Kayem et al., 2016 - Google Patents
Key management for secure demand data communication in constrained micro-gridsKayem et al., 2016
- Document ID
- 254066500539825100
- Author
- Kayem A
- Strauss H
- Wolthusen S
- Meinel C
- Publication year
- Publication venue
- 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
External Links
Snippet
Micro-grids allow rural and remote communities that are either not connected to the national power grid, or suffer from load shedding, to operate power networks autonomously. Like conventional power networks, micro-grids require management and billing mechanisms …
- 238000004891 communication 0 title description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Communication or information technology specific aspects supporting electrical power generation, transmission, distribution or end-user application management
- Y04S40/20—Information technology specific aspects
- Y04S40/24—Arrangements for network security or for protecting computers or computer systems against unauthorised activity, e.g. cyber security
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E60/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02E60/70—Systems integrating technologies related to power network operation and communication or information technologies mediating in the improvement of the carbon footprint of electrical power generation, transmission or distribution, i.e. smart grids as enabling technology in the energy generation sector not used, see subgroups
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Luo et al. | A lightweight privacy-preserving communication protocol for heterogeneous IoT environment | |
Mahmood et al. | An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure | |
CN101194459B (en) | Predistributed deterministic keys for mobile somatic sensor networks | |
Albakri et al. | Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN) | |
Pothumarti et al. | A lightweight authentication scheme for 5G mobile communications: a dynamic key approach | |
Abualghanam et al. | A survey of key distribution in the context of internet of things | |
Erfani et al. | A dynamic key management scheme for dynamic wireless sensor networks | |
Anggorojati et al. | Securing communication in inter domains Internet of Things using identity-based cryptography | |
Kayem et al. | Key management for secure demand data communication in constrained micro-grids | |
Jammula et al. | RETRACTED: Artificial intelligence framework‐based ultra‐lightweight communication protocol for prediction of attacks in Internet of Things environment | |
Yan et al. | Secure pervasive social networking based on multi-dimensional trust levels | |
Saraswathi et al. | Dynamic and probabilistic key management for distributed wireless sensor networks | |
Yadav et al. | Smart communication and security by key distribution in multicast environment | |
Rani et al. | Survey on key pre distribution for security in wireless sensor networks | |
Li et al. | A new scheme for key management in ad hoc networks | |
Mansour et al. | Secure key renewal and revocation for Wireless Sensor Networks | |
Gautam et al. | A comparative study of recently proposed key management schemes in wireless sensor network | |
Walid et al. | Trust security mechanism for maritime wireless sensor networks | |
KR101507572B1 (en) | ID-Based Key Authentication Method for Security of Sensor Data Communications | |
Kavitha et al. | Hybrid cryptographic technique for heterogeneous wireless sensor networks | |
Chaudhari et al. | Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model | |
Li et al. | Identity-based and threshold key management in mobile ad hoc networks | |
Saab et al. | A decentralized energy-aware key management scheme for wireless sensor networks | |
Pushpa Lakshmi et al. | Parallel key management scheme for mobile ad hoc network based on traffic mining | |
Cheng et al. | Practical KGC‐Free Polynomial‐Based Multiple Group Keys Agreement for IoT Health Care Systems |