Cryptographic Protocols in Advanced Metering Infrastructures in Smart ...
link.springer.com › chapter
Nov 5, 2022 · This paper analyzes the security threats in advanced metering infrastructures and presents some cryptographic protocols that guarantee system security.
People also ask
What communication infrastructure and protocols are used in smart metering?
What is the advanced metering infrastructure protocol?
What is smart metering in smart grid?
What is AMI in smart grid?
Jun 22, 2024 · Cryptographic protocols such as encryption, authentication and digital signatures are essential components of a secure smart grid infrastructure ...
This paper analyzes the security threats in advanced metering infrastructures and presents some cryptographic protocols that guarantee system security.
Metering systems in smart grids are intelligent electronic devices that measure consumers' energy usage, and send and receive data via two-way communication.
Abstract—In this paper, we propose a security protocol for advanced metering infrastructure (AMI) in smart grid. AMI is one of the important components in ...
Missing: Cryptographic | Show results with:Cryptographic
A security protocol for advanced metering infrastructure in smart grid
ieeexplore.ieee.org › document
Our proposed security protocol for AMI includes initial authentication, secure uplink data aggregation/recovery, and secure downlink data transmission.
Missing: Cryptographic | Show results with:Cryptographic
We proposed a novel Secure and Reliable AMI (SRAMI) protocol in this paper using a lightweight cryptographic technique and trust-based mechanism for ...
Cryptographic protocols such as encryption, authentication and digital signatures are essential components of a secure smart grid infrastructure. These ...
Security protocols for communication between smart meters and the utility are defined by the ANSI C12 standards. According to the ANSI C12.22 standard, smart ...
In this paper, we present a security protocol for Advanced Metering Infrastructure (AMI) in smart grid. We consider various security vulnerabilities of ...
Missing: Cryptographic | Show results with:Cryptographic