메뉴 건너뛰기




Volumn 8, Issue 6, 2015, Pages 1026-1039

Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid

Author keywords

Availability; Group communication; SCADA; Security; Smart grid

Indexed keywords

AVAILABILITY; DATA ACQUISITION; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; ELECTRIC POWER TRANSMISSION NETWORKS; SMART POWER GRIDS;

EID: 84924712095     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1057     Document Type: Article
Times cited : (29)

References (37)
  • 1
    • 85059107580 scopus 로고    scopus 로고
    • Cyber security in the smart grid: survey and challenges
    • Wang W, Lu Z. Cyber security in the smart grid: survey and challenges. Computer Networks 2013; 7(8): 1754-1773.
    • (2013) Computer Networks , vol.7 , Issue.8 , pp. 1754-1773
    • Wang, W.1    Lu, Z.2
  • 2
    • 84924718440 scopus 로고    scopus 로고
    • Northeast blackout of 2003.[Accessed on 1 March 2013].
    • Northeast blackout of 2003. http://en.wikipedia.org/wiki/Northeast_blackout_of_2003 [Accessed on 1 March 2013].
  • 3
    • 84924718439 scopus 로고    scopus 로고
    • India blackouts,[Accessed on 1 March 2013].
    • India blackouts, 2012. http://en.wikipedia.org/wiki/India_blackout [Accessed on 1 March 2013].
    • (2012)
  • 4
    • 84864583229 scopus 로고    scopus 로고
    • PPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications
    • Lu R, Liang X, Li X, Lin X, Shen X. PPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9): 1621-1631.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.9 , pp. 1621-1631
    • Lu, R.1    Liang, X.2    Li, X.3    Lin, X.4    Shen, X.5
  • 5
    • 84864865604 scopus 로고    scopus 로고
    • Securing smart grid: cyber attacks, countermeasures, and challenges
    • Li X, Liang X, Lu R, Shen X, Lin X, Zhu H. Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine 2012; 50(8): 38-45.
    • (2012) IEEE Communications Magazine , vol.50 , Issue.8 , pp. 38-45
    • Li, X.1    Liang, X.2    Lu, R.3    Shen, X.4    Lin, X.5    Zhu, H.6
  • 10
    • 17744384943 scopus 로고    scopus 로고
    • Technical Report, Cryptog. Information Sys. Security Dept., Sandia Nat, Labs SAND2001-3252.
    • Beaver C, Gallup D, Neumann W, Torgerson M. Key management for SCADA. Technical Report, Cryptog. Information Sys. Security Dept., Sandia Nat, 2002. Labs SAND2001-3252.
    • (2002) Key management for SCADA
    • Beaver, C.1    Gallup, D.2    Neumann, W.3    Torgerson, M.4
  • 14
    • 84924718209 scopus 로고    scopus 로고
    • A DNP3 protocol primer, DNP User Group.
    • Curtis K. A DNP3 protocol primer, 2005. DNP User Group.
    • (2005)
    • Curtis, K.1
  • 15
    • 84873743210 scopus 로고    scopus 로고
    • A survey on smart grid communication infrastructures: motivations, requirements and challenges
    • Yan Y, Qian Y, Sharif H, Tipper D. A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Communications Surveys & Tutorials 2013; 15(1): 5-20.
    • (2013) IEEE Communications Surveys & Tutorials , vol.15 , Issue.1 , pp. 5-20
    • Yan, Y.1    Qian, Y.2    Sharif, H.3    Tipper, D.4
  • 16
    • 59649092949 scopus 로고    scopus 로고
    • A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: the key management study
    • Rong B, Chen HH, Qian Y, Lu K, Hu RQ, Guizani S. A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: the key management study. IEEE Transactions on Vehicular Technology 2009; 58(1): 398-408.
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.1 , pp. 398-408
    • Rong, B.1    Chen, H.H.2    Qian, Y.3    Lu, K.4    Hu, R.Q.5    Guizani, S.6
  • 18
    • 0035504627 scopus 로고    scopus 로고
    • An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
    • Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory 2001; 47(7): 2824-2834.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.7 , pp. 2824-2834
    • Poovendran, R.1    Baras, J.S.2
  • 19
    • 36849083584 scopus 로고    scopus 로고
    • A design for secure and survivable wireless sensor networks
    • Qian Y, Lu K, Tipper D. A design for secure and survivable wireless sensor networks. IEEE Wireless Communications 2007; 14(5): 30-37.
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 30-37
    • Qian, Y.1    Lu, K.2    Tipper, D.3
  • 20
    • 39749159073 scopus 로고    scopus 로고
    • A framework for a distributed key management scheme in heterogeneous wireless sensor networks
    • Lu K, Qian Y, Guizani M, Chen HH. A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Transactions on Wireless Communications 2008; 7(2): 639-647.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.2 , pp. 639-647
    • Lu, K.1    Qian, Y.2    Guizani, M.3    Chen, H.H.4
  • 21
    • 84883327674 scopus 로고    scopus 로고
    • HRKT: hierarchical route key tree based group key management for wireless sensor networks
    • Jiang R, Luo J, Wang X. HRKT: hierarchical route key tree based group key management for wireless sensor networks. KSII Transaction on Internet and Information Systems 2013; 7(8): 1754-1773.
    • (2013) KSII Transaction on Internet and Information Systems , vol.7 , Issue.8 , pp. 1754-1773
    • Jiang, R.1    Luo, J.2    Wang, X.3
  • 23
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key-management architecture for secure SCADA communications
    • Choi D, Kim H, Won D, Kim S. Advanced key-management architecture for secure SCADA communications. IEEE Transactions on Power Delivery 2009; 24(3): 1154-1163.
    • (2009) IEEE Transactions on Power Delivery , vol.24 , Issue.3 , pp. 1154-1163
    • Choi, D.1    Kim, H.2    Won, D.3    Kim, S.4
  • 24
    • 84924697372 scopus 로고    scopus 로고
    • Robust group key management with revocation and collusion resistance for SCADA in smart grid, IEEE Globe Communication Conference, Atlanta, GA
    • Jiang R, Lu R, Lai C, J Luo, Shen X. Robust group key management with revocation and collusion resistance for SCADA in smart grid, IEEE Globe Communication Conference, Atlanta, GA, 2013; 824-829.
    • (2013) , pp. 824-829
    • Jiang, R.1    Lu, R.2    Lai, C.3    Luo, J.4    Shen, X.5
  • 25
    • 0036086453 scopus 로고    scopus 로고
    • Self-healing key distribution with revocation, IEEE Symposium on Security and Privacy, Berkeley, California
    • Staddon J, Miner S, Franklin M, Balfanz D, Malkin M, Dean D. Self-healing key distribution with revocation, IEEE Symposium on Security and Privacy, Berkeley, California, 2002; 241-257.
    • (2002) , pp. 241-257
    • Staddon, J.1    Miner, S.2    Franklin, M.3    Balfanz, D.4    Malkin, M.5    Dean, D.6
  • 27
    • 27644512043 scopus 로고    scopus 로고
    • An efficient key distribution scheme with self-healing property
    • Hong D, Kang JS. An efficient key distribution scheme with self-healing property. IEEE Communications Letters 2005; 9(8): 759-761.
    • (2005) IEEE Communications Letters , vol.9 , Issue.8 , pp. 759-761
    • Hong, D.1    Kang, J.S.2
  • 28
    • 33750008721 scopus 로고    scopus 로고
    • Self-healing group key distribution with time-limited node revocation for wireless sensor networks
    • Jiang Y, Lin C, Shi M, Shen X. Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 2007; 5(1): 14-23.
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 14-23
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 29
    • 84924718208 scopus 로고    scopus 로고
    • Improved self-healing key distribution with revocation in wireless sensor network, IEEE WCNC, Kowloon
    • Dutta R, Mukhopadhyay S. Improved self-healing key distribution with revocation in wireless sensor network, IEEE WCNC, Kowloon, 2007; 2963-2968.
    • (2007) , pp. 2963-2968
    • Dutta, R.1    Mukhopadhyay, S.2
  • 30
    • 77950023367 scopus 로고    scopus 로고
    • Computationally secure self-healing key distribution with revocation in wireless ad hoc networks
    • Dutta R, Mukhopadhyay S, Collier M. Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Networks 2010; 8(6): 597-613.
    • (2010) Ad Hoc Networks , vol.8 , Issue.6 , pp. 597-613
    • Dutta, R.1    Mukhopadhyay, S.2    Collier, M.3
  • 32
    • 70350656119 scopus 로고    scopus 로고
    • Improved constant storage self-healing key distribution with revocation in wireless sensor network, Information Security Applications, Jeju Island, Korea
    • Xu Q, He M. Improved constant storage self-healing key distribution with revocation in wireless sensor network, Information Security Applications, Jeju Island, Korea, 2009; 41-55.
    • (2009) , pp. 41-55
    • Xu, Q.1    He, M.2
  • 33
    • 76549121404 scopus 로고    scopus 로고
    • Computationally secure hierarchical self-healing key distribution for heterogeneous wireless sensor networks, Information and Communications Security, Beijing, China
    • Yang Y, Zhou J, Deng R, Bao F. Computationally secure hierarchical self-healing key distribution for heterogeneous wireless sensor networks, Information and Communications Security, Beijing, China, 2009; 135-149.
    • (2009) , pp. 135-149
    • Yang, Y.1    Zhou, J.2    Deng, R.3    Bao, F.4
  • 34
    • 67149113523 scopus 로고    scopus 로고
    • Anti-collusive self-healing key distribution scheme with revocation capability
    • Du C, Hu M, Zhang H, Zhang W. Anti-collusive self-healing key distribution scheme with revocation capability. Information Technology Journal 2009; 8(4): 619-624.
    • (2009) Information Technology Journal , vol.8 , Issue.4 , pp. 619-624
    • Du, C.1    Hu, M.2    Zhang, H.3    Zhang, W.4
  • 35
    • 84859411773 scopus 로고    scopus 로고
    • A group key distribution scheme with verification and revocation
    • Wen M, Liu X, Li J, Wang Y. A group key distribution scheme with verification and revocation. Journal of Shanghai Jiaotong University 2012; 46(2): 12-17.
    • (2012) Journal of Shanghai Jiaotong University , vol.46 , Issue.2 , pp. 12-17
    • Wen, M.1    Liu, X.2    Li, J.3    Wang, Y.4
  • 36
    • 80052113604 scopus 로고    scopus 로고
    • Proposal strategies of key management for data encryption in SCADA network of electric power systems
    • Kang D, Lee J, Kim B, Hur D. Proposal strategies of key management for data encryption in SCADA network of electric power systems. International Journal of Electrical Power & Energy Systems 2011; 33(9): 1521-1526.
    • (2011) International Journal of Electrical Power & Energy Systems , vol.33 , Issue.9 , pp. 1521-1526
    • Kang, D.1    Lee, J.2    Kim, B.3    Hur, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.