Article
Computer Science, Information Systems
Vinod Kumar, Rajendra Kumar, S. K. Pandey
Summary: Smart Grid is a modernized power grid system that requires a secure and robust key management scheme to ensure confidentiality during communication in the Advanced Metering Infrastructure (AMI). This paper proposes a tailored key management scheme for Home Area Networks (HAN) in AMI, which significantly reduces rekeying overhead and enhances privacy protection.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Jingxue Xie, Xinghong Tan, Liang Tan
Summary: This study proposes a certificate revocation scheme based on blockchain and accumulators, which effectively addresses the storage overhead and misjudgment rate issues of existing schemes and improves the query efficiency of certificate revocation information.
SECURITY AND COMMUNICATION NETWORKS
(2022)
Article
Engineering, Multidisciplinary
Jichao Bi, Fengji Luo, Gaoqi Liang, Xiaofan Yang, Shibo He, Zhao Yang Dong
Summary: This paper proposes an impact assessment framework for evaluating the effects of false data injection attacks on smart meters in smart grids. The propagation model of malicious false data codes in smart meter communication networks is established, and a security-constrained economic dispatch model is formulated to assess the consequences of these attacks. A defense strategy is also proposed to enhance the grid's vulnerability through deploying defense resources effectively. Extensive numerical simulations are conducted to evaluate different attack scenarios and the effectiveness of the defense strategy.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Hardware & Architecture
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Saurabh Rana
Summary: The development of IoT technology presents new challenges for smart grid systems. To enhance security and privacy in smart grids, lightweight authentication and key agreement protocols are proposed. Analyzing and verifying these new protocols can improve the efficiency of smart grid systems.
JOURNAL OF SYSTEMS ARCHITECTURE
(2021)
Article
Computer Science, Hardware & Architecture
Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing
Summary: This article proposes a blockchain-based solution for certificate transparency and revocation transparency to address the potential compromise of certification authorities. The scheme enhances the security guarantees of certificates and allows SSL/TLS web servers to have cooperative control over their certificates.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Automation & Control Systems
Shunfang Hu, Yanru Chen, Yilong Zheng, Bin Xing, Yang Li, Le Zhang, Liangyin Chen
Summary: This article introduces the advanced metering infrastructure (AMI) as a vital component of the smart grid (SG) for real-time data access and bidirectional communication. An authentication and key agreement (AKA) protocol is needed for ensuring the security of AMI systems. A security-enhanced AKA protocol based on elliptic curve cryptography is proposed and rigorously proven under the random oracle model. Performance comparison demonstrates improved security features with lower computation and communication cost. The proposed scheme is implemented practically on a Raspberry Pi 3 Model B+ testbed for smart meters.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Engineering, Electrical & Electronic
Shehzad Ashraf Chaudhry
Summary: The paper identifies flaws in the PALK authentication scheme proposed by Khan et al., specifically pointing out errors in the login and authentication phases due to superficial ECC operations and issues with the use of public keys in the presence of multiple communicating devices. A solution iPALK is proposed by the authors, which is proven to be secure and correct using formal BAN logic and ProVerif automated tool, with performance comparisons showing iPALK to be more efficient in computation and communication costs compared to PALK.
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS
(2021)
Article
Multidisciplinary Sciences
Wei Zhang, Tim van Leent, Kai Redeker, Robert Garthoff, Rene Schwonnek, Florian Fertig, Sebastian Eppelt, Wenjamin Rosenfeld, Valerio Scarani, Charles C-W Lim, Harald Weinfurter
Summary: Device-independent quantum key distribution (DIQKD) is a method that generates secret keys over an untrusted channel using uncharacterized and potentially untrusted devices. This study presents an experimental system that enables DIQKD between two distant users by generating and analyzing event-ready entanglement between two independently trapped single rubidium atoms located 400 meters apart. The results show the system's capability to generate secret keys and pave the way for quantum secure communications in future quantum networks.
Article
Physics, Multidisciplinary
Feihu Xu, Yu-Zhe Zhang, Qiang Zhang, Jian-Wei Pan
Summary: Device-independent QKD protocol with random postselection is proposed in this paper, where secret keys are extracted only from the postselected subset of outcomes, reducing error events and relaxing the threshold of required detection efficiency.
PHYSICAL REVIEW LETTERS
(2022)
Article
Physics, Multidisciplinary
Luis Adrian Lizama-Perez, J. R. Mauricio Lopez
Summary: The study introduces a public certification system based on a non-invertible key exchange protocol, enabling a secure, scalable, interoperable, and efficient public key infrastructure. It demonstrates the functionality of certificates across different certification domains and discusses a method for achieving perfect forward secrecy with non-invertible certificates.
Review
Computer Science, Information Systems
Peng-Yong Kong
Summary: Smart grid relies on advanced communication networks for information collection and control command dissemination. To ensure information confidentiality, Quantum Key Distribution (QKD) protocols are used to generate and distribute secret keys. Deploying QKD protocols in smart grid faces challenges of distance and the large number of control devices. There is a need for more research on QKD protocols specifically for smart grid, indicating an opportunity for significant contributions and future research challenges.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Girraj Kumar Verma, Prosanta Gope, Neetesh Saxena, Neeraj Kumar
Summary: The recent development of smart cities involves the utilization of modern smart grid (SG) in an advanced and optimized manner compared to traditional power grid. SG has transformed houses into home area networks where smart devices and appliances are connected to the electricity control centers (ECC). The generated consumption data from appliances is used for efficient supply-demand management. However, ensuring security and privacy of consumer data remains crucial. To address this, a certificate-based data aggregation (CB-DA) scheme is proposed in this paper, offering improved security and efficiency compared to existing schemes.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Taimin Zhang, Xiaoyu Ji, Wenyuan Xu
Summary: This study analyzes the performance degradation problem of the RPL protocol under jamming attack and proposes a backup node selection mechanism to significantly improve the performance of RPL under jamming attack.
MOBILE NETWORKS & APPLICATIONS
(2022)
Article
Computer Science, Theory & Methods
Bingyu Li, Jingqiang Lin, Qiongxiao Wang, Ze Wang, Jiwu Jing
Summary: This study reexamines the issues of CTL management and CRI access within medium-sized organizations by analyzing TLS sessions, proposing a locally-centralized design and applying it to desktop virtualization systems to demonstrate improved performance.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Optics
Cong Jiang, Zong-Wen Yu, Xiao-Long Hu, Xiang-Bin Wang
Summary: The double-scanning method proposed in this study can greatly enhance the key rate of MDI-QKD, with improvements ranging from 35% to 280% in a typical experimental setup. Optimization of the MDI-QKD protocol with all parameters can further improve the key rate by about 10% compared to optimizing just the source parameters.
Article
Computer Science, Information Systems
Samet Tonyali, Ozan Cakmak, Kemal Akkaya, Mohamed M. E. A. Mahmoud, Ismail Guvenc
IEEE INTERNET OF THINGS JOURNAL
(2016)
Article
Computer Science, Theory & Methods
Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac, Mehrdad Nojoumian
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2018)
Article
Computer Science, Hardware & Architecture
Samet Tonyali, Ruben Munoz, Kemal Akkaya, Utku Ozgur
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2018)
Article
Computer Science, Information Systems
Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya
IEEE INTERNET OF THINGS JOURNAL
(2019)
Proceedings Paper
Computer Science, Hardware & Architecture
Jessica Bozhko, Yacoub Hanna, Ricardo Harrilal-Parchment, Samet Tonyali, Kemal Akkaya
Summary: Post-quantum cryptographic algorithms are being developed to resist attacks from quantum computers. The efficiency of these algorithms is crucial for their practical use in securing networks, especially for consumer IoT devices with limited computational power and constrained wireless bandwidth. This paper focuses on evaluating the performance of widely used IoT standards BLE and WiFi to find the optimal PQ algorithm for their security. The test results showed that Kyber512 is the ideal KEM for BLE devices, while Falcon-512 and Dilithium2 are the best signatures for WiFi devices.
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC
(2023)
Proceedings Paper
Computer Science, Hardware & Architecture
Samet Tonyali, Kemal Akkaya
2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC)
(2018)
Proceedings Paper
Engineering, Electrical & Electronic
Samet Tonyali, Kemal Akkaya, Nico Saputro
2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS)
(2017)
Proceedings Paper
Computer Science, Theory & Methods
Utku Ozgur, Samet Tonyali, Kemal Akkaya
PROCEEDINGS OF THE 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS - LCN WORKSHOPS 2016
(2016)
Proceedings Paper
Engineering, Electrical & Electronic
Hawzhin Mohammed, Samet Tonyali, Khaled Rabieh, Mohamed Mahmoud, Kemal Akkaya
2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)
(2016)
Proceedings Paper
Computer Science, Hardware & Architecture
Nico Saputro, Kemal Akkaya, Samet Tonyali
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN)
(2016)
Proceedings Paper
Computer Science, Theory & Methods
Utku Ozgur, Samet Tonyali, Kemal Akkaya, Fatih Senel
2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC)
(2016)
Proceedings Paper
Engineering, Electrical & Electronic
Samet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac
2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC)
(2016)
Proceedings Paper
Engineering, Electrical & Electronic
Samet Tonyali, Nico Saputro, Kemal Akkaya
2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS
(2015)
Proceedings Paper
Computer Science, Theory & Methods
Samet Tonyali, Ali Fuat Alkaya
ADVANCED COMPUTATIONAL METHODS FOR KNOWLEDGE ENGINEERING
(2015)