[go: up one dir, main page]

Kumar et al., 2024 - Google Patents

Deep-learning and blockchain-empowered secure data sharing for smart grid infrastructure

Kumar et al., 2024

Document ID
5194354974230523036
Author
Kumar C
Chittora P
Publication year
Publication venue
Arabian Journal for Science and Engineering

External Links

Snippet

Abstract The Smart Grid represents a modernized electrical infrastructure integrating information and communication technology for bidirectional data exchange between power providers and consumers. This advancement enables seamless digital connectivity among …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications

Similar Documents

Publication Publication Date Title
Cherbal et al. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Ferrag et al. Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis
Attkan et al. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
Kumar et al. PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities
Rao et al. Security and privacy issues in smart cities/industries: technologies, applications, and challenges
Pu et al. A lightweight and privacy-preserving mutual authentication and key agreement protocol for Internet of Drones environment
Kumar et al. A survey on the blockchain techniques for the Internet of Vehicles security
Keshk et al. Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems
Kumar et al. Deep-learning and blockchain-empowered secure data sharing for smart grid infrastructure
Aljuhani et al. A deep-learning-integrated blockchain framework for securing industrial IoT
Hathaliya et al. Adversarial learning techniques for security and privacy preservation: A comprehensive review
Chen et al. Endogenous security formal definition, innovation mechanisms, and experiment research in industrial internet
Al-Ghuraybi et al. Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems
Kumar et al. Secure data dissemination scheme for digital twin empowered vehicular networks in open RAN
Ataullah et al. Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review
Sudha et al. A review on privacy requirements and application layer security in Internet of Things (IoT)
Nagarjun et al. Design of an anomaly detection framework for delay and privacy-aware blockchain-based cloud deployments
Pon et al. Blockchain based cloud service security architecture with distributed machine learning for smart device traffic record transaction
Darzi et al. Counter denial of service for next-generation networks within the artificial intelligence and post-quantum era
Sharma et al. A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
Kumar et al. Secure and privacy-preserving framework for IoT-enabled smart grid environment
Huang A Data‐Driven WSN Security Threat Analysis Model Based on Cognitive Computing
Hosen et al. SECBlock-IIoT: a secure blockchain-enabled edge computing framework for industrial Internet of Things
Mahmood et al. Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments
Suggala et al. Blockchain technology for digital twin security in smart grids using interpretable generalized additive neural networks