Smart meters have ensured effective end-user energy consumption data management and helping the power companies towards network operation efficiency. However, recent studies highlighted that cyber adversaries may launch attacks on smart meters that can cause data availability, integrity, and confidentiality issues both at the consumer side or at a network operator’s end. Therefore, research on smart meter data security has been attributed as one of the top priorities to ensure the safety and reliability of the critical energy system infrastructure. Authentication is one of the basic building blocks of any secure system. Numerous authentication schemes have been proposed for the smart grid, but most of these methods are applicable for two pa...
Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power...
The smart grid, as the next generation of the power grid, is characterized by employing many differe...
Abstract—1 This paper studies the security requirements for remote authentication and communication ...
Security in modern smart metering communications and in smart grid networks has been an area of inte...
Security in modern smart metering communications and in smart grid networks has been an area of inte...
The smart meters in electricity grids enable fine-grained consumption monitoring. Thus, suppliers co...
In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, an...
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart...
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart...
In the energy sector, IoT manifests in the form of next-generation power grids that provide enhanced...
We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in ...
Information and Communication Technologies (ICT) are one of the underpinning platforms of smart grid...
Smart metering technology plays a key role in Advanced Metering Infrastructure (AMI) in Smart Grid (...
With the gradual maturity of the smart grid (SG), security challenges have become one of the importa...
Abstract—Smart Grid (SG) consists of many sub-systems and networks, all working together as a system...
Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power...
The smart grid, as the next generation of the power grid, is characterized by employing many differe...
Abstract—1 This paper studies the security requirements for remote authentication and communication ...
Security in modern smart metering communications and in smart grid networks has been an area of inte...
Security in modern smart metering communications and in smart grid networks has been an area of inte...
The smart meters in electricity grids enable fine-grained consumption monitoring. Thus, suppliers co...
In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, an...
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart...
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart...
In the energy sector, IoT manifests in the form of next-generation power grids that provide enhanced...
We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in ...
Information and Communication Technologies (ICT) are one of the underpinning platforms of smart grid...
Smart metering technology plays a key role in Advanced Metering Infrastructure (AMI) in Smart Grid (...
With the gradual maturity of the smart grid (SG), security challenges have become one of the importa...
Abstract—Smart Grid (SG) consists of many sub-systems and networks, all working together as a system...
Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power...
The smart grid, as the next generation of the power grid, is characterized by employing many differe...
Abstract—1 This paper studies the security requirements for remote authentication and communication ...