2010
DOI: 10.1109/msp.2010.49
|View full text |Cite
|
Sign up to set email alerts
|

Smart-grid security issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
224
0
6

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 524 publications
(230 citation statements)
references
References 3 publications
0
224
0
6
Order By: Relevance
“…In certain cases (such as IEC 61850 Protection Class 2/3), multicast messages in the transmission substation network should be delivered within 4 ms as mentioned by Wang et al [34] and Khurana et al [35]. Since several mutual authentications must be performed among various SG entities in a distributed manner, the protocol execution time and the end-to-end delay are critical in the SG system.…”
Section: Obj-1: Low Execution and Protocol Delaymentioning
confidence: 99%
See 1 more Smart Citation
“…In certain cases (such as IEC 61850 Protection Class 2/3), multicast messages in the transmission substation network should be delivered within 4 ms as mentioned by Wang et al [34] and Khurana et al [35]. Since several mutual authentications must be performed among various SG entities in a distributed manner, the protocol execution time and the end-to-end delay are critical in the SG system.…”
Section: Obj-1: Low Execution and Protocol Delaymentioning
confidence: 99%
“…It may lead to some serious privacy issues. Therefore, the security and privacy issues are more challenging in the V2G network [24,35]. In the following subsections, we will examine the existing authentication protocols for the V2G system.…”
Section: Security and Privacy Challenges In The Vehicle-to-grid (V2g)mentioning
confidence: 99%
“…Experimental results show that a staff can manage certificates of approximately 1000 users. For example, if an electrical company has 5.5 million smart meters, it will require 5,500 employees to manage these digital certificates [2]. Therefore, manpower and cost are high, and processing cycle is long.…”
Section: Data Collectormentioning
confidence: 99%
“…It also can ensure safe and reliable power supply. However, power systems are more and more relying on network infrastructures in smart grid and exposing many threats on network security [1]- [2]. Therefore, it is important to develop security mechanisms for smart grid.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, technologies such as sensor networks, smart systems, cyberphysical systems (CPS), and Internet of Things (IoT) depend on small building blocks like sensors, actuators, measuring instruments, and smart devices. These building blocks also become system entities and can require specific authentication mechanisms, as evidenced in applications related to manufacturing [5], transportation [6][7][8], energy management [9,10], smart cities and smart homes [11], and electronic healthcare [12], among others. On the other hand, the same ubiquitous components also introduce a new asset: the physical context information amount, resulting from the integration of physical processes and information technologies [3,13].…”
Section: Introductionmentioning
confidence: 99%