Kumar et al., 2024 - Google Patents
Deep-learning and blockchain-empowered secure data sharing for smart grid infrastructureKumar et al., 2024
- Document ID
- 5194354974230523036
- Author
- Kumar C
- Chittora P
- Publication year
- Publication venue
- Arabian Journal for Science and Engineering
External Links
Snippet
Abstract The Smart Grid represents a modernized electrical infrastructure integrating information and communication technology for bidirectional data exchange between power providers and consumers. This advancement enables seamless digital connectivity among …
- 238000013135 deep learning 0 title abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Cherbal et al. | Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing | |
| Ferrag et al. | Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis | |
| Attkan et al. | Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security | |
| Kumar et al. | PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities | |
| Rao et al. | Security and privacy issues in smart cities/industries: technologies, applications, and challenges | |
| Pu et al. | A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment | |
| Kumar et al. | A survey on the blockchain techniques for the Internet of Vehicles security | |
| Keshk et al. | Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems | |
| Kumar et al. | Deep-learning and blockchain-empowered secure data sharing for smart grid infrastructure | |
| Aljuhani et al. | A deep-learning-integrated blockchain framework for securing industrial IoT | |
| Hathaliya et al. | Adversarial learning techniques for security and privacy preservation: A comprehensive review | |
| Chen et al. | Endogenous security formal definition, innovation mechanisms, and experiment research in industrial internet | |
| Al-Ghuraybi et al. | Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems | |
| Kumar et al. | Secure data dissemination scheme for digital twin empowered vehicular networks in open RAN | |
| Ataullah et al. | Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review | |
| Sudha et al. | A review on privacy requirements and application layer security in Internet of Things (IoT) | |
| Nagarjun et al. | Design of an anomaly detection framework for delay and privacy-aware blockchain-based cloud deployments | |
| Pon et al. | Blockchain based cloud service security architecture with distributed machine learning for smart device traffic record transaction | |
| Darzi et al. | Counter denial of service for next-generation networks within the artificial intelligence and post-quantum era | |
| Sharma et al. | A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks | |
| Kumar et al. | Secure and privacy-preserving framework for IoT-enabled smart grid environment | |
| Huang | A Data‐Driven WSN Security Threat Analysis Model Based on Cognitive Computing | |
| Hosen et al. | SECBlock-IIoT: a secure blockchain-enabled edge computing framework for industrial Internet of Things | |
| Mahmood et al. | Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments | |
| Suggala et al. | Blockchain technology for digital twin security in smart grids using interpretable generalized additive neural networks |