Fig 5 - uploaded by Nian Liu
Content may be subject to copyright.
Process of initialization.

Process of initialization.

Source publication
Conference Paper
Full-text available
Key management for secure communications of Advanced Metering Infrastructure is an unsolved problem until now. The difficulties and their basic solutions for AMI to choose a key management scheme will be summed up after the studies of AMI system structure, business process and cyber security requirements, proposing a key management scheme based on...

Context in source publication

Context 1
... order to briefly introduce the KMS, u 0 is used to denote the MS. The keys of KMF and the additional value for generat- ing session keys are initially generated by u 0 using specific key servers and then distributed to SXs. Fig. 5 shows the process of initialization, followed by detailed ...

Citations

... 6 There have been a large number of key establishment protocols proposed in the literature, and examples include those presented in the previous studies. [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] In smart grid systems, key considerations for the deployment of any cryptographic and solution solution are computation and communication overheads. Existing protocols are generally not suited for smart grid deployment, either due to insecurity 6,7,9 or large overheads in terms of computation and communication. ...
Article
Full-text available
Sprouting populace mass within the urban areas furnishes critical challenges of providing uninterruptible community services to fulfill the primitive needs of inhabitants in smart cities. Smart cities facilitate and uplift the living standards of inhabitants through various smart systems or infrastructures, and smart grid is one of them. Secure transmission is a key requirement in the advanced metering infrastructure (AMI) of most smart grids, and key establishment cryptographic protocols can be used to achieve such a requirement. Designing efficient and secure key establishment protocols for AMI remains challenging. For example, in this paper, we reveal several weaknesses in the identity‐based key establishment protocol of Mohammadali et al (published in IEEE Trans Smart Grid, 2017), which is based on elliptic curves. We then improve their protocol and prove its security in the random oracle model. We also demonstrate that the improved protocol achieves both anonymity and untraceability, before presenting a comparative summary of the security and computational overheads of the proposed protocol and several other existing protocols. Enhanced identify‐based key agreement protocol is introduced to bring security and privacy for authenticating entities in the smart grid infrastructure. Formal and information validation is presented to prove the correctness and strength of the introduced protocol.
... (3) loss of confidentiality [47,17,40,20,16]. ...
Article
Full-text available
Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs) and Intelligence Electronic Devices (IEDs) in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field
Article
Full-text available
This article proposes a peer-to-peer (P2P) energy trading framework for wind power producer (WPP) in the retailing layer to increase its revenue and to promote wind power utilization. In this framework, the WPP can provide energy consumption of demand response providers (DRPs) in a competitive environment through both the main grid and rival load-serving entities. Also, based on a P2P pricing mechanism, the WPP can choose if to trade energy in a P2P platform or not. The proposed problem is formulated as a stochastic bilevel optimization model, in which in the upper level, the WPP profit is maximized and in the lower level, the DRPs participate in DR programs and tend to choose the fairest supplier among the WPP and LSEs to minimize their energy procurement costs. The proposed method is applied to a realistic case study and the results demonstrate that with P2P, the WPP can schedule the energy transaction with peers to offset part of the energy deviations. Moreover, different values of P2P prices lead to different values of energy transactions due to the relatively diversity pattern of local generation of rival LSEs and their offering prices and demand and generation of the WPP.
Article
This paper presents an efficient peer-to-peer energy sharing framework for numerous community prosumers to reduce energy costs and to promote renewable energy utilization. Specifically, for day-ahead and real-time energy management of prosumers, an inter-community energy sharing strategy and an intra-community energy sharing strategy are proposed, respectively. In the former strategy, prosumers can share energy with any community peers, and community aggregators represent their own prosumers to coordinate energy sharing. A two-phase model is designed. In the first phase the optimal energy sharing profiles of prosumers are derived to minimize the global energy costs, and in the second phase, equilibrium-based energy sharing prices are induced considering the individual interests of prosumers. In the latter strategy, prosumers share energy only with its community peers for time-saving to handle real-time uncertainties collaboratively to reduce real-time costs. The framework efficiency is verified by the simulation cases on a typical distribution network.
Chapter
Full-text available
The Smart Grid is a new paradigm that aims at improving the efficiency, reliability and economy of the power grid by integrating ICT infrastructure into the legacy grid networks at the generation, transmission and distribution levels. Automatic Metering Infrastructure (AMI) systems comprise the entire gamut of resources from smart meters to heterogeneous communication networks that facilitate two-way dissemination of energy consumption information and commands between the utilities and consumers. AMI is integral to the implementation of smart grid distribution services such as Demand Response (DR) and Distribution Automation (DA). The reliability of these services is heavily dependent on the integrity of the AMI data. This paper investigates the modeling of AMI data using machine learning approaches with the objective of load forecasting of individual consumers. The model can also be extended for detection of anomalies in consumption patterns introduced by false data injection attacks, electrical events and unauthorized load additions or usage modes.