2014
DOI: 10.1109/comst.2014.2320093
|View full text |Cite
|
Sign up to set email alerts
|

Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures

Abstract: This is the unspecified version of the paper.This version of the publication may differ from the final published version. Permanent repository link:http://openaccess.city.ac.uk/3734/ Link to published version: http://dx.doi.org/10.1109/ COMST.2014.2320093 Copyright and reuse: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
227
0
5

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 496 publications
(253 citation statements)
references
References 34 publications
0
227
0
5
Order By: Relevance
“…N. Komninos et al classified the main risks of interaction between entities in a smart home and smart grid environments and proposed promising security countermeasures given the specific security goals [37]. Kim et al proposed a smart system using both face recognition and sound localization techniques to identify foreign faces through a door phone [38].…”
Section: Surveillance and Securitymentioning
confidence: 99%
“…N. Komninos et al classified the main risks of interaction between entities in a smart home and smart grid environments and proposed promising security countermeasures given the specific security goals [37]. Kim et al proposed a smart system using both face recognition and sound localization techniques to identify foreign faces through a door phone [38].…”
Section: Surveillance and Securitymentioning
confidence: 99%
“…Nowadays, technologies such as sensor networks, smart systems, cyberphysical systems (CPS), and Internet of Things (IoT) depend on small building blocks like sensors, actuators, measuring instruments, and smart devices. These building blocks also become system entities and can require specific authentication mechanisms, as evidenced in applications related to manufacturing [5], transportation [6][7][8], energy management [9,10], smart cities and smart homes [11], and electronic healthcare [12], among others. On the other hand, the same ubiquitous components also introduce a new asset: the physical context information amount, resulting from the integration of physical processes and information technologies [3,13].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the integrity of smart home service is required. To ensure the integrity of smart devices, it is essential to use a hash function and a digital signature for critical data or module codes [16][17][18].…”
Section: Integritymentioning
confidence: 99%