Figure - available from: International Journal of Communication Systems
This content is subject to copyright. Terms and conditions apply.
Head end system registration process

Head end system registration process

Source publication
Article
Full-text available
Electricity generation, transmission, distribution, and consumption are efficiently monitored and controlled by the next‐generation power grid called a smart grid systems (SGs) with the help of information and communication technology (ICT). Due to this ICT intervention, the SGs are facing a lot of security threats. The main security threats are ta...

Similar publications

Article
Full-text available
The measuring of the distributed energy system and billing are complicate and have many problems such as easily prone to tampering, inaccurate, and requires a large number of human operators. This paper proposed the design and implementation of modern and highly accurate single-phase smart energy meter using radio frequency identification (RFID) te...
Article
Full-text available
Modern smart grids already consist of various components that interleave classical Operational Technology (OT) with Information and Communication Technology (ICT), which, in turn, have opened the power grid to advanced approaches using distributed software systems and even Artificial Intelligence (AI) applications. This IT/OT integration increases...
Article
Full-text available
Smart Grid is the latest research area in the field of power systems. Smart grid technology involves smart meters, smart substation and distribution equipment. and smart generation. This uses the latest communication technologies based on IEC61850 standard. It is linked with modern world information technology and incorporates digitization. Moreove...
Conference Paper
Full-text available
With increasing use of Information and Communication Technologies (ICT) in smart grids, the need to study the faults induced by software and communication systems is important towards realizing stable operation of microgrids. Since the effect of faults in the electrical, communication and software system are different, the impact of these faults on...
Article
Full-text available
In the Internet of Things (IoT), many devices can communicate with each other directly through the Internet, and there are already good applications in transportation systems, smart meters, and smart home appliances. Wireless sensor networks are used in these Internet of things applications. Playing a vital role, the upload of data requires multipl...

Citations

... For more information, see https://creativecommons.org/licenses/by/4.0/ random nonce/number, and PUF challenge-response pair are considered as 160 , 160 , 128 , and 128, respectively[34]. During the mutual authentication, the proposed work communicates the three messages as { , * , }, { , * , }, {ℎ * , * , } ...
Article
Full-text available
Vehicular Ad-hoc Networks (VANETs) have a lot of potential for improving traffic management and driver safety. However, employing a wireless channel for vehicle communication has security and privacy concerns such as authentication, confidentiality, integrity, access control, and availability. Hence, it is essential to address the security and privacy aspects of the vehicles utilized in these contexts. In this research, a blockchain-based physically secure, and privacy-aware anonymous authentication technique leveraging the fog computing architecture to support the movement, reduced latency, and location monitoring is suggested to solve security and privacy concerns. The decentralized nature of blockchain technology is used to ensure the data security of vehicles. The vehicle is not required to store the secret keys to do anonymous authentication and provides physical security for the vehicle. The suggested scheme provides essential security features with less storage, computational, and communication costs than related competitive schemes.
... A CL-NCRS can meet the unconditional anonymity [18][19][20]: no attacker can obtain the private key of all possible signers in illegal ways. ...
Article
Full-text available
Traditional certificateless ring signature is not suitable for the network coding environment. In this view, a new certificateless network coding ring signature (CL-NCRS) is devised by using the techniques of multisource network coding and certificateless ring signature. Network coding is a kind of information interaction technology and can improve system robustness and save wireless network resources. CL-NCRS satisfies the unforgeability and unconditional anonymity; moreover, it has relatively higher communication and computational efficiency.
Article
Full-text available
Wireless body area networks ( WBAN ) are essential components of intelligent healthcare monitoring techniques. Especially, when the number and datatype in WBAN increases. In WBAN , secure multidimensional data aggregation received a lot of attention. However, the related schemes consume more computational and communication overhead to encrypt/decrypt the multidimensional health reports. In this paper, a blockchain-assisted scalable and secure multidimensional data aggregation scheme is introduced for fog-based WBAN . The multidimensional health data are efficiently generated, encrypted, and decrypted by using the Paillier cryptosystem. Further, the batch verification method is used to achieve efficient authentication. The proposed system offers significant security attributes with less computation and communication overhead in comparison with competing systems. Further, it supports statistical analyses such as summation and variance to analyze the received health report.