Attacks, vulnerabilities and security requirements in smart metering networks
A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility p...
| Main Authors: | Abdullah, Muhammad Daniel Hafiz, Mohd Hanapi, Zurina, Ahmad Zulkarnain, Zuriati, Mohamed, Mohamad Afendee |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Korean Society for Internet Information
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/43888/ http://psasir.upm.edu.my/id/eprint/43888/1/Attacks%2C%20vulnerabilities%20and%20security%20requirements%20in%20smart%20metering%20networks.pdf |
Similar Items
Detection of vulnerability attack through wireless network on android platform
by: Muhamad Izhan Fakri, Imran
Published: (2014)
by: Muhamad Izhan Fakri, Imran
Published: (2014)
IoT-based smart energy meter
by: Mohamad Azhar, Amley
Published: (2022)
by: Mohamad Azhar, Amley
Published: (2022)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment.
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
Implications of Smart Meter to Energy Competition
by: Lu, Chang Ling
Published: (2010)
by: Lu, Chang Ling
Published: (2010)
SMART METERING DEVICE FOR HVAC
SYSTEM
by: Maarof, M.I, et al.
Published: (2018)
by: Maarof, M.I, et al.
Published: (2018)
Vulnerability analysis on the network security by using Nessus
by: Hamid Ali, Firkhan Ali
Published: (2004)
by: Hamid Ali, Firkhan Ali
Published: (2004)
FuGeF: a resource bound secure forwarding protocol for wireless sensor networks
by: Umar, Idris Abubakar, et al.
Published: (2016)
by: Umar, Idris Abubakar, et al.
Published: (2016)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Efficient mutual authentication using kerberos for resource constraint smart meter in advanced metering infrastructure
by: Hasan, Md Mehedi, et al.
Published: (2023)
by: Hasan, Md Mehedi, et al.
Published: (2023)
An efficient IoT-based smart water meter system of smart city environment
by: Al-Madhrahi, R., et al.
Published: (2021)
by: Al-Madhrahi, R., et al.
Published: (2021)
Vehicle keyless entry system vulnerable to 'relay attacks'
by: Mohd Rashidi, Qirana Nabilla
Published: (2024)
by: Mohd Rashidi, Qirana Nabilla
Published: (2024)
Cyber-attack and reliability monitoring of the synchrophasor smart grid network
by: Yadav, Atul Kumar
Published: (2022)
by: Yadav, Atul Kumar
Published: (2022)
A review on wormhole attacks in MANET
by: Enshaei, Mehdi, et al.
Published: (2015)
by: Enshaei, Mehdi, et al.
Published: (2015)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
Smart meter-tnb dual tariff for domestic application
by: Nasyrah, Abdul Rahim
Published: (2012)
by: Nasyrah, Abdul Rahim
Published: (2012)
Wireless local area network: a comprehensive review of attacks and metrics
by: Sarvari, Samira, et al.
Published: (2017)
by: Sarvari, Samira, et al.
Published: (2017)
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021)
by: Arshad, Akashah, et al.
Published: (2021)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
A secure region-based geographic routing protocol routing protocol (SRBR) for wireless sensor networks
by: Adnan, Ali Idarous, et al.
Published: (2017)
by: Adnan, Ali Idarous, et al.
Published: (2017)
LIKA: lightweight identity based key agreement protocol for secure data transmission in advanced metering infrastructure of smart grid
by: Hasan, Md Mehedi, et al.
Published: (2022)
by: Hasan, Md Mehedi, et al.
Published: (2022)
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
Applying packet generator for secure network environment
by: Abdul Wahid, Mohammed N., et al.
Published: (2011)
by: Abdul Wahid, Mohammed N., et al.
Published: (2011)
An ingenious multiple communicator concept for next generation smart metering communication system
by: Hashim, Wahidah, et al.
Published: (2016)
by: Hashim, Wahidah, et al.
Published: (2016)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
A new compression algorithm for small data communication in wireless sensor network
by: Tuama, Ammar Yaseen, et al.
Published: (2017)
by: Tuama, Ammar Yaseen, et al.
Published: (2017)
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Strategy for implementation of Smart Meters in the UK market- a proposal for E.ON
by: Seal, Devakalpa
Published: (2009)
by: Seal, Devakalpa
Published: (2009)
Dynamic communication for smart metering: leading edge for sustainable energy and PHEV
by: Islam, Syed Zahurul, et al.
Published: (2013)
by: Islam, Syed Zahurul, et al.
Published: (2013)
Development of power factor meter using Arduino
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
Efficient secure routing mechanisms for the low-powered IoT network: a literature review
by: Hussain, Muhammad Zunnurain, et al.
Published: (2023)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2023)
Self awareness before social networking: exploring the user behavior and information security vulnerability in Malaysia
by: Hussin, Husnayati, et al.
Published: (2010)
by: Hussin, Husnayati, et al.
Published: (2010)
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
by: Nokhanji, Nooshin, et al.
Published: (2014)
by: Nokhanji, Nooshin, et al.
Published: (2014)
Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries
by: Rahmand, Pedram, et al.
Published: (2010)
by: Rahmand, Pedram, et al.
Published: (2010)
Similar Items
-
Detection of vulnerability attack through wireless network on android platform
by: Muhamad Izhan Fakri, Imran
Published: (2014) -
IoT-based smart energy meter
by: Mohamad Azhar, Amley
Published: (2022) -
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020) -
Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment.
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009) -
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol
by: Mohd Hanapi, Zurina, et al.
Published: (2014)