Cryptographic Key Management for Smart Power Grids - Approaches and Issues

  title={Cryptographic Key Management for Smart Power Grids - Approaches and Issues},
  author={Mohamed Nabeel and John Zage and Sam Kerr and Elisa Bertino and N. Athula Kulatunga and U. Sudheera Navaratne and Michael Duren},
The smart power grid promises to improve efficiency and reliability of power delivery. This report introduces the logical components, associated techn ologies, security protocols, and network designs of the system. Undermining the potential benefits are sec urity threats, and those threats related to cyber s ecurity are described in this report. Concentrating on the design of the smart meter and its communication lin ks, this report describes the ZigBee technology and imp le entation, and the… CONTINUE READING


Publications referenced by this paper.
Showing 1-10 of 19 references

Advance metering infrastructu re attack methodology

  • M. Carpenter, T. Goodspeed, B. Singletary, E. Skoudis, J. Wright
  • Inguardians Publication, Janu ary 2009 http…
  • 2011
3 Excerpts

Could Hacker Break into Your Electric Meter”,

  • G. Musser
  • Scientific American, August 11,
  • 2011

Grid Security: Evaluation of Active and Passive Attacks with Proposed Countermeasures”, R earch

  • N Azeez, I. Tiko, I. Venter, R. O. Onifade
  • eez,
  • 2011
2 Excerpts

InGuardians), “Smart Meters Have Sec urity Holes.

  • J. Wright
  • 2011
1 Excerpt

Internet Standards Come to the Advanced Metering Infrastructure”, ElectricEnergyPublication,2011. cle&mag=66&arti cle=525

  • M. Thaker, A. Roland
  • 2011

L.Nguyen, “ Key Management in Distributed Systems”, Extreme Computing Group, Microsoft Research, Micros oft

  • T Acar1, M. Belenkiy, C. Ellison
  • 2011
1 Excerpt

A Survey on Key Management Strategies for Different Applications of Wireless Senor Networks”, Journal of Computing Science and E ngineering (ISSN: 1976-4677)

  • S. Razzi, S. Lee
  • Volume 4, Number
  • 2010

KillerBee: Practical ZigBee Exploi tation Framework or "Wireless Hacking and the Kinetic World

  • J. Wright
  • Presentation at ToorCon
  • 2010
2 Excerpts

and E

  • N. Shang, M. Nabeel, F. Paci
  • Bertino, “A privacy-preserving approach to…
  • 2010

Similar Papers

Loading similar papers…