Kgwadi et al., 2010 - Google Patents
Securing RDS broadcast messages for smart grid applicationsKgwadi et al., 2010
View PDF- Document ID
- 15045537578816968429
- Author
- Kgwadi M
- Kunz T
- Publication year
- Publication venue
- Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
External Links
Snippet
Efforts to reduce peak electrical demand has led to the introduction of demand response (DR) programs for residences. The RDS network is a strong candidate for delivering DR messages due to its low-cost nature and ubiquitous coverage. However, security concerns …
- 238000004891 communication 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L2001/0092—Error control systems characterised by the topology of the transmission link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lu et al. | Edge blockchain assisted lightweight privacy-preserving data aggregation for smart grid | |
Shim et al. | A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks | |
Wang et al. | Dependable and secure sensor data storage with dynamic integrity assurance | |
Luk et al. | Seven cardinal properties of sensor network broadcast authentication | |
US20080262798A1 (en) | Method and system for performing distributed verification with respect to measurement data in sensor network | |
Afianti et al. | Lightweight and DoS resistant multiuser authentication in wireless sensor networks for smart grid environments | |
CN114745689B (en) | A wireless sensor network multi-period data fusion method and system | |
Kgwadi et al. | Securing RDS broadcast messages for smart grid applications | |
CN110830251A (en) | Power utilization information safe transmission step and method under ubiquitous power Internet of things environment | |
Slater et al. | A coding-theoretic approach for efficient message verification over insecure channels | |
CN113382016A (en) | Fault-tolerant safe lightweight data aggregation method under intelligent power grid environment | |
Ameri et al. | Provably secure and efficient PUF‐based broadcast authentication schemes for smart grid applications | |
Li | IoT node authentication | |
Zhao et al. | Lightweight and integrity‐protecting oriented data aggregation scheme for wireless sensor networks | |
Ying et al. | Efficient authentication protocol for secure vehicular communications | |
Liu et al. | RPMDA: Robust and privacy-enhanced multidimensional data aggregation scheme for fog-assisted smart grids | |
Mbarek et al. | A secure authentication mechanism for resource constrained devices | |
Mbarek et al. | Energy efficient security protocols for wireless sensor networks: SPINS vs TinySec | |
Cairns et al. | Flexible data authentication evaluated for the smart grid | |
Yang et al. | Cryptanalysis and improvement of a blockchain-based certificateless signature for IIoT devices | |
Sui et al. | RESA: A robust and efficient secure aggregation scheme in smart grids | |
Ogundoyin | An Efficient, Secure and Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc Networks. | |
Ayday et al. | Data authenticity and availability in multihop wireless sensor networks | |
Anshul et al. | A ZKP-based identification scheme for base nodes in wireless sensor networks | |
Seys et al. | Efficient cooperative signatures: A novel authentication scheme for sensor networks |