Towards a light-weight message authentication mechanism tailored for Smart Grid communications

@article{Fouda2011TowardsAL,
  title={Towards a light-weight message authentication mechanism tailored for Smart Grid communications},
  author={Mostafa Fouda and Zubair Md. Fadlullah and Nei Kato and R. Lu and Xuemin Shen},
  journal={2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
  year={2011},
  pages={1018-1023}
}
Smart Grid (SG) technology, which aims at bringing the world's aging electric grids into the 21st century by utilizing intelligent transmission and distributed networks, has been gaining momentum in recent years. Despite its attractive features, the SG technology remains vulnerable to some security threats, such as spoofing and man-in-the-middle attacks. In this paper, to address these potential security issues, we propose a light-weight and secure message authentication mechanism. The proposed… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 34 CITATIONS

Authentication Protocols for Internet of Things: A Comprehensive Survey

  • Security and Communication Networks
  • 2016
VIEW 11 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A survey on security issues in smart grids

  • Security and Communication Networks
  • 2016
VIEW 2 EXCERPTS
CITES BACKGROUND

Energy big data: A survey

VIEW 1 EXCERPT
CITES METHODS

An efficient distributed approach for key management in microgrids

  • 2015 11th International Computer Engineering Conference (ICENCO)
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES

A proposed communications infrastructure for the smart grid

  • 2010 Innovative Smart Grid Technologies (ISGT)
  • 2010
VIEW 1 EXCERPT

Hubauxz, and A. Lioyy, “Efficient and Robust Pseudonymous Authentication in VANET

G. Calandrielloy, P. Papadimitratosz, J-P
  • Proc. VANET’07,
  • 2007
VIEW 1 EXCERPT

Stingson, Cryptography: Theory and Practice, 3rd ed

D R.
  • Boca Raton, FL: CRC,
  • 2005
VIEW 2 EXCERPTS

Random Oracles are Practical: A Paradigm for Designing Efficient Protocols

  • ACM Conference on Computer and Communications Security
  • 1993
VIEW 1 EXCERPT