Table of Contents Author Guidelines Submit a Manuscript
International Journal of Digital Multimedia Broadcasting
Volume 2011 (2011), Article ID 372020, 8 pages
http://dx.doi.org/10.1155/2011/372020
Review Article

Cyber Security for Smart Grid, Cryptography, and Privacy

Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, IL 60616-3793, USA

Received 1 December 2010; Revised 21 June 2011; Accepted 26 July 2011

Academic Editor: Pierangela Samarati

Copyright © 2011 Swapna Iyer. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [8 citations]

The following is the list of published articles that have cited the current article.

  • Young-Sam Kim, and Joon Heo, “Device authentication protocol for smart grid systems using homomorphic hash,” Journal of Communications and Networks, vol. 14, no. 6, pp. 606–613, 2012. View at Publisher · View at Google Scholar
  • Fadi Aloul, A. R. Al-Ali, Rami Al-Dalky, Mamoun Al-Mardini, and Wassim El-Hajj, “Smart Grid Security: Threats, Vulnerabilities and Solutions,” International Journal of Smart Grid and Clean Energy, pp. 1–6, 2012. View at Publisher · View at Google Scholar
  • Salman Habib, Muhammad Kamran, and Umar Rashid, “Impact analysis of vehicle-to-grid technology and charging strategies of electric vehicles on distribution networks – A review,” Journal of Power Sources, vol. 277, pp. 205–214, 2015. View at Publisher · View at Google Scholar
  • Mohamed M. E. A. Mahmoud, Jelena Misic, Kemal Akkaya, and Xuemin Shen, “Investigating Public-Key Certificate Revocation in Smart Grid,” IEEE Internet of Things Journal, vol. 2, no. 6, pp. 490–503, 2015. View at Publisher · View at Google Scholar
  • Nithya Chidambaram, Pethuru Raj, K. Thenmozhi, and Rengarajan Amirtharajan, “Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique,” International Journal of Digital Multimedia Broadcasting, vol. 2016, pp. 1–6, 2016. View at Publisher · View at Google Scholar
  • Neetesh Saxena, and Santiago Grijalva, “Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication,” IEEE Transactions on Industrial Informatics, vol. 13, no. 3, pp. 1482–1491, 2017. View at Publisher · View at Google Scholar
  • Biljana L. Risteska Stojkoska, and Kire V. Trivodaliev, “A review of Internet of Things for smart home: Challenges and solutions,” Journal of Cleaner Production, vol. 140, pp. 1454–1464, 2017. View at Publisher · View at Google Scholar
  • Niraj Kumar, Vishnu Mohan Mishra, and Adesh Kumar, “Smart grid security with AES hardware chip,” International Journal of Information Technology, 2018. View at Publisher · View at Google Scholar