2016
DOI: 10.1109/tsg.2015.2404534
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Scalable Data Collection With Time Minimization in the Smart Grid

Abstract: Deployment of data generation devices such as sensors and smart meters have been accelerating toward the vision of smart grid. The volume of data to be collected increases tremendously. Secure, efficient, and scalable data collection becomes a challenging task. In this paper, we present a secure and scalable data communications protocol for smart grid data collection. Under a hierarchical architecture, relay nodes [also known as data collectors (DCs)] collect and convey the data securely from measurement devic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
68
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 72 publications
(68 citation statements)
references
References 44 publications
0
68
0
Order By: Relevance
“…Since the other schemes , did not mention the storage space, here, we only compare our scheme with Liu et al's scheme, our previous scheme, and Li et al's scheme …”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Since the other schemes , did not mention the storage space, here, we only compare our scheme with Liu et al's scheme, our previous scheme, and Li et al's scheme …”
Section: Performance Analysismentioning
confidence: 99%
“…For Uludag et al's scheme, the transmitted messages include the italicIDj,SKEKitalicMDjitalicDCiTPRODATAHASHitalicDKitalicPRODATA and italicIDDCi,SKEGKiSIGNitalicPOitalicCOMDCOMD. Hence, the total communication cost of Reference is (128 × 96) + (128 × 96) + (128 × 96) + (256 × 96) + (128 × 4) + (1024 × 4) + (128 × 4) bits = 8.125 KB.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…A new metric to measure the security of information transmission is introduced to adapt the dynamic of CPS in [89], and fundamental limit to guarantee the security is also analyzed. For large scale CPS communications, to meet the scalability, extensibility, and thinness requirements, [90] designed a resilient end-to-end message protection framework by exploiting the notion of the long-term key that is given on per node basis. The scheme in [91] can improve secure communications without compromising scalability and endto-end security.…”
Section: B Security In Communicationsmentioning
confidence: 99%
“…The scheme in [91] can improve secure communications without compromising scalability and endto-end security. For secure communication applications, [90] presented a secure and scalable data communications protocol for smart grid data collection under a hierarchical architecture, where relay nodes collect and convey the data securely from measurement devices to the power operator.…”
Section: B Security In Communicationsmentioning
confidence: 99%