{"id":612,"date":"2017-10-17T09:52:45","date_gmt":"2017-10-17T08:52:45","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=612"},"modified":"2025-10-27T02:08:46","modified_gmt":"2025-10-27T02:08:46","slug":"efficient-and-secure-iot-based-protocol-for-the-smart-grid","status":"publish","type":"page","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=612","title":{"rendered":"Efficient and Secure IoT-based Protocol for the Smart Grid"},"content":{"rendered":"<p><strong>Overview<\/strong><br \/>\nSmart IoT devices, such as smart meters, which are supported by various industry vendors, will be interconnected through peer-to-peer connections to provide useful information in the smart grid system. However, incoming and outgoing information can be misused by the adversaries if a secure communication environment is not established. The adversary, which could be a malicious smart meter, can perform security attacks, such as man-in-the-middle, replay, and impersonation, in order to extract critical information about the system and its consumers.<\/p>\n<p>DDS supports scalability, performance, and QoS for IoT devices with peer-to-peer communications. It also provides secrecy, integrity, and nonrepudiation of data objects. However, it supports limited authentication and authorization capabilities with no access control and data privacy.<\/p>\n<p>The aim here is to come up with a secure and efficient publisher-subscriber model-based architecture for the smart grid, which improves the overall security by placing an additional security layer over DDS that supports authentication, authorization, access control, and data privacy with end-to-end encryption, scalability and efficiency.<\/p>\n<p><strong>Contacts<\/strong>: <a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/nsaxena\">Neetesh Saxena<\/a>, Nikos Ntemkas<\/p>\n<p><strong>Funders<\/strong>: Bournemouth University<\/p>\n<p><strong>Collaborators<\/strong>: Georgia Institute of Technology<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Smart IoT devices, such as smart meters, which are supported by various industry vendors, will be interconnected through peer-to-peer connections to provide useful information in the smart grid system. However, incoming and outgoing information can be misused by the adversaries if a secure communication environment is not established. The adversary, which could be a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":53,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-page.php","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/612"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=612"}],"version-history":[{"count":2,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/612\/revisions"}],"predecessor-version":[{"id":1047,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/612\/revisions\/1047"}],"up":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/53"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}