Authentication techniques in smart grid: a systematic review

More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagno...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Telkomnika 2019-06, Vol.17 (3), p.1584-1594
Hauptverfasser: Qasaimeh, Malik, Turab, Rawan, Al-Qassas, Raad S.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1594
container_issue 3
container_start_page 1584
container_title Telkomnika
container_volume 17
creator Qasaimeh, Malik
Turab, Rawan
Al-Qassas, Raad S.
description More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman.
doi_str_mv 10.12928/telkomnika.v17i3.11437
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2213048350</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2213048350</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-a619b8ac00d42712f69150f6c4478f1c68d5c7b7c121807d241ef0dac01dab073</originalsourceid><addsrcrecordid>eNpFkEtLAzEQgIMoWGp_gwHPW2eS3U0iXkrRKhS86Dmk2axNH7s1SSv998ZWcGCYyzevj5BbhDEyxeR9cpt1v-382owPKDwfI5ZcXJAB48AKxRS_JAOsFS9ywjUZxbiCHAJYpeSAPE72aem65K1Jvu9ocnbZ-a-9i9R3NG5NSPQz-OaBGhqPMblt5iwN7uDd9w25as0mutFfHZKP56f36Usxf5u9TifzwjKAVJga1UIaC9CUTCBra4UVtLUtSyFbtLVsKisWwiJDCaJhJboWmtyAjVmA4ENyd567C_3vaUmv-n3o8krNGHIoJa8gU-JM2dDHGFyrd8HnB44aQZ9s6X9b-mRLn2zxH1CsYPc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2213048350</pqid></control><display><type>article</type><title>Authentication techniques in smart grid: a systematic review</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Qasaimeh, Malik ; Turab, Rawan ; Al-Qassas, Raad S.</creator><creatorcontrib>Qasaimeh, Malik ; Turab, Rawan ; Al-Qassas, Raad S.</creatorcontrib><description>More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman.</description><identifier>ISSN: 1693-6930</identifier><identifier>EISSN: 2302-9293</identifier><identifier>DOI: 10.12928/telkomnika.v17i3.11437</identifier><language>eng</language><publisher>Yogyakarta: Ahmad Dahlan University</publisher><subject>Access control ; Algorithms ; Communication ; Consumers ; Consumption ; Cryptography ; Cybersecurity ; Data acquisition ; Digital libraries ; Encryption ; Energy conservation ; Energy management ; Energy measurement ; Error detection ; International conferences ; Measuring instruments ; Power consumption ; Quantum computers ; Research methodology ; Residential energy ; Restoration ; Sensors ; Smart grid ; Systematic review ; Troubleshooting ; Wide area networks ; Wireless networks</subject><ispartof>Telkomnika, 2019-06, Vol.17 (3), p.1584-1594</ispartof><rights>2019. This work is published under https://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c200t-a619b8ac00d42712f69150f6c4478f1c68d5c7b7c121807d241ef0dac01dab073</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Qasaimeh, Malik</creatorcontrib><creatorcontrib>Turab, Rawan</creatorcontrib><creatorcontrib>Al-Qassas, Raad S.</creatorcontrib><title>Authentication techniques in smart grid: a systematic review</title><title>Telkomnika</title><description>More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Communication</subject><subject>Consumers</subject><subject>Consumption</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data acquisition</subject><subject>Digital libraries</subject><subject>Encryption</subject><subject>Energy conservation</subject><subject>Energy management</subject><subject>Energy measurement</subject><subject>Error detection</subject><subject>International conferences</subject><subject>Measuring instruments</subject><subject>Power consumption</subject><subject>Quantum computers</subject><subject>Research methodology</subject><subject>Residential energy</subject><subject>Restoration</subject><subject>Sensors</subject><subject>Smart grid</subject><subject>Systematic review</subject><subject>Troubleshooting</subject><subject>Wide area networks</subject><subject>Wireless networks</subject><issn>1693-6930</issn><issn>2302-9293</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpFkEtLAzEQgIMoWGp_gwHPW2eS3U0iXkrRKhS86Dmk2axNH7s1SSv998ZWcGCYyzevj5BbhDEyxeR9cpt1v-382owPKDwfI5ZcXJAB48AKxRS_JAOsFS9ywjUZxbiCHAJYpeSAPE72aem65K1Jvu9ocnbZ-a-9i9R3NG5NSPQz-OaBGhqPMblt5iwN7uDd9w25as0mutFfHZKP56f36Usxf5u9TifzwjKAVJga1UIaC9CUTCBra4UVtLUtSyFbtLVsKisWwiJDCaJhJboWmtyAjVmA4ENyd567C_3vaUmv-n3o8krNGHIoJa8gU-JM2dDHGFyrd8HnB44aQZ9s6X9b-mRLn2zxH1CsYPc</recordid><startdate>20190601</startdate><enddate>20190601</enddate><creator>Qasaimeh, Malik</creator><creator>Turab, Rawan</creator><creator>Al-Qassas, Raad S.</creator><general>Ahmad Dahlan University</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20190601</creationdate><title>Authentication techniques in smart grid: a systematic review</title><author>Qasaimeh, Malik ; Turab, Rawan ; Al-Qassas, Raad S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-a619b8ac00d42712f69150f6c4478f1c68d5c7b7c121807d241ef0dac01dab073</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Communication</topic><topic>Consumers</topic><topic>Consumption</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data acquisition</topic><topic>Digital libraries</topic><topic>Encryption</topic><topic>Energy conservation</topic><topic>Energy management</topic><topic>Energy measurement</topic><topic>Error detection</topic><topic>International conferences</topic><topic>Measuring instruments</topic><topic>Power consumption</topic><topic>Quantum computers</topic><topic>Research methodology</topic><topic>Residential energy</topic><topic>Restoration</topic><topic>Sensors</topic><topic>Smart grid</topic><topic>Systematic review</topic><topic>Troubleshooting</topic><topic>Wide area networks</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Qasaimeh, Malik</creatorcontrib><creatorcontrib>Turab, Rawan</creatorcontrib><creatorcontrib>Al-Qassas, Raad S.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East &amp; South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Telkomnika</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Qasaimeh, Malik</au><au>Turab, Rawan</au><au>Al-Qassas, Raad S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authentication techniques in smart grid: a systematic review</atitle><jtitle>Telkomnika</jtitle><date>2019-06-01</date><risdate>2019</risdate><volume>17</volume><issue>3</issue><spage>1584</spage><epage>1594</epage><pages>1584-1594</pages><issn>1693-6930</issn><eissn>2302-9293</eissn><abstract>More advanced sensor solutions, e.g. Phasor Measurement Units (PMUs), enable energy saving by re-routing power automatically, relative to consumer demand, facilitating reduced energy wastage and optimum stability, including error detection and reporting (e.g. during power outages), and faster diagnosis and troubleshooting to enable system restoration in the event of problems [3]. There are three main network types in SG architectures: - Wide Area Network (WAN) - Neighborhood Area Network (NAN): this gathers data from PMUs and smart meters for the utility company [3] - Home Area Network (HAN): within Home Energy Management System (HEMS), this facilitates data collection concerning consumption [5] Conventional systems' security features [6-8] must be conserved by SG and IoT applications; indeed, they ought to be enhanced and improved, in terms of service and utility availability, integrity, and confidentiality [9]. [...]full-text analysis led to a total of 33 articles. Other attacks collectively accounted for 15% of attacks mitigated, comprising data forgery, DoS, information leakage, insider, modification, pollution, and quantum computer attacks. 4.Conclusion A total of 27 primary studies were systematically reviewed in this study, revealing that most researches deployed cryptographic techniques for SG component authentication, including hash function, symmetric key encryption, and Diffie-Hellman.</abstract><cop>Yogyakarta</cop><pub>Ahmad Dahlan University</pub><doi>10.12928/telkomnika.v17i3.11437</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1693-6930
ispartof Telkomnika, 2019-06, Vol.17 (3), p.1584-1594
issn 1693-6930
2302-9293
language eng
recordid cdi_proquest_journals_2213048350
source EZB-FREE-00999 freely available EZB journals
subjects Access control
Algorithms
Communication
Consumers
Consumption
Cryptography
Cybersecurity
Data acquisition
Digital libraries
Encryption
Energy conservation
Energy management
Energy measurement
Error detection
International conferences
Measuring instruments
Power consumption
Quantum computers
Research methodology
Residential energy
Restoration
Sensors
Smart grid
Systematic review
Troubleshooting
Wide area networks
Wireless networks
title Authentication techniques in smart grid: a systematic review
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T19%3A58%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authentication%20techniques%20in%20smart%20grid:%20a%20systematic%20review&rft.jtitle=Telkomnika&rft.au=Qasaimeh,%20Malik&rft.date=2019-06-01&rft.volume=17&rft.issue=3&rft.spage=1584&rft.epage=1594&rft.pages=1584-1594&rft.issn=1693-6930&rft.eissn=2302-9293&rft_id=info:doi/10.12928/telkomnika.v17i3.11437&rft_dat=%3Cproquest_cross%3E2213048350%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2213048350&rft_id=info:pmid/&rfr_iscdi=true