Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shin, Incheol | - |
dc.contributor.author | Huh, Jun Ho | - |
dc.contributor.author | Kim, Sinkyu | - |
dc.contributor.author | Seo, Jungtaek | - |
dc.date.accessioned | 2021-09-15T04:40:35Z | - |
dc.date.available | 2021-09-15T04:40:35Z | - |
dc.date.created | 2021-09-15 | - |
dc.date.issued | 2014-06 | - |
dc.identifier.issn | 1383-469X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/82137 | - |
dc.description.abstract | Advanced Metering Infrastructures (AMI) facilitate efficient and reliable exchange of electricity information between the homes and utilities. Their unique characteristics (e.g., connecting millions of smart meters; accessing customers' private information), however, make them a lucrative target for adversaries. For example, an attacker might try to compromise the head-end of an AMI and send "remote disconnect commands" to the smart meters, disconnecting a large number of customers. To implement message authentication and protect message integrity and confidentiality, a number of cryptographic keys are being utilized. A "command key", for example, signs messages that are sent from the head-end to the meters. Such keys, however, introduce their own set of problems if they ever get compromised. A stolen command key would allow an adversary to continuously send malicious commands to the meters. Hence, the compromised keys must be revoked and replaced as quickly as possible. This paper proposes an efficient and reliable key distribution framework for the AMI mesh networks based on the connected dominating set approach. The keys are replaced with minimal latency through our "hexagon-tile coloring scheme", which allows the maximum number of keys to be transmitted in parallel, free of collision. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.relation.isPartOf | MOBILE NETWORKS & APPLICATIONS | - |
dc.title | Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000338530300014 | - |
dc.identifier.doi | 10.1007/s11036-013-0442-2 | - |
dc.identifier.bibliographicCitation | MOBILE NETWORKS & APPLICATIONS, v.19, no.3, pp.426 - 434 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-84904209040 | - |
dc.citation.endPage | 434 | - |
dc.citation.startPage | 426 | - |
dc.citation.title | MOBILE NETWORKS & APPLICATIONS | - |
dc.citation.volume | 19 | - |
dc.citation.number | 3 | - |
dc.contributor.affiliatedAuthor | Seo, Jungtaek | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Smart grid | - |
dc.subject.keywordAuthor | Secrete key management | - |
dc.subject.keywordAuthor | Communication networks | - |
dc.subject.keywordAuthor | Advanced metering infrastructure (AMI) | - |
dc.subject.keywordPlus | INTRUSION DETECTION | - |
dc.subject.keywordPlus | REQUIREMENTS | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.