2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2016
DOI: 10.1109/waina.2016.32
|View full text |Cite
|
Sign up to set email alerts
|

Key Management for Secure Demand Data Communication in Constrained Micro-Grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Kayem et al [12] proposed a key management scheme to promote the security of consumption reporting data during interaction in a microgrid. However, in 2018, Iqbal et al [13] found out the scheme cannot against eavesdropping attacks, which reduces its authenticity and security.…”
Section: Related Workmentioning
confidence: 99%
“…Kayem et al [12] proposed a key management scheme to promote the security of consumption reporting data during interaction in a microgrid. However, in 2018, Iqbal et al [13] found out the scheme cannot against eavesdropping attacks, which reduces its authenticity and security.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the performance improvements, the architecture relies on specialised hardware and fails to provide end-to-end security. Kayem et al [21] also proposed an approach based segmentation to provide security while maintaining performance. The design used lightweight security mechanisms in a subset of devices with constrained resources.…”
Section: Related Workmentioning
confidence: 99%
“…The solution in [19] utilizes a key management server to store microgrid keys creating a single point of failure (C4). In [20] another approach to key management is presented, where the scheme operates as a hierarchical network, with a pair-wide key predistribution on the microgrid's devices.…”
Section: Related Workmentioning
confidence: 99%