Security Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 99594 Experts worldwide ranked by ideXlab platform

Yi Qian - One of the best experts on this subject based on the ideXlab platform.

  • an adaptive Security Protocol for a wireless sensor based monitoring network in smart grid transmission lines
    Security and Communication Networks, 2016
    Co-Authors: Xuping Zhang, Feng Ye, Guoliang Xu, Yi Qian
    Abstract:

    In this paper, we propose a new Security Protocol for a wireless sensor network, which is designed for monitoring long range power transmission lines in smart grid. Part of the monitoring network is composed of optical fiber composite over head ground wire OPGW, thus it can be secured with conventional Security Protocol. However, the wireless sensor network between two neighboring OPGW gateways remains vulnerable. Our proposed Security Protocol focuses on the wireless sensor network part, it provides mutual authentication, data integrity, and data confidentiality for both uplink and downlink transmissions between the sensor nodes and the OPGW gateway. Besides, our proposed Protocol is adaptive to the dynamic node changes of the monitoring sensor network; for example, new sensors are added to the network, or some of the sensors are malfunctioning. We further propose a self-healing process using an "i-neighboring nodes" public key structure and an asymmetric algorithm. We also conduct energy consumption analysis for both general and extreme conditions to show that our Security Protocol improves the availability of the monitoring sensor network. Copyright © 2015 John Wiley & Sons, Ltd.

  • secure communication networks in the advanced secure communication networks in the advanced metering infrastructure of smart grid metering infrastructure of smart grid
    2015
    Co-Authors: Feng Ye, Yi Qian
    Abstract:

    In this paper, a Security Protocol for the advanced metering infrastructure (AMI) in smart grid is proposed. Through the AMI, cus⁃ tomers and the service provider achieve two⁃way communication. Real⁃time monitoring and demand response can be applied be⁃ cause of the information exchanged. Since the information contains much privacy of the customer, and the control messages need to be authenticated, Security needs to be ensured for the communication in the AMI. Due to the complicated network structure of the AMI, the asymmetric communications, and various Security requirements, existing Security Protocols for other networks can hardly be applied into the AMI directly. Therefore, a Security Protocol specifically for the AMI to meet the Security requirements is proposed. Our proposed Security Protocol includes initial authentication, secure uplink data aggregation, secure downlink data transmission, and domain secrets update. Compared with existing researches in related areas, our proposed Security Protocol takes the asymmetric communications of the AMI and various Security requirements in smart grid into consideration.

  • a Security Protocol for advanced metering infrastructure in smart grid
    Global Communications Conference, 2014
    Co-Authors: Feng Ye, Yi Qian, Rose Qingyang Hu
    Abstract:

    In this paper, we propose a Security Protocol for advanced metering infrastructure (AMI) in smart grid. AMI is one of the important components in smart grid and it suffers from various vulnerabilities due to its uniqueness compared with wired networks and traditional wireless mesh networks. Our proposed Security Protocol for AMI includes initial authentication, secure uplink data aggregation/recovery, and secure downlink data transmission. Compared with existing researches in such area, our proposed Security Protocol let the customers be treated fairly, the privacy of customers be protected, and the control messages from the service provider be delivered safely and timely.

  • an efficient Security Protocol for advanced metering infrastructure in smart grid
    IEEE Network, 2013
    Co-Authors: Ye Yan, Hamid Sharif, Sajal K. Das, Rose Qingyang Hu, Yi Qian
    Abstract:

    In this article, we present a Security Protocol for advanced metering infrastructure in smart grid. We consider various Security vulnerabilities of deploying AMI, and explore the issues related to confidentiality for user privacy and behavior as well as message authentication for meter reading and control messages. After surveying the existing Security solutions in this area, we propose a new Protocol, Integrated Authentication and Confidentiality (IAC), to provide efficient secure AMI communications in smart grid. With the help of IAC, an AMI system can provide trust services, data privacy, and integrity by mutual authentications whenever a new smart meter initiates and joins the smart grid AMI network. Data integrity and confidentiality are fulfilled through message authentication and encryption services, using the corresponding keys established in mutual authentications. Simulation and analytical results show that the proposed IAC Protocol has better performance in terms of end-to-end delay and packet loss than a basic Security scheme. Additionally, it can also facilitate efficient secure data collection and control message delivery between smart meters and a local collector for AMI communications in a smart grid.

H.B. Mahmood - One of the best experts on this subject based on the ideXlab platform.

  • Transport layer Security Protocol in Telnet
    9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732), 2003
    Co-Authors: H.B. Mahmood
    Abstract:

    This paper discusses the implementation of transport layer Security Protocol (TLSP) in Telnet application. The purposes of this research are to find and to implement an algorithm Protocol that provides privacy and reliability between client and server before the connection establish and during the negotiation session in Telnet. A client server prototype system called SecTel is implemented that run on Windows Operating System.

Ye Yan - One of the best experts on this subject based on the ideXlab platform.

  • an efficient Security Protocol for advanced metering infrastructure in smart grid
    IEEE Network, 2013
    Co-Authors: Ye Yan, Hamid Sharif, Sajal K. Das, Rose Qingyang Hu, Yi Qian
    Abstract:

    In this article, we present a Security Protocol for advanced metering infrastructure in smart grid. We consider various Security vulnerabilities of deploying AMI, and explore the issues related to confidentiality for user privacy and behavior as well as message authentication for meter reading and control messages. After surveying the existing Security solutions in this area, we propose a new Protocol, Integrated Authentication and Confidentiality (IAC), to provide efficient secure AMI communications in smart grid. With the help of IAC, an AMI system can provide trust services, data privacy, and integrity by mutual authentications whenever a new smart meter initiates and joins the smart grid AMI network. Data integrity and confidentiality are fulfilled through message authentication and encryption services, using the corresponding keys established in mutual authentications. Simulation and analytical results show that the proposed IAC Protocol has better performance in terms of end-to-end delay and packet loss than a basic Security scheme. Additionally, it can also facilitate efficient secure data collection and control message delivery between smart meters and a local collector for AMI communications in a smart grid.

Rose Qingyang Hu - One of the best experts on this subject based on the ideXlab platform.

  • a Security Protocol for advanced metering infrastructure in smart grid
    Global Communications Conference, 2014
    Co-Authors: Feng Ye, Yi Qian, Rose Qingyang Hu
    Abstract:

    In this paper, we propose a Security Protocol for advanced metering infrastructure (AMI) in smart grid. AMI is one of the important components in smart grid and it suffers from various vulnerabilities due to its uniqueness compared with wired networks and traditional wireless mesh networks. Our proposed Security Protocol for AMI includes initial authentication, secure uplink data aggregation/recovery, and secure downlink data transmission. Compared with existing researches in such area, our proposed Security Protocol let the customers be treated fairly, the privacy of customers be protected, and the control messages from the service provider be delivered safely and timely.

  • an efficient Security Protocol for advanced metering infrastructure in smart grid
    IEEE Network, 2013
    Co-Authors: Ye Yan, Hamid Sharif, Sajal K. Das, Rose Qingyang Hu, Yi Qian
    Abstract:

    In this article, we present a Security Protocol for advanced metering infrastructure in smart grid. We consider various Security vulnerabilities of deploying AMI, and explore the issues related to confidentiality for user privacy and behavior as well as message authentication for meter reading and control messages. After surveying the existing Security solutions in this area, we propose a new Protocol, Integrated Authentication and Confidentiality (IAC), to provide efficient secure AMI communications in smart grid. With the help of IAC, an AMI system can provide trust services, data privacy, and integrity by mutual authentications whenever a new smart meter initiates and joins the smart grid AMI network. Data integrity and confidentiality are fulfilled through message authentication and encryption services, using the corresponding keys established in mutual authentications. Simulation and analytical results show that the proposed IAC Protocol has better performance in terms of end-to-end delay and packet loss than a basic Security scheme. Additionally, it can also facilitate efficient secure data collection and control message delivery between smart meters and a local collector for AMI communications in a smart grid.

Joshua D. Guttman - One of the best experts on this subject based on the ideXlab platform.

  • Strand Spaces: Why is a Security Protocol Correct?
    2016
    Co-Authors: F. Javier, Jonathan C. Herzog, Joshua D. Guttman
    Abstract:

    A strand is a sequence of events; it represents either the execution of legitimate party in a Security Protocol or else a sequence of actions by a penetrator. A strand space is a collection of strands, equipped with a graph structure gen-erated by causal interaction. In this framework, Protocol correctness claims may be expressed in terms of the con-nections between strands of different kinds. In this paper we develop the notion of a strand space. We then prove a generally useful lemma, as a sample re-sult giving a general bound on the abilities of the penetra-tor in any Protocol. We apply the strand space formalism to prove the correctness of the Needham-Schroeder-Lowe Protocol. Our approach gives a detailed view of the condi-tions under which the Protocol achieves authentication and protects the secrecy of the values exchanged. We also use our proof methods to explain why the original Needham-Schroeder Protocol fails. We believe that our approach is distinguished from other work on Protocol verification by the simplicity of the model and the ease of producing intelligible and reliable proofs of Protocol correctness even without automated support.

  • Security Protocol design via authentication tests
    IEEE Computer Security Foundations Symposium, 2002
    Co-Authors: Joshua D. Guttman
    Abstract:

    We describe a Protocol design process, and illustrate its use by creating ATSPECT, an authentication test-based secure Protocol for electronic commerce transactions. The design process is organized around the authentication tests, a method for Protocol verification based on the strand space theory. The authentication tests dictate how randomly generated values such as nonces may be combined with encryption to achieve authentication and freshness. ATSPECT offers functionality and Security guarantees akin to the purchase request, payment authorization, and payment capture phases of SET, the secure electronic transaction standard created by the major credit card firms.