Review of key management techniques for advanced metering infrastructure

O Kebotogetse, R Samikannu… - International Journal of …, 2021 - journals.sagepub.com
The electricity industry has been developed through the introduction of the smart grid. This
has brought about two-way communication to the grid and its components. The smart grid …

A concealed based approach for secure transmission in advanced metering infrastructure

O Kebotogetse, R Samikannu, A Yahya - IEEE Access, 2022 - ieeexplore.ieee.org
The smart grid has an important subsystem known as the Advanced Metering Infrastructure
(AMI), responsible for measuring customer consumption of electricity. The AMI subsystem …

Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)

Z Drias, A Serhrouchni, O Vogel - 2017 1st cyber security in …, 2017 - ieeexplore.ieee.org
Often considered as the brain of an industrial process, Industrial control systems are
presented as the vital part of today's critical infrastructure due to their crucial role in process …

Enhancement of end-to-end security in advanced metering infrastructure

J Kalidass, T Purusothaman, P Suresh - Journal of Ambient Intelligence …, 2021 - Springer
Abstract Advanced Metering Infrastructure (AMI) is enabling technology for smart grid and it
act as a bridge between cyber and physical systems of the smart grid. The major parts of AMI …

Replay attack impact on advanced metering infrastructure (AMI)

B Alohali, K Kifayat, Q Shi, W Hurst - … 2016, Liverpool, UK, May 19-20 …, 2017 - Springer
Abstract Advanced Metering Infrastructure (AMI) has currently become the most popular
element in smart grid implementations both in home area network (HAN) and Neighborhood …

A survey of cryptography-based authentication for smart grid communication

N Chowdhury - … , CyberICPS, SECPRE, and ADIoT, Guildford, UK …, 2020 - Springer
The adoption of new means of communication in the form of internet-based communication,
power line communication, wireless communication and other communication protocols …

[PDF][PDF] IoT modes of operations with different security key management techniques: A survey

S Mohamed, AM Hassan, HK Aslan - Journal homepage: http …, 2021 - researchgate.net
Accepted: 2 December 2021 The internet of things (IoT) has provided a promising
opportunity to build powerful systems and applications. Security is the main concern in IoT …

Cyber-Security of Protection System in Power Grids—Part 1: Vulnerabilities and Counter-Measures

S Riahinia, A Ameli, M Ghafouri, A Yassine - … : Methods, Concepts, and …, 2023 - Springer
The recent trend to expand the use of Information Technology (IT) in power networks has
made the electric grid potentially vulnerable to cyber-attacks. Protection systems are among …

Evaluating the effect of noise on Secure Quantum Networks

K Anbalagan - 2024 - digitalcommons.kennesaw.edu
This thesis focuses on examining the resilience of secure quantum networks to
environmental noise. Specifically, we evaluate the effectiveness of two well-known quantum …

[PDF][PDF] Secure Key Management in Embedded Systems: A First Proposal.

G Jank, S Schmidt, M Koschuch - IoTBDS, 2021 - scitepress.org
The Internet-of-Things (IoT) domain is highly heterogeneous and comprises a multitude of
different devices. Because of this variety, many projects require unique compositions of …