Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency

Full metadata record
DC Field Value Language
dc.contributor.authorShin, Incheol-
dc.contributor.authorHuh, Jun Ho-
dc.contributor.authorKim, Sinkyu-
dc.contributor.authorSeo, Jungtaek-
dc.date.accessioned2021-09-15T04:40:35Z-
dc.date.available2021-09-15T04:40:35Z-
dc.date.created2021-09-15-
dc.date.issued2014-06-
dc.identifier.issn1383-469X-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/82137-
dc.description.abstractAdvanced Metering Infrastructures (AMI) facilitate efficient and reliable exchange of electricity information between the homes and utilities. Their unique characteristics (e.g., connecting millions of smart meters; accessing customers' private information), however, make them a lucrative target for adversaries. For example, an attacker might try to compromise the head-end of an AMI and send "remote disconnect commands" to the smart meters, disconnecting a large number of customers. To implement message authentication and protect message integrity and confidentiality, a number of cryptographic keys are being utilized. A "command key", for example, signs messages that are sent from the head-end to the meters. Such keys, however, introduce their own set of problems if they ever get compromised. A stolen command key would allow an adversary to continuously send malicious commands to the meters. Hence, the compromised keys must be revoked and replaced as quickly as possible. This paper proposes an efficient and reliable key distribution framework for the AMI mesh networks based on the connected dominating set approach. The keys are replaced with minimal latency through our "hexagon-tile coloring scheme", which allows the maximum number of keys to be transmitted in parallel, free of collision.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.relation.isPartOfMOBILE NETWORKS & APPLICATIONS-
dc.titleReplacing Cryptographic Keys in AMI Mesh Networks with Small Latency-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000338530300014-
dc.identifier.doi10.1007/s11036-013-0442-2-
dc.identifier.bibliographicCitationMOBILE NETWORKS & APPLICATIONS, v.19, no.3, pp.426 - 434-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-84904209040-
dc.citation.endPage434-
dc.citation.startPage426-
dc.citation.titleMOBILE NETWORKS & APPLICATIONS-
dc.citation.volume19-
dc.citation.number3-
dc.contributor.affiliatedAuthorSeo, Jungtaek-
dc.type.docTypeArticle-
dc.subject.keywordAuthorSmart grid-
dc.subject.keywordAuthorSecrete key management-
dc.subject.keywordAuthorCommunication networks-
dc.subject.keywordAuthorAdvanced metering infrastructure (AMI)-
dc.subject.keywordPlusINTRUSION DETECTION-
dc.subject.keywordPlusREQUIREMENTS-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE