Access control module flow chart.

Access control module flow chart.

Source publication
Article
Full-text available
Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being...

Similar publications

Article
Full-text available
As one of the effective access control mechanism, CAPTCHA can provide privacy protection and multimedia security for big data. In this paper, an attack on hollow CAPTCHA using accurate filling and nonredundant merging is proposed. Firstly, a thinning operation is introduced to repair character contour precisely. Secondly, an inner-outer contour fil...

Citations

... This communication can be authenticated through different secret keys exchanged between two parties. However, adversaries can masquerade themselves as legitimate users or service providers to access the network and interrupt the service [63]. Authentication techniques and security key schemes have been widely investigated in the literature. ...
Article
Full-text available
Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of energy and information between customers and suppliers. The integration of power networks with information and communication technologies enables pervasive control, automation and connectivity from the energy generation power plants to the consumption level. However, the development of wireless communications, the increased level of autonomy, and the growing sofwarisation and virtualisation trends have expanded the attack susceptibility and threat surface of SGs. Besides, with the real-time information flow, and online energy consumption controlling systems, customers' privacy and preserving their confidential data in SG is critical to be addressed. In order to prevent potential attacks and vulnerabilities in evolving power networks, the need for additional studying security and privacy mechanisms is reinforced. In addition, recently, there has been an ever-increasing use of machine intelligence and Machine Learning (ML) algorithms in different components of SG. ML models are currently the mainstream for attack detection and threat analysis. However, despite these algorithms' high accuracy and reliability, ML systems are also vulnerable to a group of malicious activities called adversarial ML (AML) attacks. Throughout this paper, we survey and discuss new findings and developments in existing security issues and privacy breaches associated with the SG and the introduction of novel threats embedded within power systems due to the development of ML-based applications. Our survey builds multiple taxonomies and tables to express the relationships of various variables in the field. Our final section identifies the implications of emerging technologies, future communication systems, and advanced industries on the security and privacy issues of SG.
... Although this scheme is secure against physical attacks, it only provides oneway authentication and the authentication of the AMI server that is crucial for control commands has been ignored. [7] x x x x [9] x x [12] x x x [13] [14] x x [15] x [18] x x [21] x [24] x [25] x x [28] x x x [31] x x x x [32] x [33] x x A1. Impersonation attack, A2. ...
... Cho et al. [32] proposed a secure authentication method for the protection of user's privacy in AMI Home Area Network. The proposed scheme is secure against several attacks, namely, MITM attack, replay attack, impersonation attack, and others by performing the authentication process for user who accesses personal information created and transmitted from home network and AMI. ...
Conference Paper
Full-text available
Advanced Metering Infrastructure (AMI) has been regarded as a foundational part of the Smart Grid (SG). Consequently , AMI security is of critical importance. In this paper, we describe and investigate the current proposed authentication schemes and techniques for AMI. We discuss the challenges and desired objectives of authentication. We also provide a review of the recent proposed schemes for AMI along with their advantages and drawbacks towards meeting the discussed challenges and objectives. Based on the current survey, we identify open issues and suggest possible future research directions.
... Platform technologies that enable a wide range of innovative scientific works through multidisciplinary studies, such as biotechnology [22], cloud computing [12,13], privacy protection [6,23] and security [8,26], and big data processing technology [5], have been developed during the last decade. Among these, the mobile computing platform technology has grown remarkably, as seen from the fact that smart phones have quickly become ubiquitous. ...
Article
Full-text available
In the last few decades, mobile computing platform technology has grown rapidly, as observed from smart phones that have quickly become ubiquitous. The mobile computing platform is the most widely used platform in our life today, and digital photographs captured through these devices have become routine for most people. In this study, we propose a novel artistic method for displaying photographs in mobile devices as a photo collage. Using our system, users can view a representative photograph as a collage of photographs associated with a certain event and access each of photographs individually. To implement this, we employ centroidal Voronoi diagram to obtain an even distribution of tiles, and use the sites as the location of tiles. We use the edge avoidance technique to prevent tiles from being located across the edges. To obtain the direction of tiles that follow near a strong edge, we employ the Edge tangent Flow field and use the field as the directions of tiles. Finally, we search for photographs that best match the tiles calculated above by using a thumbnail difference metric.
... Two-way information exchange infrastructure between power suppliers and consumers called AMI (advanced metering infrastructure) can be considered as the core of smart grid [2][3][4]. Do-Eun Cho proposed an authentication method [5] for privacy protection in smart grid environment whose main contribution is that the access authentication method blocks the unauthorized external access and enables secure remote access to home network and its device with a secure message authentication protocol. In a recent work [6], a set of privacy-preserving protocols is proposed for a user to combine smart meter readings with a certified tariff policy to generate an electricity bill, which is then transmitted to the service provider together with a zero-knowledge proof to ensure its correctness and to avoid information leakage. ...
Conference Paper
Full-text available
The privacy protection in the smart grid is particularly significant, since sometimes the leak of the user power usage habits may lead to serious consequences. In 2015, Siu-Ming Yiu and Jin Zhong have proposed a privacy-preserving scheme which can protect each user's future power usage plan. However, some insecure factors exist in this scheme. In this paper, we show two major problems about the scheme. Firstly, it cannot resist the denial attack in which a user can deny having sent certain power plan. Secondly, the gateway smart meter doesn't detect the action that some users may send several different or even contradictory power usage plans to the upper gateway simultaneously, which will lead to the result that the user can always avoid punishment when he use more electricity than usual or obtain discount when he use less electricity than usual. We also put forward our suggestions to avoid the problems at the end of the article.
... With insufficiencies of the legacy power grid communications protocols, increased data generation and communications bring about new challenges in access and collecting the data. Some recent researches presented access control methods for Electric Power Synchrophasor Networks, which could provide both security and efficiency [28], [32], [36], [37]. In [33], researchers presented a data collector protocol, which can verify the integrity while they are not given access to the content. ...
Conference Paper
Smart grid technologies such as synchrophasors using Phasor Measurement Units (PMUs), make real-time monitoring, control and data analysis of the electric power grid possible. The PMU network measures voltage and current phasors across the electrical power grid, and sends `reports' to control centers. Synchrophasor technology enables reliable and efficient power system operation; but may make the system vulnerable to cyber-attacks. In this paper, security vulnerabilities found in literature, that are relevant to PMUs, are discussed and mapped to four general attack classes. Known network security vulnerabilities are addressed in hopes of exposing gaps where further research needs to be conducted on PMU networks.