[go: up one dir, main page]

Kgwadi et al., 2010 - Google Patents

Securing RDS broadcast messages for smart grid applications

Kgwadi et al., 2010

View PDF
Document ID
15045537578816968429
Author
Kgwadi M
Kunz T
Publication year
Publication venue
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference

External Links

Snippet

Efforts to reduce peak electrical demand has led to the introduction of demand response (DR) programs for residences. The RDS network is a strong candidate for delivering DR messages due to its low-cost nature and ubiquitous coverage. However, security concerns …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L2001/0092Error control systems characterised by the topology of the transmission link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/06Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control

Similar Documents

Publication Publication Date Title
Lu et al. Edge blockchain assisted lightweight privacy-preserving data aggregation for smart grid
Shim et al. A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks
Wang et al. Dependable and secure sensor data storage with dynamic integrity assurance
Luk et al. Seven cardinal properties of sensor network broadcast authentication
US20080262798A1 (en) Method and system for performing distributed verification with respect to measurement data in sensor network
Afianti et al. Lightweight and DoS resistant multiuser authentication in wireless sensor networks for smart grid environments
CN114745689B (en) A wireless sensor network multi-period data fusion method and system
Kgwadi et al. Securing RDS broadcast messages for smart grid applications
CN110830251A (en) Power utilization information safe transmission step and method under ubiquitous power Internet of things environment
Slater et al. A coding-theoretic approach for efficient message verification over insecure channels
CN113382016A (en) Fault-tolerant safe lightweight data aggregation method under intelligent power grid environment
Ameri et al. Provably secure and efficient PUF‐based broadcast authentication schemes for smart grid applications
Li IoT node authentication
Zhao et al. Lightweight and integrity‐protecting oriented data aggregation scheme for wireless sensor networks
Ying et al. Efficient authentication protocol for secure vehicular communications
Liu et al. RPMDA: Robust and privacy-enhanced multidimensional data aggregation scheme for fog-assisted smart grids
Mbarek et al. A secure authentication mechanism for resource constrained devices
Mbarek et al. Energy efficient security protocols for wireless sensor networks: SPINS vs TinySec
Cairns et al. Flexible data authentication evaluated for the smart grid
Yang et al. Cryptanalysis and improvement of a blockchain-based certificateless signature for IIoT devices
Sui et al. RESA: A robust and efficient secure aggregation scheme in smart grids
Ogundoyin An Efficient, Secure and Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc Networks.
Ayday et al. Data authenticity and availability in multihop wireless sensor networks
Anshul et al. A ZKP-based identification scheme for base nodes in wireless sensor networks
Seys et al. Efficient cooperative signatures: A novel authentication scheme for sensor networks