2015
DOI: 10.1007/978-3-319-19662-6_21
|View full text |Cite
|
Sign up to set email alerts
|

Self-organised Key Management for the Smart Grid

Abstract: Abstract. As Smart Grid deployments emerge around the world, their protection against cyberattacks becomes more crucial. Before protective measures are put into place, one of the main factors to be considered is key management. Smart Grid poses special requirements compared to traditional networks; however, the review of previous work reveals that existing schemes are not complete. Here we propose a scalable and distributed key management scheme for the Smart Grid based on the Web-of-Trust concept. Our proposa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 27 publications
(28 reference statements)
0
6
0
Order By: Relevance
“…The authentication component provides a token for achieving authentication based on a distributed and scalable authentication and key management scheme called SOMA. The token provided by SOMA [ 27 ] must be validated by the authentication component, therefore, the authentication component proceeds to send a request to the AuthZ server containing the value of the Environment Category corresponding to the value of the SOMA certificate validity (whether it is true or false).…”
Section: Authorization Component Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…The authentication component provides a token for achieving authentication based on a distributed and scalable authentication and key management scheme called SOMA. The token provided by SOMA [ 27 ] must be validated by the authentication component, therefore, the authentication component proceeds to send a request to the AuthZ server containing the value of the Environment Category corresponding to the value of the SOMA certificate validity (whether it is true or false).…”
Section: Authorization Component Methodologymentioning
confidence: 99%
“…Based on [7,27], we have defined the requirements for the SealedGRID trusted component. The axes, as we have selected them, are the following:…”
Section: Trusted Computing Componentmentioning
confidence: 99%
“…In this section we briefly present the applied technologies in the proposed Sealed-GRID architecture which are the following: a) Federated Login [13]; b) SOMA [14]; c) MASKER [15]; d) TEE [16] and e) Context Awareness Manager [17].…”
Section: Sealedgrid Technologiesmentioning
confidence: 99%
“…SOMA [14] is a certificate-based authentication infrastructure that creates a secure authentication system for mesh networks without a TTP. It creates an efficient, self-organized and scalable authentication infrastructure based on a PGP-like architecture.…”
Section: Sealedgrid Technologiesmentioning
confidence: 99%
“…In this paper, we present a distributed and scalable key management and authentication scheme for microgrids, namely the Micro sElf-orgaNiSed mAnagement (MENSA). We build on the basic concepts of the scheme presented in [5] and provide a detailed description of all key management operations presenting a complete solution tailored to microgrids. We have implemented and experimentally evaluated MENSA in microgrid environments.…”
Section: Introductionmentioning
confidence: 99%