Alkaeed et al., 2020 - Google Patents
Distributed framework via block-chain smart contracts for smart grid systems against cyber-attacksAlkaeed et al., 2020
View PDF- Document ID
- 14454089570766571991
- Author
- Alkaeed M
- Soliman M
- Khan K
- Elfouly T
- Publication year
- Publication venue
- 2020 11th IEEE Control and System Graduate Research Colloquium (ICSGRC)
External Links
Snippet
In this century, the demand for energy is increasing daily, and the need for energy resources has become urgent and inevitable. New ways of generating energy, such as renewable resources that depend on many sources, including the sun and wind energy will contribute …
- 238000005516 engineering process 0 abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kimani et al. | Cyber security challenges for IoT-based smart grid networks | |
| Faquir et al. | Cybersecurity in smart grids, challenges and solutions | |
| Tatipatri et al. | A comprehensive review on cyber-attacks in power systems: Impact analysis, detection, and cyber security | |
| Gunduz et al. | Analysis of cyber-attacks on smart grid applications | |
| Ali et al. | IoT based smart home: Security challenges, security requirements and solutions | |
| Goel et al. | Security challenges in smart grid implementation | |
| Aloul et al. | Smart grid security: Threats, vulnerabilities and solutions | |
| Mo et al. | Cyber–physical security of a smart grid infrastructure | |
| Jokar et al. | A survey on security issues in smart grids | |
| Asri et al. | Impact of distributed denial-of-service attack on advanced metering infrastructure | |
| Mahmud et al. | A survey on smart grid metering infrastructures: Threats and solutions | |
| Abouzakhar | Critical infrastructure cybersecurity: A review of recent threats and violations | |
| Saxena et al. | Impact evaluation of malicious control commands in cyber-physical smart grids | |
| Mohammed et al. | Vulnerabilities and strategies of cybersecurity in smart grid-evaluation and review | |
| Li et al. | Towards insider threats detection in smart grid communication systems | |
| Jain et al. | SCADA security: a review and enhancement for DNP3 based systems | |
| Zhao et al. | An overview of cyber security for smart grid | |
| Rekik et al. | A cyber-physical threat analysis for microgrids | |
| Kumar et al. | Cybersecurity Threats, Detection Methods, and Prevention Strategies in Smart Grid | |
| Tyav et al. | A comprehensive review on smart grid data security | |
| Li et al. | Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems | |
| Taha et al. | Big data for smart grid: a case study | |
| Alkaeed et al. | Distributed framework via block-chain smart contracts for smart grid systems against cyber-attacks | |
| Ali et al. | Privacy-Preserving Machine Learning for IoT-Integrated Smart Grids: Recent Advances, Opportunities, and Challenges. | |
| Dasgupta et al. | Intrusion detection for power grid: a review |