Key management systems for smart grid advanced metering infrastructure: A survey

A Ghosal, M Conti - IEEE Communications Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Smart grids are evolving as the next generation power systems that transform the traditional
ways of functioning of present electrical grids. Advanced metering infrastructure (AMI) is one …

Optimizing bloom filter: Challenges, solutions, and comparisons

L Luo, D Guo, RTB Ma… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Bloom filter (BF) has been widely used to support membership query, ie, to judge whether a
given element x is a member of a given set S or not. Recent years have seen a flourish …

Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure

J Wang, L Wu, KKR Choo, D He - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Achieving low latency and providing real-time services are two of several key challenges in
conventional cloud-based smart grid systems, and hence, there has been an increasing …

MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning

D Li, D Han, Z Zheng, TH Weng, H Li, H Liu… - Computer Standards & …, 2022 - Elsevier
Abstract Massive Open Online Courses (MOOCs) have become a paramount online
learning approach for flexible learning methods and extensive learning courses. Different …

An anonymous ECC-based self-certified key distribution scheme for the smart grid

D Abbasinezhad-Mood… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In the smart grid, the various stakeholders can communicate securely and efficiently only if
they employ a proper key distribution scheme. In recent years, a number of key distribution …

LAKAF: Lightweight authentication and key agreement framework for smart grid network

AA Khan, V Kumar, M Ahmad, S Rana - Journal of Systems Architecture, 2021 - Elsevier
Combination of sustainable resources and expanded developments in vitality utilization
have made new challenges for the traditional grid system. To confront these challenges, the …

[HTML][HTML] Lightweight certificate revocation for low-power IoT with end-to-end security

J Höglund, M Furuhed, S Raza - Journal of Information Security and …, 2023 - Elsevier
Public key infrastructure (PKI) provides the basis of authentication and access control in
most networked systems. In the Internet of Things (IoT), however, security has predominantly …

Let's revoke: Scalable global certificate revocation

T Smith, L Dickinson, K Seamons - Network and Distributed Systems …, 2020 - par.nsf.gov
Current revocation strategies have numerous issues that prevent their widespread adoption
and use, including scalability, privacy, and new infrastructure requirements. Consequently …

Lightweight privacy-preserving power injection and communication over vehicular networks and 5G smart grid slice with provable security

IA Kamil, SO Ogundoyin - Internet of Things, 2019 - Elsevier
In vehicle-to-grid (V2G) network, electric vehicles (EVs) can store greenpower from
renewable energy sources and inject excess power to the grid during the peak hours for …

PBCert: privacy-preserving blockchain-based certificate status validation toward mass storage management

S Yao, J Chen, K He, R Du, T Zhu, X Chen - IEEE Access, 2018 - ieeexplore.ieee.org
In the recent years, the vulnerabilities of conventional public key infrastructure are exposed
by the real-world attacks, such as the certificate authority's single-point-of-failure or clients' …