References
- S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure," LNCS 6027, pp. 176-187, 2010.
- A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, iss. 1, pp. 99-107, 2010. https://doi.org/10.1109/TSG.2010.2046347
- B. Andrea, H. S. Juan, S. L. Miguel, D. Mischa, K. Apostolous, and B. Dominique, "Secure lossless aggregation for smart grid M2M networks," in Proc. 1st IEEE Int. Conf. Smart Grid Commun., 2010, pp. 333-338.
- H. Khurana, R. Bobba, T. Yardley, P. Agarwal, and E. Heine, "Design principle for power grid cyber-infrastructure authentication protocols," in Proc. HICSS, 2010, pp. 1-10.
- AMI-SEC Task Force, "Security profile for advanced metering infrastructure version 2.0," 2010.
- D. Wu and C. Zhou, "Fault-tolerant and scalable key management for smart grid," IEEE Trans. Smart Grid, vol. 2, iss. 2, pp. 375-381, 2011. https://doi.org/10.1109/TSG.2011.2120634
- Certicom white paper, "Critical infrastructure protection for AMI using a comprehensive security platform," Certicom, 2009.
- M. M. Fouda, Z. Md. Fadlullah, N. Kato, R. Lu, and X. Shen, "A lightweight message authentication scheme for smart grid communications," IEEE Trans. Smart Grid, vol.2, iss. 4, pp. 675-685, 2011. https://doi.org/10.1109/TSG.2011.2160661
- M. Kgwadi and T. Kunz, "Securing RDS broadcast messages for smart grid applications," Dept. Syst. Comput. Eng. Carleton Univ., Ottawa, Canada, Tech. Rep. SCE-09-06, 2009.
- A. Perrig, "The BiBa one-time signature and broadcast authentication protocol," in Proc. 8th ACM Conf. Comput. Commun. Security, 2001, pp. 28-37.
- D. L. G. Filho and P. S. L. M. Barreto, "Demonstrating data possession and uncheatable data transfer," IACR Cryptology ePrint Archive, Rep. 2006/150, 2006.
- M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in Proc. IEEE Symp. Security and Privacy, 2004, pp. 226-240.
- F. E. Oggier and A. Datta, "Self-repairing homomorphic codes for distributed storage systems," in Proc. 30th IEEE Int. Conf. Comput. Commun., 2010, pp. 1215-1223.
- R. Cramer and V. Shoup, "Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption," in Proc. Int. Conf. Theory and Applicat. Cryptographic Techniques: Adv. Cryptology, 2002, pp. 45-64.
- B. Hemenway and R. Ostrovsky, "Lossy trapdoor functions from smooth homomorphic hash proof system," ECCC, Rep. TR09-127, 2009.
- A. G. Hamilton, A First Course in Linear Algebra. Cambridge University Press, 1987.
- L. Reyzin and N. Reyzin, "Better than BiBa: Short one-time signatures with fast signing and verifying," in Proc. 7th Australian Conf. Inf. Security and Privacy, 2002, pp.144-153.
- M. Nabeel, J. Zage, S. Kerr, E. Bertino, N. A. Kulatunga, U. S. Navaratne, and M. Duren. (2012). Cryptographic key management for smart power grids, Technical report in perdue university. [Online]. Available: http://docs.lib.purdue.edu/cctech/2
- S. Iyer, "Cyber security for smart grid, cryptography, and privacy," Int. J. Digit. Multimedia Broadcast., vol. 2011, article ID. 372020, 2011.
- X. Lu,W.Wang, and J.Ma, "Authentication and integrity in the smart grid: An empirical study in substation automation systems," Int. J. Distributed Sensor Netw., Apr. 2012.
- Q. Li and G. Cao, "Multicast authentication in smart grid with one-time signature," IEEE Trans. Smart Grid, vol. 2, issue 4, pp. 686-696, 2011. https://doi.org/10.1109/TSG.2011.2138172
- Q. Wang, H. Khurana, Y. Huang, and K. Nahrstedt, "Time valid one-time signature for time-critical multicast data authentication," in Proc. IEEE INFOCOM, 2009, pp. 1233-1241.
- Certicom Research, "SEC2: Recommended elliptic curve domain parameters v1.0," 2000.