8 results on '"Imen Aouini"'
Search Results
2. Improvements to the Smart Energy Profile security.
- Author
-
Imen Aouini, Lamia Ben Azzouz, Mohammed Jebali, and Leïla Azouz Saïdane
- Published
- 2017
- Full Text
- View/download PDF
3. A secure Neighborhood Area Network using IPsec.
- Author
-
Imen Aouini, Lamia Ben Azzouz, and Leïla Azouz Saïdane
- Published
- 2016
- Full Text
- View/download PDF
4. A lightweight IPsec-based energy home area networks.
- Author
-
Lamia Ben Azzouz and Imen Aouini
- Published
- 2019
- Full Text
- View/download PDF
5. Improvements to the Smart Energy Profile security
- Author
-
Leila Azzouz Saidane, Mohammed Jebali, Imen Aouini, and Lamia Ben Azzouz
- Subjects
Spoofing attack ,Computer science ,Smart meter ,020208 electrical & electronic engineering ,Latency (audio) ,020206 networking & telecommunications ,02 engineering and technology ,Grid ,Computer security ,computer.software_genre ,Smart grid ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,computer ,Energy (signal processing) - Abstract
The smart grid, new generation of the electric grid, aims to improve the energy production, delivery and customer usages. To reach this goal, smart devices, smart meters, etc. must exchange information with the control center in a bidirectional way. The Home Area Network (HAN) manages communications among the smart meter and smart devices inside the home. The ZigBee Alliance developed a profile for the energy HAN called the ZigBee Smart Energy Profile (SEP). While the HAN is vulnerable to several types of attacks (eavesdropping, spoofing, DoS, etc.), SEP defined security mechanisms to join the network and to protect the traffic. In this paper, we identify vulnerabilities of SEP security mechanisms and we propose improvements to the SEP join process and key refreshment. We conducted simulations to evaluate the latency for energy real time applications while using SEP and the success rate for SEP and the enhanced SEP.
- Published
- 2017
- Full Text
- View/download PDF
6. Using IPsec to secure multicast smart energy traffic
- Author
-
Leila Azzouz Saidane, Imen Aouini, and Lamia Ben Azzouz
- Subjects
Engineering ,Secure multicast ,Spoofing attack ,Multicast ,business.industry ,computer.internet_protocol ,Smart meter ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Grid ,Electrical grid ,Smart grid ,IPsec ,business ,computer ,Computer network - Abstract
The smart grid is an intelligent electrical grid that aims to manage the electricity production, distribution and consumption. One of the Smart Grid key technologies is to integrate a two-way communication between a utility company and its customers. Hence, the Smart Grid covers several networks to exchange data among intelligent devices (Smart Meter for example) and systems (the control center). The Neighborhood Area Network (NAN) relays customer's data from smart meters to the control center. Furthermore, it can relay a multicast traffic from the control center (energy prices, outage notifications, etc.) to a group of smart meters. Several types of attacks (eavesdropping, spoofing, replay, etc.) can be performed against the NAN multicast traffic and lead to an instability of the electronic grid. Hence, security solutions must be envisaged to counter those attacks. In this paper, we propose a security solution based on the IPsec protocol to prevent most of the threats on the NAN multicast traffic.
- Published
- 2016
- Full Text
- View/download PDF
7. Smart Grids Cyber Security Issues And Challenges
- Author
-
Imen Aouini and Azzouz, Lamia Ben
- Subjects
home area network ,smart meters ,Smart grids ,neighbor area network - Abstract
The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future., {"references":["Z. Qiqi, S. Gang, L. Puming, Smart City Grid: The Start to Develop\nSmart Grid, International Conference on E-Product E-Service and EEntertainment\n(ICEEE), pp.1-4, 2010.","IEEE Standards Coordinating Committee, 'IEEE Guide for Smart Grid\nInteroperability of Energy Technology and Information Technology\nOperation with the Electric Power System (EPS), End-Use Applications,\nand Loads' 2011.","C. Selvam, K. Srinivas, G. S.Ayyappan, M. V.Sarma, Advanced\nMetering Infrastructure for Smart Grid Application, International\nConference on Recent Trends In Information Technology (ICRTIT),\npp.19-21, 2012","Y. Yan, Y. Qian, H. Sharif and D. Tipper, A Survey on Smart Grid\ncommunication Infrastructures: Motivations, Requirements and\nchallenges, IEEE Communications surveys & tutorials, Vol.15, No.1,\npp.5-20, 2013.","Guizani, M., Anan, M., Smart grid opportunities and challenges of\nintegrating renewable sources: A survey, International Wireless\nCommunications and Mobile Computing Conference (IWCMC), pp-\n1098-1105, 2014.","B. H. Chowdhury, C. Tseng, Distributed Energy Resources: Issues and\nChallenges, Journal of Energy Engineering, Special Issue: Distributed\nEnergy Resources-Potentials for the Electric Power Industry, pp.109-\n110, 2007.","IEEE Std 2030, 'IEEE Guide for Smart Grid Interoperability of Energy\nTechnology and Information Technology Operation with the Electric\nPower System (EPS), End-Use Applications, and Loads', 2011.","J. Dickert, M. Hable, P. Schegner, Energy Loss Estimation in\nDistribution Networks for Planning Purposes, International Conference\non Bucharest PowerTech, pp.1-6, 2009.","Binod Vaidya, Dimitrios Makrakis, Hussein Mouftah, Secure Multipath\nRouting for AMI Network in Smart Grid, IEEE 31st International\nPerformance Computing and Communications Conference (IPCCC),\npp.408 - 415, 2012.\n[10] B. P anajotovic, M. Jankovic, B. Odadzic, ICT and Smart Grid, 10th\nInternational Conference on Telecommunication in Modern Satellite\nCable and Broadcasting Services (TELSIKS), pp.118-121, 2011.\n[11] D. J. Dolezilek, S.Schweitzer, Practical Applications of Smart Grid\nTechnologies, Published By Schweitzer Engineering Laboratories, Inc.\n(SEL), 2009.\n[12] C. Bennett, D. Highfill, Networking AMI Smart Meters, IEEE Energy\n2030 Conference, pp.1-8, 2008.\n[13] Yifeng He, Mohammad Shams Yazdi, Differentiated service for Smart\nGrid neighbourhood area networks via optimal resource allocation,\nInternational Journal of Sensors and Sensor Networks; pages: 55-60;\n2013.\n[14] Kenneth C. Budka Jayant G. Deshpande Marina Thottan,\nCommunication Networks for Smart Grids Making Smart Grid Real,\nComputer Communications and Networks, Springer,pp.1-377, 2014.\n[15] NIST Special Publication 1108 NIST, Framework and Roadmap for\nSmart Grid Interoperability Standards, Release 1.0, 2010.\n[16] CEN-CENELEC-ETSI Smart Grid Coordination Group, CENCENELEC-\nETSI Smart Grid Coordination Group – Sustainable\nProcesses, 2012.\n[17] J. O. Petinrin, Mohamed Shaaban, Smart Power Grid: Technologies and\nApplications, IEEE International Conference on Power and Energy\n(PECon), pp.892 - 897, 2012.\n[18] NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 1, Smart\nGrid Cyber Security Strategy, Architecture, and High-Level\nRequirements, The Smart Grid Interoperability Panel – Cyber Security\nWorking Group; 2010.\n[19] Fad iAloula, A. R. Al-Alia, Rami Al-Dalkya, Mamoun Al-\nMardinia,Wassim El-Hajj, Smart Grid Security: Threats, Vulnerabilities\nand Solutions, International Journal of Smart Grid and Clean Energy;\nvol. 1 No.1, 2012.\n[20] Wenye Wang, Zhuo Lu, Cyber security in the Smart Grid: Survey and\nchallenges, In Computer Networks, vol.57 no.2013, pp.1344–1371;\n2013.\n[21] Xinxin Fan and Guang Gong, Security Challenges in Smart-Grid\nMetering and Control Systems, Technology Innovation Management\nReview; pp.42-49, 2013.\n[22] C. Efthymiou and G. Kalogridis, Smart Grid Privacy via Anonymization\nof SmartMetering Data, First IEEE International Conference on Smart\nGrid Communications (SmartGridComm), pp. 238-243, 2010. [23] L. Sankar, S. Raj Rajagopalan, S. Mohajer, H. Vincent Poor, Smart\nMeter Privacy: A Theoretical Framework, IEEE Transactions on Smart\nGrid, vol.4, No.2, pp.837-846, 2013.\n[24] X. Li, X. Liang, R. Lu, X. Shen, X. Lin, and H. Zhu, \"Securing smart\ngrid: Cyber attacks, countermeasures, and challenges,\" IEEE Commun.\nMag., vol. 50, no. August, pp. 38–45, 2012.\n[25] K. Sophia, Sekercioglu, Y. Ahmet, Security and smart metering,\nEW.18th European Wireless Conference,pp.1-8, 2012.\n[26] L. Wallgren, S. Raza, and T. Voigt, Routing Attacks and\nCountermeasures in the RPL-Based Internet of Things, International\nJournal of Distributed Sensor Networks Vol.2013, 2013.\n[27] William G. Temple, Binbin Chen, Nils Ole Tippenhauer, Delay Makes a\nDifference: Smart Grid Resilience Under Remote Meter Disconnect\nAttack, IEEE International Conference on Smart Grid Communications\n(SmartGridComm), pp.462-467, 2013.\n[28] E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, and C. Assi,\nCommunication Security for Smart Grid Distribution Networks, IEEE\nCommunications Magazine, vol.51 No.1, pp. 42-49; 2013.\n[29] Jing Liu and Yang Xiao, Shuhui Li, Wei Liang, C. L. Philip Chen,\nCyber Security and Privacy Issues in Smart Grids, IEEE\ncommunications surveys and tutorials, vol. 14, no. 4, 981- 997, 2012.\n[30] Zubair A. Baig and Abdul-Raoof Amoudi, An Analysis of Smart Grid\nAttacks and Countermeasures, Journal of Communications Vol. 8, No. 8,\npp.473-479, 2013.\n[31] Aditya Ashok, Adam Hahn, Manimaran Govindarasu, Cyber-physical\nsecurity of Wide-Area Monitoring, Protection and Control in a Smart\nGrid environment, Journal of Advanced Research; Vol.15, No.4, pp.\n481-489, 2014.\n[32] Electric Power Research Institute (EPRI), Wide Area Monitoring,\nProtection, and Control Systems (WAMPAC), Standards for Cyber\nSecurity Requirements DRAFT, 2012.\n[33] B. S ingh, N. K. Sharma, A. N. Tiwari, K. S. Verma, S. N. Singh\n\"Applications of phasor measurement units (PMUs) in electric power\nsystem networks incorporated with FACTS controllers\" International\nJournal of Engineering, Science and Technology Vol. 3, No. 3, pp. 64-\n82, 2011.\n[34] Castellani, A. P, Ministeri, G.; Rotoloni, M.; Vangelista, L.\nInteroperable and globally interconnected Smart Grid using IPv6 and\n6LoWPAN, IEEE International Conference on Communications (ICC),\npp.6473-6478, 2012\n[35] Cisco and its affiliates; Cisco Connected Grid Security for Field Area\nNetwork; (Online). Available:\nhttp://www.cisco.com/web/strategy/docs/energy/C11-696279-\n00_cgs_fan_white_paper.pdf, 2012."]}
- Published
- 2015
- Full Text
- View/download PDF
8. Towards an IPsec security GeoNet architecture
- Author
-
Nesrine Ayed Sahloul, Imen Aouini, and Lamia Benazzouz
- Subjects
Vehicular ad hoc network ,Standardization ,computer.internet_protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Computer security ,computer.software_genre ,IPv6 ,Protocol stack ,IPsec ,The Internet ,Routing (electronic design automation) ,business ,computer ,Protocol (object-oriented programming) ,Computer network - Abstract
In order to connect Vehicle Ad-hoc NETworks (VANETs) to the Internet, most of manufactures car consortia and standardization bodies (IEEE 1609, CALM, C2C-CC, and ETSI TC ITS) proposed IPv6 protocol in the VANET protocol stack. The European GeoNet project was founded to investigate how GeoNetworking and IPv6 can be combined together. The GeoNetworking provides geographic address and routing for vehicular communications. In this paper, we identify attacks that can be performed on mechanisms and protocols necessary to run IPv6 over the GeoNetworking layer and propose a secure GeoNet architecture based on the IPsec protocol to prevent most of the threats.
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.