2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 2015
DOI: 10.1109/wimob.2015.7348037
|View full text |Cite
|
Sign up to set email alerts
|

Secure and privacy-preserving AMI-utility communications via LTE-A networks

Abstract: The industry has recognized the risk of cyber-attacks targeting to the advanced metering infrastructure (AMI). A potential adversary can modify or inject malicious data, and can perform security attacks over an insecure network. Also, the network operators at intermediate devices can reveal private information, such as the identity of the individual home and metering data units, to the third-party. Existing schemes generate large overheads and also do not ensure the secure delivery of correct and accurate mete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…The question we ask here is: Does detecting the replay attack is sufficient to detect the MITM attack? The privacy-preserving authentication scheme proposed recently by Haddad et al [66] can answer this question where he can prove that the idea of checking the timestamp to detecting the MITM attack is not sufficient, but it is necessary to use the private keys that are not known to the attackers. Yao et al [67] proposed a groupbased secure authentication scheme, named, GBS-AKA, which he can detect the MITM attack using the session keys and timestamp during the authentication procedure.…”
Section: A Threat Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…The question we ask here is: Does detecting the replay attack is sufficient to detect the MITM attack? The privacy-preserving authentication scheme proposed recently by Haddad et al [66] can answer this question where he can prove that the idea of checking the timestamp to detecting the MITM attack is not sufficient, but it is necessary to use the private keys that are not known to the attackers. Yao et al [67] proposed a groupbased secure authentication scheme, named, GBS-AKA, which he can detect the MITM attack using the session keys and timestamp during the authentication procedure.…”
Section: A Threat Modelsmentioning
confidence: 99%
“…Classification of RFID authentication protocols with RFID privacy According to Madueno et al [189], the LTE network is a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. To ensure the security of this equipment, Haddad et al [66] proposed a privacy-preserving scheme to secure the communications of an automatic metering infrastructure via LTE-A networks. To share keys, the scheme [66] uses a key agreement protocol between the smart meters, the utility company, and the LTE network.…”
Section: Protocol With Substring Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on studying the security requirements as well as the scale of the smart grid, the authors strongly believe that the PKC is the most effective key management solution for securing the SG. Existing works on AMI network security such as [3], [33] use PKC to secure the network. Different aspects of certificate revocation problem in SG applications were discussed in [34], [35], [36] without providing a solution to AMI networks.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of smart grid, several schemes have been proposed to preserve the privacy of the power consumption and injection data [17], [18], [19]. Several schemes have been proposed to preserve the privacy of the nodes involved in a communication session in ad hoc networks [20], [21], [22].…”
Section: Related Workmentioning
confidence: 99%