Acceso abierto

Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review


Cite

1. Reka, S. S., T. Dragicevic. Future Effectual Role of Energy Delivery: A Comprehensive Review of Internet of Things and Smart Grid. – Renewable and Sustainable Energy Reviews, Vol. 91, 2018, pp. 90-108.10.1016/j.rser.2018.03.089Search in Google Scholar

2. Yang, Q. 13 – Internet of Things Application in Smart Grid: A Brief Overview of Challenges, Opportunities, and Future Trends. – In: Smart Power Distribution Systems. Q. Yang, T. Yang, and W. Li, Eds. Academic Press, 2019, pp. 267-283.10.1016/B978-0-12-812154-2.00013-4Search in Google Scholar

3. Qasaimeh, M., R. S. Al-Qassas, S. Tedmori. Software Randomness Analysis and Evaluation of Lightweight Ciphers: The Prospective for IoT Security. – Multimedia Tools and Applications, Vol. 77, 2018, pp. 18415-18449.10.1007/s11042-018-5663-8Search in Google Scholar

4. Tsiatsis, V., S. Karnouskos, J. Höller, D. Boyle, C. Mulligan. Chapter 12 – Smart Grid. – In: Internet of Things. Second Edition. V. Tsiatsis, S. Karnouskos, J. Höller, D. Boyle, and C. Mulligan, Eds. Academic Press, 2019, pp. 257-268.10.1016/B978-0-12-814435-0.00025-0Search in Google Scholar

5. Min-Xiang, H. H., C. He, R. Li, L. Zeng. Comprehensive Performance Evaluation Strategy for Communication Networks Selection in Smart Grid. – Cybernetics and Information Technologies, Vol. 16, 2016, pp.10.1515/cait-2016-0003Search in Google Scholar

6. EIA, Annual Energy Outlook 2017, 2018.Search in Google Scholar

7. Faheem, M., S. B. H. Shah, R. A. Butt, B. Raza, M. Anwar, M. W. Ashraf, et al. Smart Grid Communication and Information Technologies in the Perspective of Industry 4.0: Opportunities and Challenges. – Computer Science Review, Vol. 30, 2018, pp. 1-30.10.1016/j.cosrev.2018.08.001Search in Google Scholar

8. Demir, K., H. Ismail, T. Vateva-Gurova, N. Suri. Securing the Cloud-Assisted Smart Grid. – International Journal of Critical Infrastructure Protection, Vol. 23, 2018, pp. 100-111.10.1016/j.ijcip.2018.08.004Search in Google Scholar

9. Atanasov, I., E. Pencheva. Reducing Energy Consumption by Using Smart Metering Intelligent Systems. – Cybernetics and Information Technologies, Vol. 16, 2016, pp. 113-124.10.1515/cait-2016-0024Search in Google Scholar

10. Kuzlu, M., M. Pipattanasomporn, S. Rahman. Communication Network Requirements for Major Smart Grid Applications in HAN, NAN and WAN. – Computer Networks, Vol. 67, 2014, pp. 74-88.10.1016/j.comnet.2014.03.029Search in Google Scholar

11. Bayindir, R., I. Colak, G. Fulli, K. Demirtas. Smart Grid Technologies and Applications. – Renewable and Sustainable Energy Reviews, Vol. 66, 2016, pp. 499-516.10.1016/j.rser.2016.08.002Search in Google Scholar

12. Nge, C. L., I. U. Ranaweera, O.-M. Midtgård, L. Norum. A Real-Time Energy Management System for Smart Grid Integrated Photovoltaic Generation with Battery Storage. – Renewable Energy, Vol. 130, 2019, pp. 774-785.10.1016/j.renene.2018.06.073Search in Google Scholar

13. Desai, S., R. Alhadad, N. Chilamkurti, A. Mahmood. A Survey of Privacy Preserving Schemes in IoE Enabled Smart Grid Advanced Metering Infrastructure. – Cluster Computing, 2018.10.1007/s10586-018-2820-9Search in Google Scholar

14. Kim, J., L. Tong. Against Data Attacks on Smart Grid Operations: Attack Mechanisms and Security Measures. – In: Cyber Physical Systems Approach to Smart Electric Power Grid. S. K. Khaitan, J. D. McCalley, and C. C. Liu, Eds. Berlin, Heidelberg, Springer, 2015, pp. 359-383.10.1007/978-3-662-45928-7_13Search in Google Scholar

15. Lei, H., B. Chen, K. L. Butler-Purry, C. Singh. Security and Reliability Perspectives in Cyber-Physical Smart Grids. – In: Proc. of IEEE Innovative Smart Grid Technologies – Asia (ISGT’18 Asia), 2018, pp. 42-47.10.1109/ISGT-Asia.2018.8467794Search in Google Scholar

16. Ayday, E., S. Rajagopal. Secure Device Authentication Mechanisms for the Smart Grid-Enabled Home Area Networks. 2013.Search in Google Scholar

17. Limbasiya, T., A. Arya. Attacks on Authentication and Authorization Models in Smart Grid. – In: Smart Micro-Grid Systems Security and Privacy, A. V. D. M. Kayem, S. D. Wolthusen, and C. Meinel, Eds. Cham, Springer International Publishing, 2018, pp. 53-70.10.1007/978-3-319-91427-5_4Search in Google Scholar

18. Qasaimeh, M., R. Turab, R. S. Al-Qassas. Authentication Techniques in Smart Grids: A Systematic Review. – TELKOMNIKA (Telecommunication, Computing, Electronics and Control), Vol. 17, 2019.10.12928/telkomnika.v17i3.11437Search in Google Scholar

19. Wang, F., Z. Lei, X. Yin, Z. Li, Z. Cao, Y. Wang. Information Security in the Smart Grid: Survey and Challenges. Singapore, 2018, pp. 55-66.10.1007/978-981-13-0893-2_7Search in Google Scholar

20. Gupta, B. B., T. Akhtar. A Survey on Smart Power Grid: Frameworks, Tools, Security Issues, and Solutions. – Annals of Telecommunications, Vol. 72, 2017, pp. 517-549.10.1007/s12243-017-0605-4Search in Google Scholar

21. Munn, Z., M. D. J. Peters, C. Stern, C. Tufanaru, A. McArthur, E. Aromataris. Systematic Review or Scoping Review? Guidance for Authors when Choosing Between a Systematic or Scoping Review Approach. – BMC Medical Research Methodology, Vol. 18, 2018, p. 143.10.1186/s12874-018-0611-x624562330453902Search in Google Scholar

22. Kitchenham, B., L. Madeyski, D. Budgen, J. Keung, P. Brereton, S. Charters, et al. Robust Statistical Methods for Empirical Software Engineering. – Empirical Software Engineering, Vol. 22, 2017, pp. 579-630.10.1007/s10664-016-9437-5Search in Google Scholar

23. Sharma, M., A. Agarwal. Survey on Authentication and Encryption Techniquesfor Smart Grid Communication. – In: Proc. of 7th India International Conference on Power Electronics (IICPE’16), 2016, pp. 1-5.10.1109/IICPE.2016.8079534Search in Google Scholar

24. Farouk, A., A. A. Abdelhafez, M. M. Fouad. Authentication Mechanisms in Grid Computing Environment: Comparative Study. – In: Proc. of International Conference on Engineering and Technology (ICET’12), 2012, pp. 1-6.10.1109/ICEngTechnol.2012.6396116Search in Google Scholar

25. Ji, C., J. Kim, J. Lee, M. Hong. Review of One-Time Signatures for Multicast Authentication in Smart Grid. – In: Proc. of 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT’15), 2015, pp. 1-4.10.1109/CEWIT.2015.7338162Search in Google Scholar

26. Kumar, A., A. Agarwal. Research Issues Related to Cryptography Algorithms and Key Generation for Smart Grid: A Survey. – In: Proc. of 7th India International Conference on Power Electronics (IICPE’16), 2016, pp. 1-5.10.1109/IICPE.2016.8079528Search in Google Scholar

27. Leander, G., C. Paar, A. Poschmann, K. Schramm. New Lightweight DES Variants. Berlin, Heidelberg, Springer, 2007.Search in Google Scholar

28. Kitchenham, B. A. Systematic Review in Software Engineering: Where We Are and Where We Should Be Going. – In: Proc. of 2nd International Workshop on Evidential Assessment of Software Technologies, Lund, Sweden, 2012.10.1145/2372233.2372235Search in Google Scholar

29. Tsaur, W., C. Wu. A Secure Smart-Card-Based Password Authenticated Key Agreement Scheme in Multi-Server Environments. – In: Proc. of IEEE Second International Conference on Social Computing, 2010, pp. 999-1003.10.1109/SocialCom.2010.148Search in Google Scholar

30. Warnier, M., S. Dulman, Y. Koç, E. Pauwels. Distributed Monitoring for the Prevention of Cascading Failures in Operational Power Grids. – International Journal of Critical Infrastructure Protection, Vol. 17, 2017, pp. 15-27.10.1016/j.ijcip.2017.03.003Search in Google Scholar

31. Sharma, G., S. Kalra. A Secure Remote User Authentication Scheme for Smart Cities e-Governance Applications. – Journal of Reliable Intelligent Environments, Vol. 3, 2017, pp. 177-188.10.1007/s40860-017-0046-xSearch in Google Scholar

32. Chang, S., T. William, W. Wu, B. Cheng, H. Chen, P. Hsu. Design of an Authentication and Key Management System for a Smart Meter Gateway in AMI. – In: Proc. of IEEE 6th Global Conference on Consumer Electronics (GCCE’17), 2017, pp. 1-2.10.1109/GCCE.2017.8229288Search in Google Scholar

33. Cho, S., H. Li, B. J. Choi. PALDA: Efficient Privacy-Preserving Authentication for Lossless Data Aggregation in Smart Grids. – In: Proc. of IEEE International Conference on Smart Grid Communications (SmartGridComm), 2014, pp. 914-919.10.1109/SmartGridComm.2014.7007765Search in Google Scholar

34. Qinghai, G. Biometric Authentication in Smart Grid. – In: Proc. of International Energy and Sustainability Conference (IESC’12), 2012, pp. 1-5.10.1109/IESC.2012.6217197Search in Google Scholar

35. Fangming, Z., Y. Hanatani, Y. Komano, B. Smyth, S. Ito, T. Kambayashi. Secure Authenticated Key Exchange with Revocation for Smart Grid. – In: Proc. of IEEE PES Innovative Smart Grid Technologies (ISGT’12), 2012, pp. 1-8.10.1109/ISGT.2012.6175530Search in Google Scholar

36. Tavasoli, M., S. Alishahi, M. Zabihi, H. Khorashadizadeh, A. H. Mohajerzadeh. An Efficient NSKDP Authentication Method to Secure Smart Grid. – In: Proc. of IEEE International Conference on Smart Energy Grid Engineering (SEGE’17), 2017, pp. 276-280.10.1109/SEGE.2017.8052812Search in Google Scholar

37. Tabassum, R., K. Nahrstedt, E. Rogers, K. Lui. SCAPACH: Scalable Password-Changing Protocol for Smart Grid Device Authentication. – In: Proc. of 22nd International Conference on Computer Communication and Networks (ICCCN’13), 2013, pp. 1-5.10.1109/ICCCN.2013.6614189Search in Google Scholar

38. Doh, I., J. Lim, K. Chae. Secure Authentication for Structured Smart Grid System. – In: Proc. of 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015, pp. 200-204.10.1109/IMIS.2015.32Search in Google Scholar

39. Ayday, E., S. Rajagopal. Secure, Intuitive and Low-Cost Device Authentication for Smart Grid Networks. – In: Proc. of IEEE Consumer Communications and Networking Conference (CCNC’11), 2011, pp. 1161-1165.10.1109/CCNC.2011.5766359Search in Google Scholar

40. Cairns, K., C. Hauser, T. Gamage. Flexible Data Authentication Evaluated for the Smart Grid. – In: Proc. of IEEE International Conference on Smart Grid Communications (SmartGridComm), 2013, pp. 492-497.10.1109/SmartGridComm.2013.6688006Search in Google Scholar

41. Choi, J., I. Shin, J. Seo, C. Lee. An Efficient Message Authentication for Non-Repudiation of the Smart Metering Service. – In: Proc. of First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering, 2011, pp. 331-333.10.1109/CNSI.2011.28Search in Google Scholar

42. Fouda, M. M., Z. M. Fadlullah, N. Kato, R. Lu, X. S. Shen. A Lightweight Message Authentication Scheme for Smart Grid Communications. – IEEE Transactions on Smart Grid, Vol. 2, 2011, pp. 675-685.10.1109/TSG.2011.2160661Search in Google Scholar

43. Lee, Y., E. Kim, Y. Kim, H. Jeon, M. Jung. A Study on Secure Chip for Message Authentication between a Smart Meter and Home Appliances in Smart Grid. – In: Proc. of International Conference on IT Convergence and Security (ICITCS’13), 2013, pp. 1-3.10.1109/ICITCS.2013.6717790Search in Google Scholar

44. Muñoz, M. C., M. Moh, T. Moh. Improving Smart Grid Authentication Using Merkle Trees. – In: Proc. of 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS’14), 2014, pp. 793-798.10.1109/PADSW.2014.7097884Search in Google Scholar

45. Nath, A. P. D., F. Amsaad, M. Choudhury, M. Niamat. Hardware-Based Novel Authentication Scheme for Advanced Metering Infrastructure. – In: Proc. of IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS’16), 2016, pp. 364-371.10.1109/NAECON.2016.7856831Search in Google Scholar

46. Nicanfar, H., V. C. M. Leung. Smart Grid Multilayer Consensus Password-Authenticated Key Exchange Protocol. – In: Proc. of IEEE International Conference on Communications (ICC’12), 2012, pp. 6716-6720.10.1109/ICC.2012.6364733Search in Google Scholar

47. Saxena, N., B. J. Choi. Integrated Distributed Authentication Protocol for Smart Grid Communications. – IEEE Systems Journal, Vol. 12, 2018, pp. 2545-2556.10.1109/JSYST.2016.2574699Search in Google Scholar

48. Li, W., R. Li, K. Wu, R. Cheng, L. Su, W. Cui. Design and Implementation of an SM2-Based Security Authentication Scheme with the Key Agreement for Smart Grid Communications. – IEEE Access, 2018, pp. 15-22.10.1109/ACCESS.2018.2875681Search in Google Scholar

49. Li, X., F. Wu, S. Kumari, L. Xu, A. K. Sangaiah, K.-K. R. Choo. A Provably Secure and Anonymous Message Authentication Scheme for Smart Grids. – Journal of Parallel and Distributed Computing, 2017.Search in Google Scholar

50. Mahmood, K., S. Ashraf Chaudhry, H. Naqvi, T. Shon, H. Farooq Ahmad. A Lightweight Message Authentication Scheme for Smart Grid Communications in Power Sector. – Computers & Electrical Engineering, Vol. 52, 2016, pp. 114-124.10.1016/j.compeleceng.2016.02.017Search in Google Scholar

51. Abbasinezhad-Mood, D., M. Nikooghadam. Design and Hardware Implementation of a Security-Enhanced Elliptic Curve Cryptography Based Lightweight Authentication Scheme for Smart Grid Communications. – Future Generation Computer Systems, Vol. 84, 2018, pp. 47-57.10.1016/j.future.2018.02.034Search in Google Scholar

52. Nabeel, M., X. Ding, S.-H. Seo, E. Bertino. Scalable End-to-End Security for Advanced Metering Infrastructures. – Information Systems, Vol. 53, 2015, pp. 213-223.10.1016/j.is.2015.01.004Search in Google Scholar

53. Abbasinezhad-Mood, D., M. Nikooghadam. Design of an Enhanced Message Authentication Scheme for Smart Grid and Its Performance Analysis on an ARM Cortex-M3 Microcontroller. – Journal of Information Security and Applications, Vol. 40, 2018, pp. 9-19.10.1016/j.jisa.2018.02.007Search in Google Scholar

54. Mahmood, K., S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, A. K. Sangaiah. An Elliptic Curve Cryptography Based Lightweight Authentication Scheme for Smart Grid Communication. – Future Generation Computer Systems, Vol. 81, 2018, pp. 557-565.10.1016/j.future.2017.05.002Search in Google Scholar

55. Wang, Y. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems. – In: Security of Industrial Control Systems and Cyber-Physical Systems, Cham, 2017, pp. 103-120.10.1007/978-3-319-61437-3_7Search in Google Scholar

56. Câmara, S., D. Anand, V. Pillitteri, L. Carmo. Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid. – IFIP Advances in Information and Communication Technology, Vol. 471, 2016, pp. 32-46.10.1007/978-3-319-33630-5_3552064228736582Search in Google Scholar

57. Al Hamadi, H. M. N., C. Y. Yeun, M. J. Zemerly. A Novel Security Scheme for the Smart Grid and SCADA Networks. – Wireless Personal Communications, Vol. 73, 2013, pp. 1547-1559.10.1007/s11277-013-1265-ySearch in Google Scholar

58. Bayat, M., M. B. Atashgah, M. R. Aref. A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid. – Wireless Personal Communications, Vol. 97, 2017, pp. 2551-2579.10.1007/s11277-017-4623-3Search in Google Scholar

59. Wen, M., J. Lei, Z. Bi, J. Li. EAPA: An Efficient Authentication Protocol against Pollution Attack for Smart Grid. – Peer-to-Peer Networking and Applications, Vol. 8, 2015, pp. 1082-1089.10.1007/s12083-014-0283-1Search in Google Scholar

60. Li, H., R. Lu, L. Zhou, B. Yang, X. Shen. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid. – IEEE Systems Journal, Vol. 8, 2014, pp. 655-663.10.1109/JSYST.2013.2271537Search in Google Scholar

61. Abdullah, M. D. H., Z. M. Hanapi, Z. A. Zukarnain, M. A. Mohamed. Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks. – KSII Transactions on Internet & Information Systems, Vol. 9, 2015.10.3837/tiis.2015.04.013Search in Google Scholar

62. Jabangwe, R., J. Börstler, D. Šmite, C. Wohlin. Empirical Evidence on the Link between Object-Oriented Measures and External Quality Attributes: A Systematic Literature Review. – Empirical Software Engineering, Vol. 20, 2015, pp. 640-693.10.1007/s10664-013-9291-7Search in Google Scholar

63. Garousi, V., M. Felderer, M. V. Mäntylä. Guidelines for Including Grey Literature and Conducting Multivocal Literature Reviews in Software Engineering. – Information and Software Technology, Vol. 106, 2019, pp. 101-121.10.1016/j.infsof.2018.09.006Search in Google Scholar

eISSN:
1314-4081
Idioma:
Inglés
Calendario de la edición:
4 veces al año
Temas de la revista:
Computer Sciences, Information Technology