4 and zigbee

TL;DR: This paper introduces smart home interfaces and device definitions to allow interoperability among ZigBee devices produced by various manufacturers of electrical equipment, meters, and smart energy enabling products.
Related Papers (5)