↓ Skip to main content

ICT Systems Security and Privacy Protection

Overview of attention for book
Cover of 'ICT Systems Security and Privacy Protection'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Coercion-Resistant Proxy Voting
  3. Altmetric Badge
    Chapter 2 A Posteriori Openable Public Key Encryption
  4. Altmetric Badge
    Chapter 3 Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid
  5. Altmetric Badge
    Chapter 4 Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research
  6. Altmetric Badge
    Chapter 5 Evaluating CVSS Base Score Using Vulnerability Rewards Programs
  7. Altmetric Badge
    Chapter 6 Defining Objectives for Preventing Cyberstalking
  8. Altmetric Badge
    Chapter 7 Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
  9. Altmetric Badge
    Chapter 8 Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
  10. Altmetric Badge
    Chapter 9 Software Defined Networking Reactive Stateful Firewall
  11. Altmetric Badge
    Chapter 10 Teaching Phishing-Security: Which Way is Best?
  12. Altmetric Badge
    Chapter 11 On Gender Specific Perception of Data Sharing in Japan
  13. Altmetric Badge
    Chapter 12 TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
  14. Altmetric Badge
    Chapter 13 SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks
  15. Altmetric Badge
    Chapter 14 Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence
  16. Altmetric Badge
    Chapter 15 Automated Source Code Instrumentation for Verifying Potential Vulnerabilities
  17. Altmetric Badge
    Chapter 16 An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities
  18. Altmetric Badge
    Chapter 17 XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners
  19. Altmetric Badge
    Chapter 18 ICT Systems Security and Privacy Protection
  20. Altmetric Badge
    Chapter 19 Advanced Remote Firmware Upgrades Using TPM 2.0
  21. Altmetric Badge
    Chapter 20 RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
  22. Altmetric Badge
    Chapter 21 Uncertain? No, It’s Very Certain!
  23. Altmetric Badge
    Chapter 22 ICT Systems Security and Privacy Protection
  24. Altmetric Badge
    Chapter 23 ICT Systems Security and Privacy Protection
  25. Altmetric Badge
    Chapter 24 ICT Systems Security and Privacy Protection
  26. Altmetric Badge
    Chapter 25 ICT Systems Security and Privacy Protection
  27. Altmetric Badge
    Chapter 26 ICT Systems Security and Privacy Protection
  28. Altmetric Badge
    Chapter 27 ICT Systems Security and Privacy Protection
Attention for Chapter 3: Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
12 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid
Chapter number 3
Book title
ICT Systems Security and Privacy Protection
Published in
IFIP advances in information and communication technology, May 2016
DOI 10.1007/978-3-319-33630-5_3
Pubmed ID
Book ISBNs
978-3-31-933629-9, 978-3-31-933630-5
Authors

Sérgio Câmara, Dhananjay Anand, Victoria Pillitteri, Luiz Carmo

Abstract

Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 12 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 12 100%

Demographic breakdown

Readers by professional status Count As %
Other 2 17%
Student > Bachelor 2 17%
Student > Doctoral Student 1 8%
Lecturer 1 8%
Student > Ph. D. Student 1 8%
Other 2 17%
Unknown 3 25%
Readers by discipline Count As %
Computer Science 5 42%
Engineering 2 17%
Energy 1 8%
Unknown 4 33%