Trust-based geographical routing For smart grid communication networks

  title={Trust-based geographical routing For smart grid communication networks},
  author={Ming Xiang and William Liu and Quan Bai},
  journal={2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)},
Smart Grid is the trend of next generation power distribution and management network that enable interactive communication and operation between consumers and suppliers, which can achieve intelligent resource management and optimization. The wireless mesh network technology is a promising infrastructure solution to support these smart functionalities, while it has some inherent vulnerabilities and cyber-attack risks to be addressed. As Smart Grid is heavily relying on the communication network… CONTINUE READING


Publications citing this paper.
Showing 1-4 of 4 extracted citations

Behavioral Based Trust Metrics and the Smart Grid

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) • 2018
View 7 Excerpts
Highly Influenced


Publications referenced by this paper.
Showing 1-10 of 16 references

A Survey on Cyber Security for Smart Grid Communications

Y. Yan, Y. Qian, D. Tipper
IEEE Communications Surveys & Tutorials, vol. pp, issue 99, 2012, pp. 1-13. • 2012
View 1 Excerpt

A wireless mesh communication protocol for smart-metering

2012 International Conference on Computing, Networking and Communications (ICNC) • 2012
View 2 Excerpts

Survivable smart grid communication: Smart-meters meshes to the rescue

2012 International Conference on Computing, Networking and Communications (ICNC) • 2012
View 1 Excerpt

Improving IEEE 802.11s Wireless Mesh Networks for Reliable Routing in the Smart Grid Infrastructure

2011 IEEE International Conference on Communications Workshops (ICC) • 2011
View 1 Excerpt

Secure Routing in Wireless Sensor Networks

Handbook of Information and Communication Security • 2010
View 2 Excerpts

Similar Papers

Loading similar papers…