2022
DOI: 10.1109/access.2022.3195240
|View full text |Cite
|
Sign up to set email alerts
|

A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure

Abstract: The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity. The AMI subsystem has smart meters as one of the components and they play a vital role in enabling communication between the utility provider and consumers. Smart meters can report real-time electricity consumption readings of the consumer to the utility. Securing this communication link from attacks remain very important for the secure transmission of re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…A lightweight concealed-based security scheme (CBSS) as a secure network for communication/transmission in AMI was proposed [67]. This was achieved via the network simulator 2 environment together with direct encryption and decryption of any 2 arbitrary prime numbers.…”
Section: Past Work Done On Ami Network Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…A lightweight concealed-based security scheme (CBSS) as a secure network for communication/transmission in AMI was proposed [67]. This was achieved via the network simulator 2 environment together with direct encryption and decryption of any 2 arbitrary prime numbers.…”
Section: Past Work Done On Ami Network Securitymentioning
confidence: 99%
“…-Implementing network traffic monitoring and filtering tools -Deploying firewalls and intrusion prevention and detection systems (IPS and IDS) -Maintaining redundant infrastructure to mitigate the impact of DoS attacks [83] These target the availability of the AMI system, such as flooding the network with excessive traffic or overwhelming system resources Inadequate encryption of data transmitted between smart meters and the central AMI system [67].…”
Section: Ami Software and Communication Protocol Vulnerabilities [80]...mentioning
confidence: 99%
“…Because cyber-Physical systems are becoming more and more pervasive in our everyday lives, concerns regarding their privacy and security have become increasingly important for real-time scenarios via Privacy-aware Reconfigurable Secure-Firmware Updating Framework (PRSUF) [1,2,3]. These systems, which combine the real and virtual worlds, have been implemented in a variety of fields, including healthcare, transportation, and energy production levels [4,5,6]. Because of the critical nature of these systems, cybercriminals are likely to target them under different attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Among all levels of power grids, the line loss of LVN is the most severe, which is one of the important reasons for the overall high line loss rate in the power grid. The potential for reducing losses in LVN is enormous, and it is an important part of online loss management and reduction work for power grid enterprises [6] .…”
Section: Introductionmentioning
confidence: 99%