Authentication techniques in smart grid: a systematic review
More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagno...
Gespeichert in:
Veröffentlicht in: | Telkomnika 2019-06, Vol.17 (3), p.1584-1594 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1594 |
---|---|
container_issue | 3 |
container_start_page | 1584 |
container_title | Telkomnika |
container_volume | 17 |
creator | Qasaimeh, Malik Turab, Rawan Al-Qassas, Raad S. |
description | More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman. |
doi_str_mv | 10.12928/telkomnika.v17i3.11437 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2213048350</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2213048350</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-a619b8ac00d42712f69150f6c4478f1c68d5c7b7c121807d241ef0dac01dab073</originalsourceid><addsrcrecordid>eNpFkEtLAzEQgIMoWGp_gwHPW2eS3U0iXkrRKhS86Dmk2axNH7s1SSv998ZWcGCYyzevj5BbhDEyxeR9cpt1v-382owPKDwfI5ZcXJAB48AKxRS_JAOsFS9ywjUZxbiCHAJYpeSAPE72aem65K1Jvu9ocnbZ-a-9i9R3NG5NSPQz-OaBGhqPMblt5iwN7uDd9w25as0mutFfHZKP56f36Usxf5u9TifzwjKAVJga1UIaC9CUTCBra4UVtLUtSyFbtLVsKisWwiJDCaJhJboWmtyAjVmA4ENyd567C_3vaUmv-n3o8krNGHIoJa8gU-JM2dDHGFyrd8HnB44aQZ9s6X9b-mRLn2zxH1CsYPc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2213048350</pqid></control><display><type>article</type><title>Authentication techniques in smart grid: a systematic review</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Qasaimeh, Malik ; Turab, Rawan ; Al-Qassas, Raad S.</creator><creatorcontrib>Qasaimeh, Malik ; Turab, Rawan ; Al-Qassas, Raad S.</creatorcontrib><description>More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman.</description><identifier>ISSN: 1693-6930</identifier><identifier>EISSN: 2302-9293</identifier><identifier>DOI: 10.12928/telkomnika.v17i3.11437</identifier><language>eng</language><publisher>Yogyakarta: Ahmad Dahlan University</publisher><subject>Access control ; Algorithms ; Communication ; Consumers ; Consumption ; Cryptography ; Cybersecurity ; Data acquisition ; Digital libraries ; Encryption ; Energy conservation ; Energy management ; Energy measurement ; Error detection ; International conferences ; Measuring instruments ; Power consumption ; Quantum computers ; Research methodology ; Residential energy ; Restoration ; Sensors ; Smart grid ; Systematic review ; Troubleshooting ; Wide area networks ; Wireless networks</subject><ispartof>Telkomnika, 2019-06, Vol.17 (3), p.1584-1594</ispartof><rights>2019. This work is published under https://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c200t-a619b8ac00d42712f69150f6c4478f1c68d5c7b7c121807d241ef0dac01dab073</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Qasaimeh, Malik</creatorcontrib><creatorcontrib>Turab, Rawan</creatorcontrib><creatorcontrib>Al-Qassas, Raad S.</creatorcontrib><title>Authentication techniques in smart grid: a systematic review</title><title>Telkomnika</title><description>More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Communication</subject><subject>Consumers</subject><subject>Consumption</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data acquisition</subject><subject>Digital libraries</subject><subject>Encryption</subject><subject>Energy conservation</subject><subject>Energy management</subject><subject>Energy measurement</subject><subject>Error detection</subject><subject>International conferences</subject><subject>Measuring instruments</subject><subject>Power consumption</subject><subject>Quantum computers</subject><subject>Research methodology</subject><subject>Residential energy</subject><subject>Restoration</subject><subject>Sensors</subject><subject>Smart grid</subject><subject>Systematic review</subject><subject>Troubleshooting</subject><subject>Wide area networks</subject><subject>Wireless networks</subject><issn>1693-6930</issn><issn>2302-9293</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpFkEtLAzEQgIMoWGp_gwHPW2eS3U0iXkrRKhS86Dmk2axNH7s1SSv998ZWcGCYyzevj5BbhDEyxeR9cpt1v-382owPKDwfI5ZcXJAB48AKxRS_JAOsFS9ywjUZxbiCHAJYpeSAPE72aem65K1Jvu9ocnbZ-a-9i9R3NG5NSPQz-OaBGhqPMblt5iwN7uDd9w25as0mutFfHZKP56f36Usxf5u9TifzwjKAVJga1UIaC9CUTCBra4UVtLUtSyFbtLVsKisWwiJDCaJhJboWmtyAjVmA4ENyd567C_3vaUmv-n3o8krNGHIoJa8gU-JM2dDHGFyrd8HnB44aQZ9s6X9b-mRLn2zxH1CsYPc</recordid><startdate>20190601</startdate><enddate>20190601</enddate><creator>Qasaimeh, Malik</creator><creator>Turab, Rawan</creator><creator>Al-Qassas, Raad S.</creator><general>Ahmad Dahlan University</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20190601</creationdate><title>Authentication techniques in smart grid: a systematic review</title><author>Qasaimeh, Malik ; Turab, Rawan ; Al-Qassas, Raad S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-a619b8ac00d42712f69150f6c4478f1c68d5c7b7c121807d241ef0dac01dab073</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Communication</topic><topic>Consumers</topic><topic>Consumption</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data acquisition</topic><topic>Digital libraries</topic><topic>Encryption</topic><topic>Energy conservation</topic><topic>Energy management</topic><topic>Energy measurement</topic><topic>Error detection</topic><topic>International conferences</topic><topic>Measuring instruments</topic><topic>Power consumption</topic><topic>Quantum computers</topic><topic>Research methodology</topic><topic>Residential energy</topic><topic>Restoration</topic><topic>Sensors</topic><topic>Smart grid</topic><topic>Systematic review</topic><topic>Troubleshooting</topic><topic>Wide area networks</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Qasaimeh, Malik</creatorcontrib><creatorcontrib>Turab, Rawan</creatorcontrib><creatorcontrib>Al-Qassas, Raad S.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East & South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Telkomnika</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Qasaimeh, Malik</au><au>Turab, Rawan</au><au>Al-Qassas, Raad S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authentication techniques in smart grid: a systematic review</atitle><jtitle>Telkomnika</jtitle><date>2019-06-01</date><risdate>2019</risdate><volume>17</volume><issue>3</issue><spage>1584</spage><epage>1594</epage><pages>1584-1594</pages><issn>1693-6930</issn><eissn>2302-9293</eissn><abstract>More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman.</abstract><cop>Yogyakarta</cop><pub>Ahmad Dahlan University</pub><doi>10.12928/telkomnika.v17i3.11437</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1693-6930 |
ispartof | Telkomnika, 2019-06, Vol.17 (3), p.1584-1594 |
issn | 1693-6930 2302-9293 |
language | eng |
recordid | cdi_proquest_journals_2213048350 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Access control Algorithms Communication Consumers Consumption Cryptography Cybersecurity Data acquisition Digital libraries Encryption Energy conservation Energy management Energy measurement Error detection International conferences Measuring instruments Power consumption Quantum computers Research methodology Residential energy Restoration Sensors Smart grid Systematic review Troubleshooting Wide area networks Wireless networks |
title | Authentication techniques in smart grid: a systematic review |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T19%3A58%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authentication%20techniques%20in%20smart%20grid:%20a%20systematic%20review&rft.jtitle=Telkomnika&rft.au=Qasaimeh,%20Malik&rft.date=2019-06-01&rft.volume=17&rft.issue=3&rft.spage=1584&rft.epage=1594&rft.pages=1584-1594&rft.issn=1693-6930&rft.eissn=2302-9293&rft_id=info:doi/10.12928/telkomnika.v17i3.11437&rft_dat=%3Cproquest_cross%3E2213048350%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2213048350&rft_id=info:pmid/&rfr_iscdi=true |