open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand–response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where t...
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which de...
It is now known that more information can be leaked into the smart grid environment than into the ex...
In the smart grid, an integrated distributed authen- tication protocol is needed to not only secure...
Smart Grid (SG) provides enhancement to existing grids with two-way communication between the utilit...
In a smart grid, the power service provider enables the expected power generation amount to be measu...
The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effecti...
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high...
The smart grid, as the next generation of the power grid, is characterized by employing many differe...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
In a smart grid, the power service provider enables the expected power generation amount to be measu...
Smart meters have ensured effective end-user energy consumption data management and helping the powe...
The smart grid, as the next generation of the power grid, is characterized by employing many differe...
Information and Communication Technologies (ICT) are one of the underpinning platforms of smart grid...
Abstract: The Smart Grid is formed by many sub-networks such as the Home Area Network (HAN), t which...
A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end ...
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which de...
It is now known that more information can be leaked into the smart grid environment than into the ex...
In the smart grid, an integrated distributed authen- tication protocol is needed to not only secure...
Smart Grid (SG) provides enhancement to existing grids with two-way communication between the utilit...
In a smart grid, the power service provider enables the expected power generation amount to be measu...
The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effecti...
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high...
The smart grid, as the next generation of the power grid, is characterized by employing many differe...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
In a smart grid, the power service provider enables the expected power generation amount to be measu...
Smart meters have ensured effective end-user energy consumption data management and helping the powe...
The smart grid, as the next generation of the power grid, is characterized by employing many differe...
Information and Communication Technologies (ICT) are one of the underpinning platforms of smart grid...
Abstract: The Smart Grid is formed by many sub-networks such as the Home Area Network (HAN), t which...
A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end ...
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which de...
It is now known that more information can be leaked into the smart grid environment than into the ex...
In the smart grid, an integrated distributed authen- tication protocol is needed to not only secure...