|
|
 |
Search published articles |
 |
|
Showing 2 results for Smart Grid
Mohammad Reza Goharei, Volume 5, Issue 2 (3-2017)
Abstract
In this paper, one of the most important challenges in energy smart grids – Denial of service for critical time messages – is addressed. In order to explain and solve this issue, we have described different communication structures for conveyed messages in energy smart grids, various proposed communication technologies, different types of jammings, and variety of conveyed messages in grid. Also, depending on communication technology and jamming in use, different situations of jamming is explored. To describe jamming problem, Gambler’s ruin problem solving theory is used. To eliminate this vulnerability, the least rate of invalid messages is calculated for the worst situation. TACT technic in he least camouflage traffic load in grids is used to match this problem to real world.
Seyed Hamid Baghestani , Farokhlagha Moazami, Volume 11, Issue 1 (9-2022)
Abstract
The conventional electricity infrastructure relies on the usage of fossil fuels, which harms the environment greatly. A smart grid is an infrastructure that enables the integration of renewable resources with the distribution system, as well as the potential of establishing a two-way flow of energy and data between network management and subscribers in order to optimize energy use. However, this data flow may be misused by attackers to disrupt security and causes power network imbalances.Therefore, it is necessary to exploit different security protocols to exchange data in this platform. One of these security protocols is the authenticated key agreement protocol, which allows the parties to authenticate each other and share a key to encrypt data. Recently Zhang et al. proposed a lightweight key authentication protocol based on hash functions. In this paper, we examine their protocol and show that vulnerable to denial of service (DOS) attack and also is not optimized to implement on smart grid. Then we present a lightweight and secure authentication protocol based on hash functions.
|
|