Secure Authentication for Structured Smart Grid System

Inshil Doh, Jiyoung Lim, Kijoon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

27 Scopus citations

Abstract

An important application area for M2M (Machine to Machine) or IoT (Internet of Things) technology is smart grid system which plays an important role in electric power transmission, electricity distribution, and demand-driven control for the energy. To make the smart grid system more reliable and stable, security is the major issue to be provided with the main technologies. In this work, we propose an authentication mechanism between the utility system and the smart meters which gather the energy consumption data from electrical devices in layered smart grid system. Our proposal enhances the smart grid system integrity, availability and robustness by providing security with low overhead.

Original languageEnglish
Title of host publicationProceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015
EditorsFrancesco Palmieri, Leonard Barolli, Helio Dos Santos Silva, Hsing-Chung Chen
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages200-204
Number of pages5
ISBN (Electronic)9781479988730
DOIs
StatePublished - 30 Sep 2015
Event9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015 - Blumenau, Santa Catarina, Brazil
Duration: 8 Jul 201510 Jul 2015

Publication series

NameProceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015

Conference

Conference9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015
Country/TerritoryBrazil
CityBlumenau, Santa Catarina
Period8/07/1510/07/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • IoT
  • M2M
  • authentication
  • security
  • structured smart grid

Fingerprint

Dive into the research topics of 'Secure Authentication for Structured Smart Grid System'. Together they form a unique fingerprint.

Cite this