Authentication techniques in smart grid: a systematic review

More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagno...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Telkomnika 2019-06, Vol.17 (3), p.1584-1594
Hauptverfasser: Qasaimeh, Malik, Turab, Rawan, Al-Qassas, Raad S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman.
ISSN:1693-6930
2302-9293
DOI:10.12928/telkomnika.v17i3.11437