2011 IEEE Consumer Communications and Networking Conference (CCNC) 2011
DOI: 10.1109/ccnc.2011.5766362
|View full text |Cite
|
Sign up to set email alerts
|

Secure communications in the smart grid

Abstract: Abstract-This paper focuses on deployment of smart meters in the power distribution systems to enhance the operation infrastructure. An important challenge in establishing a communication paradigm between the utilities and the customers is that customers are susceptible to privacy concerns. In this paper, we present a model to ensure the privacy and integrity of communicating parties within the smart grid by using smart meters as a gateway between intra-and inter-network communications. In particular, we utili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 9 publications
(12 reference statements)
0
15
0
1
Order By: Relevance
“…Recently, there have been proposals to integrate trusted computing into the power grid [27,47,48]. These studies, except our work in [27], however, do not consider a security service that will hide information from the rest of the system including the system administrator as in the blind processing.…”
Section: Prototypementioning
confidence: 99%
See 2 more Smart Citations
“…Recently, there have been proposals to integrate trusted computing into the power grid [27,47,48]. These studies, except our work in [27], however, do not consider a security service that will hide information from the rest of the system including the system administrator as in the blind processing.…”
Section: Prototypementioning
confidence: 99%
“…Several techniques such as secure boot [24], authenticated boot [25], and independent auditing [26] have been developed to provide a trustworthy root in a system. Trusted computing incorporates these techniques and has a potential to provide mechanisms for the blind processing service [6,27]. Trusted functionality of a system is furnished by a trusted platform module (TPM), a tamper-resistant cryptoprocessor, where the TPM serves as the root of trust that an operating system and higher level applications can build upon.…”
Section: Prototypementioning
confidence: 99%
See 1 more Smart Citation
“…In the work of [6], the Smart Meter is the core element of all functionality. Due to the mobile Internet connection, which is used to communicate with the power provider, a network infrastructure besides the Home Area Network (HAN) is not required.…”
Section: A Mobile Wan Connection Conceptmentioning
confidence: 99%
“…In the security of the Smart Grid, a key issue that must be addressed is the balance between the benefits of enhanced communications in the smart grid and the privacy of homeowners [7].…”
Section: Firewall's Operating System Securitymentioning
confidence: 99%