Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
95
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 205 publications
(95 citation statements)
references
References 118 publications
0
95
0
Order By: Relevance
“…Since smart meter is resource-constrained, it cannot perform heavy cryptographic schemes, such as Diffie-Hellman key exchange and asymmetric encryption [19], [20]. To solve this problem, a user device is introduced to participate in the initialization phase of a smart meter, which can only interact once with smart meter to complete the key exchange.…”
Section: Introductionmentioning
confidence: 99%
“…Since smart meter is resource-constrained, it cannot perform heavy cryptographic schemes, such as Diffie-Hellman key exchange and asymmetric encryption [19], [20]. To solve this problem, a user device is introduced to participate in the initialization phase of a smart meter, which can only interact once with smart meter to complete the key exchange.…”
Section: Introductionmentioning
confidence: 99%
“…During information collection and exchange in the smart grid, an attacker may steal or create fake power information to jeopardize the power system or obtain monetary rewards [14], [15]. To secure the grid, an encryption or data obfuscation scheme is often used to protect data transmissions [16]- [18].…”
Section: Introductionmentioning
confidence: 99%
“…An economic models review with respect to EV charging systems is presented in Shuai et al where great focus has been given on security issues. Tan et al show a review of security issues on smart grids with emphasis on the weaknesses of smart grid data. Komninos et al present a survey of security of smart grids and the smart homes, whereas in Asghar et al, a review of smart meter data usage and privacy techniques is shown.…”
Section: Introductionmentioning
confidence: 99%