Richard Hernandez, Oscar G Bautista, Mohammad Hossein Manshaei, Abdulhadi Sahin, Kemal Akkaya
Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC Proceedings Article
In: 2023 IEEE 48th Conference on Local Computer Networks (LCN), pp. 1–4, IEEE, 2023.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC},
author = {Richard Hernandez and Oscar G Bautista and Mohammad Hossein Manshaei and Abdulhadi Sahin and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/10223365/},
year = {2023},
date = {2023-10-02},
booktitle = {2023 IEEE 48th Conference on Local Computer Networks (LCN)},
pages = {1–4},
publisher = {IEEE},
school = {Florida International University},
abstract = {While Federated Learning (FL) enables training by only sharing model updates rather than data, FL can still be prone to privacy leaks. Therefore, many efforts have been made to adopt homomorphic encryption or differential privacy approaches to prevent this. However, these solutions come with several issues that may limit their widespread adoption in applications that involve sensitive data sitting in silos. Such issues include but are not limited to trust in the aggregation server, the accuracy of the model, potential collusion among clients, and limited aggregation function support. To address these issues, we advocate using secure Multiparty Computation (MPC) to offer privacy-preserving computation. Specifically, we propose an FL framework that enables outsourcing the model aggregation to MPC parties on untrusted cloud environments and offers correctness verification to the model owners. Unlike differential},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Yacoub Hanna, Diana Pineda, Kemal Akkaya, Abdullah Aydeger, Ricardo Harrilal-Parchment, Hamdah Albalawi
Performance Evaluation of Secure and Privacy-preserving DNS at the 5G Edge Proceedings Article
In: 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems (MASS), pp. 89–97, IEEE, 2023.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Performance Evaluation of Secure and Privacy-preserving DNS at the 5G Edge},
author = {Yacoub Hanna and Diana Pineda and Kemal Akkaya and Abdullah Aydeger and Ricardo Harrilal-Parchment and Hamdah Albalawi},
url = {https://ieeexplore.ieee.org/abstract/document/10298330/},
year = {2023},
date = {2023-09-25},
booktitle = {2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems (MASS)},
pages = {89–97},
publisher = {IEEE},
school = {Florida International University},
abstract = {With the improved network performance and efficiency, 5G has been a very appealing alternative for various applications and devices, including but not limited to Industrial IoT (IIoT) applications. However, since IIoT applications require real-time transmission guarantees for time-critical data, optimizing the 5G network performance has attracted much research recently by pushing critical services to the 5G edge. One of such services is Domain Name System (DNS) which is typically offered by ISPs to serve 5G networks. However, due to its heavy role on Internet traffic, DNS has seen many attacks in the past in terms of its authenticity of records and exposure of user requests. Therefore, there have been many variants of DNS protocol such as DNSSEC and DNS over TLS (DoT) to address these security and privacy issues. As such these new protocols need to be integrated into 5G edge and their overhead should be},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Ahmed Bakr, Mahmoud Srewa, Eyuphan Bulut, Kemal Akkaya, Mizanur Rahman, Ahmad Alsharif
Privacy-Preserving V2V Charge Sharing Coordination using the Hungarian Algorithm Proceedings Article
In: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), pp. 1–6, IEEE, 2023.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Privacy-Preserving V2V Charge Sharing Coordination using the Hungarian Algorithm},
author = {Ahmed Bakr and Mahmoud Srewa and Eyuphan Bulut and Kemal Akkaya and Mizanur Rahman and Ahmad Alsharif},
url = {https://ieeexplore.ieee.org/abstract/document/10199243/},
year = {2023},
date = {2023-06-20},
booktitle = {2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring)},
pages = {1–6},
publisher = {IEEE},
school = {Florida International University},
abstract = {Electric Vehicles (EVs) are being widely adopted as a green alternative to fossil-based vehicles. However, the current charging infrastructure for EVs is inadequate to meet the growing charge demand. Vehicle-to-Vehicle (V2V) charging offers a promising solution that enables a charge supplier EV to provide charging services to a charge demander EV in a distributed manner. Nevertheless, V2V matching and charge scheduling can disclose sensitive location information about the drivers, such as their whereabouts and driving patterns. In this paper, we propose a privacy-preserving scheme for centralized optimal matching of demander EVs with supplier EVs, while protecting their sensitive information. In our scheme, charge demanders report to a matching server their encrypted location information and the requested energy quantities, whereas charge suppliers report encrypted charge costs such that the matching},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Yacoub Hanna, Mumin Cebe, Suat Mercan, Kemal Akkaya
Efficient Group-Key Management for Low-bandwidth Smart Grid Networks Proceedings Article
In: 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 188–193, IEEE, 2021.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Efficient Group-Key Management for Low-bandwidth Smart Grid Networks},
author = {Yacoub Hanna and Mumin Cebe and Suat Mercan and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/9631988/},
year = {2021},
date = {2021-10-25},
booktitle = {2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)},
pages = {188–193},
publisher = {IEEE},
school = {Florida International University},
abstract = {As Smart Grid comes with new smart devices and additional data collection for improved control decisions, this puts a lot of burden on the underlying legacy communication infrastructures that may be severely limited in bandwidth. Therefore, an alternative is to consider publish-subscribe architectures for not only enabling flexible communication options but also exploiting multicasting capabilities to reduce the number of data messages transmitted. However, this capability needs to be complemented by a communication-efficient group key management scheme that will ensure security of multicast messages in terms of confidentiality, integrity and authentication. In this paper, we propose a group-key generation and renewal mechanism that minimizes the number of messages while still following the Diffie-Hellman (DH) Key exchange. Specifically, the Control Center (CC) utilizes Shamir's secret key sharing scheme},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Mumin Cebe, Kemal Akkaya
A bandwidth-efficient secure authentication module for smart grid DNP3 protocol Proceedings Article
In: 2020 Resilience Week (RWS), pp. 160–166, IEEE, 2020.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {A bandwidth-efficient secure authentication module for smart grid DNP3 protocol},
author = {Mumin Cebe and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/9241294/},
year = {2020},
date = {2020-10-19},
booktitle = {2020 Resilience Week (RWS)},
pages = {160–166},
publisher = {IEEE},
school = {Florida International University},
abstract = {DNP3 is one of the oldest and widely used communication protocols for smart power grid, which has been upgraded to DNP3 Secure Authentication (SA) to address the increasing security needs of power grid applications. However, in practice, such upgrade was only deployed for critical operations due to its major overhead while non-critical operations are still not protected. Nevertheless, with the ongoing transformations in power grid, the underlying infrastructure is no longer isolated and needs to support a wide variety of applications. Consequently, this transformation requires applying DNP3-SA for all operations, whether they are critical or not. This requirement creates additional challenges since it will reduce network bandwidth availability by causing additional overhead on communication links especially if the underlying infrastructure is legacy. Therefore, in this paper, we propose a revision for DNP3-SA},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Mumin Cebe, Kemal Akkaya
A replay attack-resistant 0-rtt key management scheme for low-bandwidth smart grid communications Proceedings Article
In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6, IEEE, 2019.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {A replay attack-resistant 0-rtt key management scheme for low-bandwidth smart grid communications},
author = {Mumin Cebe and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/9013356/},
year = {2019},
date = {2019-12-09},
booktitle = {2019 IEEE Global Communications Conference (GLOBECOM)},
pages = {1–6},
publisher = {IEEE},
school = {Florida International University},
abstract = {With the increasing digitization of different components of Smart Grid, there is an ongoing effort to design secure protocols and deploy them for different applications. A major need along with these efforts is to deal with key management for a large number of devices which are resource constrained and deployed within a very legacy communication environment. As the utilities rightly request to build the new systems on top of the legacy systems with limited investment, the research community needs to re-think the adaptation of the existing security approaches to such non-traditional environments. Assuming a legacy (i.e., 2G) radio communication infrastructure with bandwidths in the order of kilobits, the goal of this study is to enable basic security services in Smart Grid via a lightweight key management scheme. Specifically, the proposed scheme provides mutual authentication, key agreement, and key refreshment by},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Eyuphan Bulut, Mithat C Kisacikoglu, Kemal Akkaya
Spatio-temporal non-intrusive direct V2V charge sharing coordination Proceedings Article
In: pp. 9385–9398, IEEE, 2019.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Spatio-temporal non-intrusive direct V2V charge sharing coordination},
author = {Eyuphan Bulut and Mithat C Kisacikoglu and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/8782558/},
year = {2019},
date = {2019-07-31},
journal = {IEEE Transactions on Vehicular Technology},
volume = {68},
number = {10},
issue = {10},
pages = {9385–9398},
publisher = {IEEE},
school = {Florida International University},
abstract = {Direct vehicle-to-vehicle (V2V) charge sharing system has the potential to provide more flexibility to electric vehicle (EV) charging without depending on the charging station infrastructure or building designated parking lots. It can also provide an opportunity to shift peak time utility load to off-peak times. However, the assignment between the EVs that demand energy and the EVs with surplus energy or existing charging stations is a challenging problem as it has to be performed in real time considering their spatio-temporal distribution, availability, and grid load. In this paper, we study this assignment problem specifically in a supplier non-intrusive scenario (without changing their mobility) and aim to understand the potential benefits of a direct V2V charge sharing system. To this end, we present two new algorithms to match the demander EVs to suppliers for charging. In the first one, the maximum system benefit is},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Fatih Yucel, Kemal Akkaya, Eyuphan Bulut
Efficient and privacy preserving supplier matching for electric vehicle charging Journal Article
In: Ad Hoc Networks, vol. 90, pp. 101730, 2019.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Efficient and privacy preserving supplier matching for electric vehicle charging},
author = {Fatih Yucel and Kemal Akkaya and Eyuphan Bulut},
url = {https://www.sciencedirect.com/science/article/pii/S1570870518305353},
year = {2019},
date = {2019-07-01},
journal = {Ad Hoc Networks},
volume = {90},
pages = {101730},
publisher = {Elsevier},
school = {Florida International University},
abstract = {Electric Vehicle (EV) charging takes longer time and happens more frequently compared to refueling of fossil-based vehicles. This requires in-advance scheduling on charging stations depending on the route of the demander EVs for efficient resource allocation. However, such scheduling and frequent charging may leak sensitive information about the users which may expose their driving patterns, whereabouts, schedules, etc. The situation is compounded with the proliferation of EV chargers such as V2V charging where any two EVs can charge each other through a charging cable. In such cases, the matching of these EVs is typically done in a centralized manner which exposes private information to third parties which do the matching. To address this issue, in this paper, we propose an efficient and privacy-preserving distributed matching of demander EVs with charge suppliers (i.e., public/private stations, V2V},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Mumin Cebe, Kemal Akkaya
Performance evaluation of key management schemes for wireless legacy smart grid environments: poster Journal Article
In: pp. 334–335, 2019.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Performance evaluation of key management schemes for wireless legacy smart grid environments: poster},
author = {Mumin Cebe and Kemal Akkaya},
url = {https://dl.acm.org/doi/abs/10.1145/3317549.3326318},
year = {2019},
date = {2019-05-15},
pages = {334–335},
school = {Florida International University},
abstract = {With the increasing digitization of different components of Smart Grid, there is an ongoing effort to design secure protocols and deploy them for different applications. A major need along with these efforts is to deal with key management for a large number of devices. While key management can be easily addressed by transferring the existing protocols to Smart Grid domain, this is not an easy task as one needs to deal with the limitations of the current communication infrastructures and resource-constrained devices. As the utilities rightly requests to build the new systems on top of the legacy systems with limited investment, the research community needs to re-think the adaptation of the existing security approaches to such non-traditional environments. This poster aims to tackle one of these problems, namely, symmetric key management in a severely constrained wireless communication environment. Assuming a},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
David Gabay, Mumin Cebe, Kemal Akkaya
On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster Journal Article
In: pp. 347–348, 2019.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster},
author = {David Gabay and Mumin Cebe and Kemal Akkaya},
url = {https://dl.acm.org/doi/abs/10.1145/3317549.3326325},
year = {2019},
date = {2019-05-15},
pages = {347–348},
school = {Florida International University},
abstract = {As Electric Vehicles (EVs) are becoming widely available, their secure management is crucial to fully enable their potential. For instance, for convenient charging, they may require quick authentication with the charging stations while they are on the go. As charging is frequently needed, exposing one's charging frequency to the stations may risk the exposure of privacy for the EV driver. Therefore, a mechanism is needed to hide EV information. In this paper, we propose using zero-knowledge proofs to achieve this goal. While zero-knowledge proofs can provide anonymous authentication, they require computation for generation of witnesses. Therefore, we assess the overhead of generating a witness and proof computation at the resource constrained on-board units (OBUs) which are deployed on EVs that utilize wireless communications for scheduling. The results indicate that computation overhead is minimal and},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
David Gabay, Mumin Cebe, Kemal Akkaya
POSTER: On the Overhead of Using Zero-Knowledge Proofs for Electric Vehicle Authentication Journal Article
In: Proceedings of WiSec, vol. 19, pp. 347–348, 2019.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {POSTER: On the Overhead of Using Zero-Knowledge Proofs for Electric Vehicle Authentication},
author = {David Gabay and Mumin Cebe and Kemal Akkaya},
url = {https://www.academia.edu/download/89307820/3317549.pdf},
year = {2019},
date = {2019-00-00},
journal = {Proceedings of WiSec},
volume = {19},
pages = {347–348},
school = {Florida International University},
abstract = {As Electric Vehicles (EVs) are becoming widely available, their secure management is crucial to fully enable their potential. For instance, for convenient charging, they may require quick authentication with the charging stations while they are on the go. As charging is frequently needed, exposing ones charging frequency to the stations may risk the exposure of privacy for the EV driver. Therefore, a mechanism is needed to hide EV information. In this paper, we propose using zero-knowledge proofs to achieve this goal. While zero-knowledge proofs can provide anonymous authentication, they require computation for generation of witnesses. Therefore, we assess the overhead of generating a witness and proof computation at the resource constrained on-board units (OBUs) which are deployed on EVs that utilize wireless communications for scheduling. The results indicate that computation overhead is minimal and can be delployed on resource contrained devices.},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya
EPIC: Efficient privacy-preserving scheme with EtoE data integrity and authenticity for AMI networks Proceedings Article
In: pp. 3309–3321, IEEE, 2018.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {EPIC: Efficient privacy-preserving scheme with EtoE data integrity and authenticity for AMI networks},
author = {Ahmad Alsharif and Mahmoud Nabil and Samet Tonyali and Hawzhin Mohammed and Mohamed Mahmoud and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/8542715/},
year = {2018},
date = {2018-11-21},
journal = {IEEE Internet of Things Journal},
volume = {6},
number = {2},
issue = {2},
pages = {3309–3321},
publisher = {IEEE},
school = {Florida International University},
abstract = {In this paper, we propose EPIC, an efficient and privacy-preserving data collection scheme with EtoE data integrity verification for advanced metering infrastructure networks. Using efficient cryptographic operations, each meter should send a masked reading to the utility such that all the masks are canceled after aggregating all meters' masked readings, and thus the utility can only obtain an aggregated reading to preserve consumers' privacy. The utility can verify the aggregated reading integrity without accessing the individual readings to preserve privacy. It can also identify the attackers and compute electricity bills efficiently by using the fine-grained readings without violating privacy. Furthermore, EPIC can resist collusion attacks in which the utility colludes with a relay node to extract the meters' readings. A formal proof and probabilistic analysis are used to evaluate the security of EPIC, and ns-3 is used to},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Ahmed Sherif, Muhammad Ismail, Marbin Pazos-Revilla, Mohamed Mahmoud, Kemal Akkaya, Erchin Serpedin, Khalid Qaraqe
Privacy preserving power charging coordination scheme in the smart grid Journal Article
In: Transportation and Power Grid in Smart Cities: Communication Networks and Services, pp. 555–576, 2018.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Privacy preserving power charging coordination scheme in the smart grid},
author = {Ahmed Sherif and Muhammad Ismail and Marbin Pazos-Revilla and Mohamed Mahmoud and Kemal Akkaya and Erchin Serpedin and Khalid Qaraqe},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/9781119360124.ch21},
year = {2018},
date = {2018-10-29},
journal = {Transportation and Power Grid in Smart Cities: Communication Networks and Services},
pages = {555–576},
publisher = {John Wiley & Sons, Ltd},
school = {Florida International University},
abstract = {To successfully carry out the expected functionalities, the future smart grid will rely heavily on data communications among different entities, which poses several security challenges for such a critical infrastructure. This chapter discusses security requirements in the smart grid with a special focus on one application scenario, namely charging coordination. Vastscale, simultaneous charging of energy storage units (ESUs), including electric vehicles (EVs) and home batteries, stresses the distribution system and may prompt power outages in severe conditions. To avoid such circumstances and fully utilize the accessible power, a charging coordination scheme ought to be employed. However, this requires conveying few data that can expose sensitive information, including the EV's location, the activities of a house dwellers, etc. In this chapter, we present a privacypreserving powercharging coordination},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Samet Tonyali, Ruben Munoz, Kemal Akkaya, Utku Ozgur
A realistic performance evaluation of privacy-preserving protocols for smart grid AMI networks Journal Article
In: Journal of Network and Computer Applications, vol. 119, pp. 24–41, 2018.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {A realistic performance evaluation of privacy-preserving protocols for smart grid AMI networks},
author = {Samet Tonyali and Ruben Munoz and Kemal Akkaya and Utku Ozgur},
url = {https://www.sciencedirect.com/science/article/pii/S1084804518302194},
year = {2018},
date = {2018-10-01},
journal = {Journal of Network and Computer Applications},
volume = {119},
pages = {24–41},
publisher = {Academic Press},
school = {Florida International University},
abstract = {The proliferation of ubiquitous communication with the Internet of Things has led to advancement in wireless communication technologies. Today, they have become an indispensable component of smart city applications thanks to the lower cost and easiness of the installation and the maintainability. For example, they are a promising alternative of the wired solutions used in Smart Grid Advanced Metering Infrastructure (AMI) networks. However, wireless communication networks are more vulnerable to cyber-attacks and easier to be eavesdropped, so researchers have proposed a number of secure protocols. In addition to being vulnerable to cyber-attacks, AMI also exposes consumer power data which poses privacy issues. While there has been a lot of research to address these issues, the validation efforts mostly utilized simulators and actual overhead due to these approaches have not been captured in a},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Fatih Yucel, Eyuphan Bulut, Kemal Akkaya
Privacy preserving distributed stable matching of electric vehicles and charge suppliers Proceedings Article
In: 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), pp. 1–6, IEEE, 2018.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Privacy preserving distributed stable matching of electric vehicles and charge suppliers},
author = {Fatih Yucel and Eyuphan Bulut and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/8690603/},
year = {2018},
date = {2018-08-27},
booktitle = {2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)},
pages = {1–6},
publisher = {IEEE},
school = {Florida International University},
abstract = {The potential of electric vehicles (EV) to reduce foreign-oil dependence and improve urban air quality has triggered lots of investment by automotive companies recently and mass penetration and market dominance of EVs is imminent. However, EVs need to be charged more frequently than fossil-based vehicles and the charging durations are much longer. This necessitates in advance scheduling and matching depending on the route of the EVs. However, such scheduling and frequent charging may leak sensitive information about the users which may expose their driving patterns, whereabouts, schedules, etc. The situation is compounded with the proliferation of EV chargers such as V2V charging where there can be a lot of privacy exposure if matching of suppliers and EVs is achieved in a centralized manner. To address this issue, in this paper, we propose a privacy-preserving distributed stable matching of EVs},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Mumin Cebe
Efficient public-key revocation management for secure smart meter communications using one-way cryptographic accumulators Journal Article
In: 2018.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Efficient public-key revocation management for secure smart meter communications using one-way cryptographic accumulators},
author = {Kemal Akkaya and Mumin Cebe},
url = {https://www.osti.gov/biblio/1485600},
year = {2018},
date = {2018-05-20},
publisher = {Florida International Univ., Miami, FL (United States)},
school = {Florida International University},
abstract = {Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, public-key cryptography can be used to reduce the overhead of key management. However, it still has certain challenges in terms of certificate revocation and management. In particular, distribution and storage of the Certificate Revocation List (CRL), which holds the revoked certificates, is a major challenge due to its overhead. To address this challenge, in this paper, we propose a novel revocation management scheme by utilizing cryptographic accumulators which not only reduces the space requirements for revocation information but also enables convenient distribution of revocation information to all smart meters. We implemented this oneway cryptographic accumulator-based revocation scheme on ns-3 using IEEE 802.11s mesh standard as a model for AMI and demonstrated its superior performance with respect to traditional methods of CRL management through extensive simulations.},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Mumin Cebe, Kemal Akkaya
Efficient public-key revocation management for secure smart meter communications using one-way cryptographic accumulators Proceedings Article
In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6, IEEE, 2018.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Efficient public-key revocation management for secure smart meter communications using one-way cryptographic accumulators},
author = {Mumin Cebe and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/8423023/},
year = {2018},
date = {2018-05-20},
booktitle = {2018 IEEE International Conference on Communications (ICC)},
pages = {1–6},
publisher = {IEEE},
school = {Florida International University},
abstract = {Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, public-key cryptography can be used to reduce the overhead of key management. However, it still has certain challenges in terms of certificate revocation and management. In particular, distribution and storage of the Certificate Revocation List (CRL), which holds the revoked certificates, is a major challenge due to its overhead. To address this challenge, in this paper, we propose a novel revocation management scheme by utilizing cryptographic accumulators which not only reduces the space requirements for revocation information but also enables convenient distribution of revocation information to all smart meters. We implemented this one-way cryptographic accumulator-based revocation scheme on ns- 3 using IEEE},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, L Sun
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids Journal Article
In: Mathematical foundations of computer science, vol. 1, iss. 1, no. 1, 2018.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids},
author = {Chunqiang Hu and Jiguo Yu and Xiuzhen Cheng and Zhi Tian and L Sun},
url = {https://par.nsf.gov/servlets/purl/10067354},
year = {2018},
date = {2018-02-00},
journal = {Mathematical foundations of computer science},
volume = {1},
number = {1},
issue = {1},
school = {Florida International University},
abstract = {In this paper, we present a signcryption scheme called CP ABSC based on Ciphertext-Policy Attribute Based Encryption (CP ABE)[7] to secure the multicast communications in smart grids that require access control, data encryption, and authentication to ensure message integrity and confidentiality. CP ABSC provides algorithms for key management, signcryption, and designcryption. It can be used to signcrypt a message based on the access rights specified by the message itself. A user can designcrypt a ciphertext if and only if it possesses the attributes required by the access structure of the data. Thus CP ABSC effectively defines a multicast group based on the access rights of the data specified by the data itself, which differs significantly from the traditional Internet based multicast where the destination group is predetermined and must be known by the data source. CP ABSC provides collusion attack resistance, message authentication, forgery prevention, and confidentiality. It can be easily applied in smart grids to secure the instructions/commands broadcast from a utility company to multiple smart meters (push-based multicast) and the data retrieved from a smart meter to multiple destinations (pull-based multicast). Compared to CP ABE, CP ABSC combines encryption with signature at a lower computational cost for signcryption and a slightly higher cost in designcryption for signature verification. We also consider the adoption of attribute-based signature (ABS), and conclude that CP ABSC has a much lower computational cost than ABS.},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Samet Tonyali, Kemal Akkaya, Nico Saputro, A Selcuk Uluagac, Mehrdad Nojoumian
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems Journal Article
In: Future Generation Computer Systems, vol. 78, pp. 547–557, 2018.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems},
author = {Samet Tonyali and Kemal Akkaya and Nico Saputro and A Selcuk Uluagac and Mehrdad Nojoumian},
url = {https://www.sciencedirect.com/science/article/pii/S0167739X17306945},
year = {2018},
date = {2018-01-01},
journal = {Future Generation Computer Systems},
volume = {78},
pages = {547–557},
publisher = {North-Holland},
school = {Florida International University},
abstract = {As the Internet of Things (IoT) gets more pervasive, its areas of usage expands. Smart Metering systems is such an IoT-enabled technology that enables convenient and high frequency data collection compared to existing metering systems. However, such a frequent data collection puts the consumers privacy in risk as it helps expose the consumers daily habits. Secure in-network data aggregation can be used to both preserve consumers privacy and reduce the packet traffic due to high frequency metering data. The privacy can be provided by performing the aggregation on concealed metering data. Fully homomorphic encryption (FHE) and secure multiparty computation (secure MPC) are the systems that enable performing multiple operations on concealed data. However, both FHE and secure MPC systems have some overhead in terms of data size or message complexity. The overhead is compounded in the},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Eric Harmon, Utku Ozgur, Mehmet Hazar Cintuglu, Ricardo de Azevedo, Kemal Akkaya, Osama A Mohammed
The internet of microgrids: A cloud-based framework for wide area networked microgrids Proceedings Article
In: pp. 1262–1274, IEEE, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {The internet of microgrids: A cloud-based framework for wide area networked microgrids},
author = {Eric Harmon and Utku Ozgur and Mehmet Hazar Cintuglu and Ricardo de Azevedo and Kemal Akkaya and Osama A Mohammed},
url = {https://ieeexplore.ieee.org/abstract/document/8226848/},
year = {2017},
date = {2017-12-19},
journal = {IEEE Transactions on Industrial Informatics},
volume = {14},
number = {3},
issue = {3},
pages = {1262–1274},
publisher = {IEEE},
school = {Florida International University},
abstract = {This paper presents a cloud-based and hybrid wireless mesh communication framework for bilevel, nested, distributed optimization of networked clusters of microgrids. The proposed optimization framework implements a diffusion-based, fully distributed algorithm on local wireless network and a quasi-distributed approach on wide-area internet-based cloud. The lower level of the bilevel optimization implements a distributed optimal economic dispatch solution for intramicrogrid among distributed energy resources, and the upper level implements a global optimal dispatch for intermicrogrid energy exchange. To demonstrate industrial applicability of the proposed framework, the IEC 61850 interoperability protocol is adopted to achieve a certain delay performance so that the distributed optimization convergence is guaranteed. First, hardware-based prototype intelligent electronic devices are developed using},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Ramazan Algin, Huseyin O Tan, Kemal Akkaya
Mitigating selective jamming attacks in smart meter data collection using moving target defense Journal Article
In: pp. 1–8, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Mitigating selective jamming attacks in smart meter data collection using moving target defense},
author = {Ramazan Algin and Huseyin O Tan and Kemal Akkaya},
url = {https://dl.acm.org/doi/abs/10.1145/3132114.3132127},
year = {2017},
date = {2017-11-21},
pages = {1–8},
school = {Florida International University},
abstract = {In Advanced Metering Infrastructure (AMI) networks, power data collections from smart meters are static. Due to such static nature, attackers may predict the transmission behavior of the smart meters which can be used to launch selective jamming attacks that can block the transmissions. To avoid such attack scenarios and increase the resilience of the AMI networks, in this paper, we propose dynamic data reporting schedules for smart meters based on the idea of moving target defense (MTD) paradigm. The idea behind MTD-based schedules is to randomize the transmission times so that the attackers will not be able to guess these schedules. Specifically, we assign a time slot for each smart meter and in each round we shuffle the slots with Fisher-Yates shuffle algorithm that has been shown to provide secure randomness. We also take into account the periodicity of the data transmissions that may be needed by the},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Mumin Cebe, Kemal Akkaya
Utilizing advanced metering infrastructure to build a public key infrastructure for electric vehicles Journal Article
In: pp. 91–98, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Utilizing advanced metering infrastructure to build a public key infrastructure for electric vehicles},
author = {Mumin Cebe and Kemal Akkaya},
url = {https://dl.acm.org/doi/abs/10.1145/3132340.3132359},
year = {2017},
date = {2017-11-21},
pages = {91–98},
school = {Florida International University},
abstract = {component of our lives in the future which will necessitate their integration with the Smart Grid. In addition to public charging stations that are built for EV charging purposes, we are witnessing the development of home microgrids which will serve as a charging station not only for the homeowners but also for the neighborhood. Such home microgrids can be accessible through their smart meters, which makes advanced metering infrastructure (AMI) a viable alternative for vehicle-to-grid (V2G) communications. The security of these communications can be addressed by relying on a public-key infrastructure (PKI) that enables the use of certificates by the participants. However, the management of a PKI is challenging, in particular with respect to certificate revocation lists (CRLs) that need to be maintained at all times not just for the AMI network but also for the large number of EVs that will use it. Real-time access to CRLs},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Braden Roberts, Kemal Akkaya, Eyuphan Bulut, Mithat Kisacikoglu
An authentication framework for electric vehicle-to-electric vehicle charging applications Proceedings Article
In: 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 565–569, IEEE, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {An authentication framework for electric vehicle-to-electric vehicle charging applications},
author = {Braden Roberts and Kemal Akkaya and Eyuphan Bulut and Mithat Kisacikoglu},
url = {https://ieeexplore.ieee.org/abstract/document/8108800/},
year = {2017},
date = {2017-10-22},
booktitle = {2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)},
pages = {565–569},
publisher = {IEEE},
school = {Florida International University},
abstract = {Electric vehicles are becoming parts of our daily lives with the increasing investment from auto industry. However, their charging is an issue as this requires frequent charging and longer waiting times compared to traditional gasoline-based vehicles. The charging is typically done at residential or public charging stations. With the increased dominance of electric vehicles, one potential solution is to exploit vehicle-to-vehicle charging (V2V) where an electric vehicle can charge another one through a converter-cable assembly. In such cases, however, there needs to be a protocol between the charge supplier and receiver to authenticate each other and authorize the vehicle to open its charging ports. In this paper, we study this problem of authentication and propose a protocol that will utilize key exchange among the users without relying on certificates. We implemented the proposed protocols under WiFi-direct and},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Utku Ozgur, Harikrishnan T Nair, Aditya Sundararajan, Kemal Akkaya, Arif I Sarwat
An efficient MQTT framework for control and protection of networked cyber-physical systems Proceedings Article
In: 2017 IEEE Conference on Communications and Network Security (CNS), pp. 421–426, IEEE, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {An efficient MQTT framework for control and protection of networked cyber-physical systems},
author = {Utku Ozgur and Harikrishnan T Nair and Aditya Sundararajan and Kemal Akkaya and Arif I Sarwat},
url = {https://ieeexplore.ieee.org/abstract/document/8228674/},
year = {2017},
date = {2017-10-09},
booktitle = {2017 IEEE Conference on Communications and Network Security (CNS)},
pages = {421–426},
publisher = {IEEE},
school = {Florida International University},
abstract = {As more components of Cyber-Physical Systems (CPSes) get interconnected, their protection becomes imperative. For instance, Networked CPSes (NCPSes) which consist of multiple CPSes have greater attack surfaces given the added communication layer among member CPSes, and the inter-dependency between their physical and cyber subsystems. In particular, an attack on one subsystem may affect both. While there are many studies for CPS attack mitigations, NCPS attack scenarios were under-explored due to limitations of testbed development capabilities. To address this need, in this paper, an NCPS environment comprising two remote, identical IEEE 9-bus CPS testbeds is created. It is connected over a unique framework that uses Message Queueing Telemetry Transport (MQTT) protocol for secure communication. One CPS, called the controlling testbed, provides relay settings for the other CPS which},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Samet Tonyali, Kemal Akkaya, Nico Saputro, Xiuzhen Cheng
An attribute & network coding-based secure multicast protocol for firmware updates in smart grid AMI networks Proceedings Article
In: 2017 26th International Conference on Computer Communication and Networks (ICCCN), pp. 1–9, IEEE, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {An attribute & network coding-based secure multicast protocol for firmware updates in smart grid AMI networks},
author = {Samet Tonyali and Kemal Akkaya and Nico Saputro and Xiuzhen Cheng},
url = {https://ieeexplore.ieee.org/abstract/document/8038415/},
year = {2017},
date = {2017-07-31},
booktitle = {2017 26th International Conference on Computer Communication and Networks (ICCCN)},
pages = {1–9},
publisher = {IEEE},
school = {Florida International University},
abstract = {Smart meters operate based on their firmware ruling the hardware. The firmware occasionally needs to be updated to fix bugs and improve the services. Since the smart meter firmware is proprietary, the update file should be communicated to the smart meters in a secure way. In addition, the firmware update may target a specific subgroup of the smart meters rather than all of them in which case access control is required. In this paper, we address the problem of updating the smart meter firmware securely in an IEEE 802.11s-based AMI network and develop a secure and reliable multicast-over-broadcast protocol by making use of ciphertext-policy attribute-based signcryption (CP-ABSC) to provide not only confidentiality and access control but also message authentication. CP-ABSC is employed to signcrypt both the firmware update file and the firmware update request based on an access tree such that the},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Nico Saputro, Samet Tonyali, Mumin Cebe, Mohamed Mahmoud
Efficient certificate verification for vehicle-to-grid communications Journal Article
In: 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Efficient certificate verification for vehicle-to-grid communications},
author = {Kemal Akkaya and Nico Saputro and Samet Tonyali and Mumin Cebe and Mohamed Mahmoud},
url = {https://www.osti.gov/biblio/1372484},
year = {2017},
date = {2017-07-19},
publisher = {Florida Intl Univ., Miami, FL (United States)},
school = {Florida International University},
abstract = {While public charging stations are typically used for Electric Vehicle (EV) such as charging, home microgrids that may act as private charging stations are also expected to be used for meeting the increased EV charging demands in the future. Such home microgrids can be accessible through their smart meters, which makes advanced metering infrastructure (AMI) a viable alternative for vehicle-to-grid (V2G) communications. However, to ensure secure V2G communications using public-keys, smart meters will need to maintain certificate revocation lists (CRLs) not just for the AMI network but also for large number of EVs that may interact with them. For resource-constrained smart meters, this will increase the storage requirements and introduce additional overhead in terms of delay and CRL maintenance. To eliminate this burden, we propose keeping merely non-revoked certificates that belong to EVs, which are usually driven within the vicinity of that particular microgrid. The motivation comes from the fact that it is inefficient to distribute and store a large CRL that has revocation information about all EVs in the whole system as most of these EVs will never come to the geographic vicinity of that home microgrid. The approach ensures that any status changes of these certificates are communicated to the smart meters. We implemented the proposed approach in a realistic V2G communication scenario by using IEEE 802.11s mesh as the underlying AMI infrastructure using ns-3 simulator. The results confirmed that the proposed approach significantly reduces the certificate verification time and the storage requirements on smart meters.},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Nico Saputro, Kemal Akkaya
Investigation of smart meter data reporting strategies for optimized performance in smart grid AMI networks Proceedings Article
In: pp. 894–904, IEEE, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Investigation of smart meter data reporting strategies for optimized performance in smart grid AMI networks},
author = {Nico Saputro and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/7918556/},
year = {2017},
date = {2017-05-03},
journal = {IEEE Internet of Things Journal},
volume = {4},
number = {4},
issue = {4},
pages = {894–904},
publisher = {IEEE},
school = {Florida International University},
abstract = {Designing efficient and reliable wireless mesh-based advanced metering infrastructure (AMI) networks is challenging. In AMI networks, fine-grained regular data collections from smart meters (SMs) create a lot of traffic and interference. The location of the gateway that collects data from SMs may also add to this interference by impacting the length of routes. Furthermore, TCP-like protocols that are employed for reliability may bring additional overhead. Therefore, it is critical to pick the suitable data collection strategy and gateway location to meet some smart grid performance requirements. In this paper, we proposed three novel data collection mechanisms to set the periodic reporting time of each SM to improve TCP performance in IEEE 802.11s-based wireless mesh AMI networks. The first idea was based on the nature of IEEE 802.11s routing protocol. Each SM is assigned a reporting time based on its location in},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Samet Tonyali, Kemal Akkaya, Nico Saputro
An attribute-based reliable multicast-over-broadcast protocol for firmware updates in smart meter networks Proceedings Article
In: 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 97–102, IEEE, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {An attribute-based reliable multicast-over-broadcast protocol for firmware updates in smart meter networks},
author = {Samet Tonyali and Kemal Akkaya and Nico Saputro},
url = {https://ieeexplore.ieee.org/abstract/document/8116359/},
year = {2017},
date = {2017-05-01},
booktitle = {2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)},
pages = {97–102},
publisher = {IEEE},
school = {Florida International University},
abstract = {The Smart Grid (SG) initiative introduces a two-way communication between utility companies and the consumers thanks to Advanced Metering Infrastructure (AMI) networks. One of the most crucial components that constitute an AMI network is smart meters (SMs). SMs execute some programs called firmware to rule the hardware. The firmware occasionally needs to be updated to fix bugs and improve the services. Since the SM firmware is proprietary, the update file should be communicated to the SMs in a secure way. In addition, the firmware update can target a specific subgroup of the SMs rather than all of them. In this paper, we address the problem of multicasting the firmware update securely in an IEEE 802.11s-based SG AMI network and develop a secure and reliable multicast-over-broadcast protocol by making use of ciphertext-policy attribute-based signcryption (CP-ABSC) to provide not only confidentiality},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Mohamed Mahmoud, Nico Saputro, Kemal Akkaya, Akula Prem
Privacy Preserving Power Injection Querying Over AMI and LTE network for Smart Grid Journal Article
In: IEEE INTERNET OF THINGS JOURNAL; Vol. 4 No. 4 Agustus 2017, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Privacy Preserving Power Injection Querying Over AMI and LTE network for Smart Grid},
author = {Mohamed Mahmoud and Nico Saputro and Kemal Akkaya and Akula Prem},
url = {https://repository.unpar.ac.id/handle/123456789/14743},
year = {2017},
date = {2017-00-00},
journal = {IEEE INTERNET OF THINGS JOURNAL; Vol. 4 No. 4 Agustus 2017},
publisher = {IEEE},
school = {Florida International University},
abstract = {The future Smart Grid will enable homes to have energy storage units that can store the excess power generated from renewable energy sources and sell it to the grid during the peak hours. Realization of this process, however, requires the utility company to be able to communicate with the storage units whenever needed. Nonetheless, the security and the privacy of this communication is essential to not only ensure a fair energy selling market but also eliminate any privacy concerns of the users due to potential exposure of their energy levels. In this paper, we propose a secure and privacy-preserving power injection querying scheme by exploiting the already available Advanced Metering Infrastructure (AMI) and Long-Term Evolution (LTE) cellular networks. The idea is based on collecting power injection bids from storage units and sending their aggregated value to the utility rather than the individual bids in order to preserve user privacy. We also develop a bilinear pairing based technique to enable the utility company to ensure the integrity and authenticity of the aggregated bid without accessing the individual bids. In this way, no party will have access to the storage units individual bids and use them to achieve unfair financial gains. We implemented the proposed scheme in an integrated AMI/LTE network using the ns-3 network simulator. Our evaluations have demonstrated that the proposed scheme is secure and can protect user privacy with acceptable communication and computation overhead.},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Nico Saputro, Samet Tonyali, Kemal Akkaya, Mumin Cebe, Mohamed Mahmoud
Efficient certificate verification for vehicle-to-grid communications Journal Article
In: pp. 3–18, 2017.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Efficient certificate verification for vehicle-to-grid communications},
author = {Nico Saputro and Samet Tonyali and Kemal Akkaya and Mumin Cebe and Mohamed Mahmoud},
url = {https://link.springer.com/chapter/10.1007/978-3-319-65548-2_1},
year = {2017},
date = {2017-00-00},
booktitle = {Future Network Systems and Security: Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31-September 2, 2017, Proceedings},
pages = {3–18},
publisher = {Springer International Publishing},
school = {Florida International University},
abstract = {While public charging stations are typically used for Electric Vehicle (EV) such as charging, home microgrids that may act as private charging stations are also expected to be used for meeting the increased EV charging demands in the future. Such home microgrids can be accessible through their smart meters, which makes advanced metering infrastructure (AMI) a viable alternative for vehicle-to-grid (V2G) communications. However, to ensure secure V2G communications using public-keys, smart meters will need to maintain certificate revocation lists (CRLs) not just for the AMI network but also for large number of EVs that may interact with them. For resource-constrained smart meters, this will increase the storage requirements and introduce additional overhead in terms of delay and CRL maintenance. To eliminate this burden, we propose keeping merely non-revoked certificates that belong to EVs, which},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Hawzhin Mohammed, Samet Tonyali, Khaled Rabieh, Mohamed Mahmoud, Kemal Akkaya
Efficient privacy-preserving data collection scheme for smart grid AMI networks Proceedings Article
In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–6, IEEE, 2016.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Efficient privacy-preserving data collection scheme for smart grid AMI networks},
author = {Hawzhin Mohammed and Samet Tonyali and Khaled Rabieh and Mohamed Mahmoud and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/7841782/},
year = {2016},
date = {2016-12-04},
booktitle = {2016 IEEE Global Communications Conference (GLOBECOM)},
pages = {1–6},
publisher = {IEEE},
school = {Florida International University},
abstract = {In this paper, we propose an efficient scheme that utilizes symmetric-key-cryptography and hashing operations to collect consumption data. The idea is based on sending masked power consumption readings from the meters and removing these masks by adding all the meters' messages, so that the utility can learn the aggregated reading but cannot learn the individual readings. We also introduce a key management procedure that uses asymmetric key operations, but unlike the power consumption collection that is done very frequently, the key management procedure is run every long time for key renewals. Our evaluations indicate that the cryptographic operations needed in our scheme are much more efficient than the operations needed in the existing schemes. In addition, we have shown that the proposed scheme can preserve the consumers' privacy and provide high protection level against collusion attacks},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Mehmet Hazar Cintuglu, Osama A Mohammed, Kemal Akkaya, A Selcuk Uluagac
A survey on smart grid cyber-physical system testbeds Proceedings Article
In: pp. 446–464, IEEE, 2016.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {A survey on smart grid cyber-physical system testbeds},
author = {Mehmet Hazar Cintuglu and Osama A Mohammed and Kemal Akkaya and A Selcuk Uluagac},
url = {https://ieeexplore.ieee.org/abstract/document/7740849/},
year = {2016},
date = {2016-11-10},
volume = {19},
number = {1},
issue = {1},
pages = {446–464},
publisher = {IEEE},
school = {Florida International University},
abstract = {An increasing interest is emerging on the development of smart grid cyber-physical system testbeds. As new communication and information technologies emerge, innovative cyber-physical system testbeds need to leverage realistic and scalable platforms. Indeed, the interdisciplinary structure of the smart grid concept compels heterogeneous testbeds with different capabilities. There is a significant need to evaluate new concepts and vulnerabilities as opposed to counting on solely simulation studies especially using hardware-in-the-loop test platforms. In this paper, we present a comprehensive survey on cyber-physical smart grid testbeds aiming to provide a taxonomy and insightful guidelines for the development as well as to identify the key features and design decisions while developing future smart grid testbeds. First, this survey provides a four step taxonomy based on smart grid domains, research goals, test},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Utku Ozgur, Samet Tonyali, Kemal Akkaya
Testbed and simulation-based evaluation of privacy-preserving algorithms for smart grid ami networks Proceedings Article
In: 2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops), pp. 181–186, IEEE, 2016.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Testbed and simulation-based evaluation of privacy-preserving algorithms for smart grid ami networks},
author = {Utku Ozgur and Samet Tonyali and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/7856154/},
year = {2016},
date = {2016-11-07},
booktitle = {2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops)},
pages = {181–186},
publisher = {IEEE},
school = {Florida International University},
abstract = {Although it is a deployed system, the data collection process of Smart Grids (SGs) is still a topic that needs consideration. The reason behind this is that Advanced Metering Infrastructure (AMI) applications used for collection can cause leakage of sensitive information about the users if data is sent as plaintext. In this paper, we propose a system that provides privacy with the Paillier cryptosystem and two-factor authentication with ECDSA and OpenSSL certificates. In order to test the system, an IEEE 802.11s-based SG AMI network testbed is constructed with Beaglebone Black boards that imitate the behavior of smart meters. The same network is also simulated in ns-3. Tests are done in two modes (hop-by-hop and end-to-end aggregation) and results are collected based on three metrics (packet delivery ratio, throughput, and completion time). The results showed that ns-3 simulation and testbed results are parallel},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Nico Saputro, Kemal Akkaya, Samet Tonyali
Addressing network interoperability in hybrid IEEE 802.11 s/LTE smart grid communications Proceedings Article
In: 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp. 623–626, IEEE, 2016.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Addressing network interoperability in hybrid IEEE 802.11 s/LTE smart grid communications},
author = {Nico Saputro and Kemal Akkaya and Samet Tonyali},
url = {https://ieeexplore.ieee.org/abstract/document/7796856/},
year = {2016},
date = {2016-11-07},
booktitle = {2016 IEEE 41st Conference on Local Computer Networks (LCN)},
pages = {623–626},
publisher = {IEEE},
school = {Florida International University},
abstract = {Ensuring network interoperability when IEEE 802.11s-based NAN and LTE-based WAN is deployed for Smart Grid (SG) Advanced Metering Infrastructure (AMI) poses significant challenges. Besides the QoS mismatch between networks, LTE tunneling mechanism becomes an issue when forwarding downlink traffic to IEEE 802.11s network since the gateway of these networks is supposed to be the end device in LTE setup. Yet, inherent security/privacy overhead in SG traffic makes it even more challenging. To address these issues, a novel UE access list is proposed for LTE network to enable the downlink traffic identification to IEEE 802.11s network and accordingly selects the corresponding gateway. For the QoS mismatch, Dual-Queues (DQs) for each Access Category of the underlying MAC protocol, namely Enhanced Distributed Channel Access (EDCA) in IEEE 802.11s network is proposed. By using ns-3},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Mohamed MEA Mahmoud, Nico Saputro, Prem Kumar Akula, Kemal Akkaya
Privacy-preserving power injection over a hybrid AMI/LTE smart grid network Proceedings Article
In: pp. 870–880, IEEE, 2016.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Privacy-preserving power injection over a hybrid AMI/LTE smart grid network},
author = {Mohamed MEA Mahmoud and Nico Saputro and Prem Kumar Akula and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/7517318/},
year = {2016},
date = {2016-07-20},
journal = {IEEE Internet of Things Journal},
volume = {4},
number = {4},
issue = {4},
pages = {870–880},
publisher = {IEEE},
school = {Florida International University},
abstract = {The future smart grid will enable homes to have energy storage units that can store the excess power generated from renewable energy sources and sell it to the grid during the peak hours. Realization of this process, however, requires the utility company to be able to communicate with the storage units whenever needed. Nonetheless, the security and the privacy of this communication is essential to not only ensure a fair energy selling market but also eliminate any privacy concerns of the users due to potential exposure of their energy levels. In this paper, we propose a secure and privacy-preserving power injection querying scheme by exploiting the already available advanced metering infrastructure (AMI) and long-term evolution (LTE) cellular networks. The idea is based on collecting power injection bids from storage units and sending their aggregated value to the utility rather than the individual bids in order to},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Utku Ozgur, Samet Tonyali, Kemal Akkaya, Fatih Senel
Comparative evaluation of smart grid ami networks: Performance under privacy Proceedings Article
In: 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 1134–1136, IEEE, 2016.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Comparative evaluation of smart grid ami networks: Performance under privacy},
author = {Utku Ozgur and Samet Tonyali and Kemal Akkaya and Fatih Senel},
url = {https://ieeexplore.ieee.org/abstract/document/7543889/},
year = {2016},
date = {2016-06-27},
booktitle = {2016 IEEE Symposium on Computers and Communication (ISCC)},
pages = {1134–1136},
publisher = {IEEE},
school = {Florida International University},
abstract = {Advanced Metering Infrastructure (AMI) is an indispensable part of a Smart Grid (SG) initiative. AMI applications collect data measured by smart meters in the SG. This process may leak information about consumers. In this paper, we build an IEEE 802.11s-based SG AMI network testbed consisting of Beaglebone Black boards and investigate the performance of privacy-preserving protocols in real-life and compare it with the ns-3 simulations. We develop an application that collects data periodically. This mechanism runs in two modes: Hop-by-hop and end-to-end aggregation. The application is tested on TCP and UDP. We use Paillier cryptosystem for privacy, and ECDSA for authentication. The application is also simulated in ns-3. The testbed results are compared with the ns-3 results in terms of packet delivery ratio, throughput and data collection completion time. Comparison showed that the tested privacy},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Mohamed Mahmoud, Muhammad Ismail, Prem Akula, Kemal Akkaya, Erchin Serpedin, Khalid Qaraqe
Privacy-aware power charging coordination in future smart grid Proceedings Article
In: 2016 IEEE Wireless Communications and Networking Conference, pp. 1–6, IEEE, 2016.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Privacy-aware power charging coordination in future smart grid},
author = {Mohamed Mahmoud and Muhammad Ismail and Prem Akula and Kemal Akkaya and Erchin Serpedin and Khalid Qaraqe},
url = {https://ieeexplore.ieee.org/abstract/document/7564967/},
year = {2016},
date = {2016-04-03},
booktitle = {2016 IEEE Wireless Communications and Networking Conference},
pages = {1–6},
publisher = {IEEE},
school = {Florida International University},
abstract = {In this paper, we propose a privacy-preserving power charging coordination scheme. Each energy storage unit (ESU) should send a charging request to an aggregator. The request does not reveal any private information to the aggregator. The aggregator forwards the requests to a charging controller that can know enough data to run a charging coordination scheme, but it cannot link the data to particular ESUs. Temporal charging coordination scheme is then proposed based on a modified knapsack problem formulation. The goal is to maximize the amount of power delivered to the ESUs before the charging requests expire without exceeding the available maximum charging capacity. Our simulation results demonstrate that both the optimal charging coordination and the privacy-aware charging coordination exhibit an improved performance compared with a first-come-first-serve charging coordination. More},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Samet Tonyali, Ozan Cakmak, Kemal Akkaya, Mohamed MEA Mahmoud, Ismail Guvenc
Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks Proceedings Article
In: pp. 709–719, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks},
author = {Samet Tonyali and Ozan Cakmak and Kemal Akkaya and Mohamed MEA Mahmoud and Ismail Guvenc},
url = {https://ieeexplore.ieee.org/abstract/document/7360878/},
year = {2015},
date = {2015-12-18},
journal = {IEEE Internet of Things Journal},
volume = {3},
number = {5},
issue = {5},
pages = {709–719},
publisher = {IEEE},
school = {Florida International University},
abstract = {While the newly envisioned smart(er) grid (SG) will result in a more efficient and reliable power grid, its collection and use of fine-grained meter data has widely raised concerns on consumer privacy. While a number of approaches are available for preserving consumer privacy, these approaches are mostly not very practical to be used due to two reasons. 1) Since the data is hidden, this reduces the ability of the utility company to use the data for distribution state estimation. 2) The approaches were not tested under realistic wireless infrastructures that are currently in use. In this paper, we propose to implement a meter data obfuscation approach to preserve consumer privacy that has the ability to perform distribution state estimation. We then assess its performance on a large-scale advanced metering infrastructure (AMI) network built upon the new IEEE 802.11s wireless mesh standard. For the data obfuscation},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Farshad Koohifar, Nico Saputro, Ismail Guvenc, Kemal Akkaya
Hybrid wi-fi/lte aggregation architecture for smart meter communications Proceedings Article
In: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 575–580, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Hybrid wi-fi/lte aggregation architecture for smart meter communications},
author = {Farshad Koohifar and Nico Saputro and Ismail Guvenc and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/7436362/},
year = {2015},
date = {2015-11-02},
booktitle = {2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
pages = {575–580},
publisher = {IEEE},
school = {Florida International University},
abstract = {The 3GPP Long Term Evolution (LTE) technology and its evolutions are promising candidate technologies to support smart meter communications. However, smart meter traffic is uplink heavy and needs large number of simultaneously connected users. This reduces LTE's potential to be employed for smart meter communications. To improve the overall performance, in this paper, we propose a hybrid WiFi-LTE aggregation data communication architecture. Specifically, two IEEE 802.11 based layers (IEEE 802.11b/g/n and IEEE 802.11s) are added to the bottom of the LTE architecture to aggregate local smart grid data and pass the aggregated data through limited number of LTE enabled nodes. These hybrid network architectures are evaluated using extensive ns-3 simulations, and their performance are compared with baseline LTE under smart grid traffic profile. Results show that proposed architectures can},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Nico Saputro, Kemal Akkaya, Ali I Yurekli
Path error-aware RTO design for smart meter data traffic in IEEE 802.11 s-based AMI networks Proceedings Article
In: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 211–216, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Path error-aware RTO design for smart meter data traffic in IEEE 802.11 s-based AMI networks},
author = {Nico Saputro and Kemal Akkaya and Ali I Yurekli},
url = {https://ieeexplore.ieee.org/abstract/document/7436302/},
year = {2015},
date = {2015-11-02},
booktitle = {2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
pages = {211–216},
publisher = {IEEE},
school = {Florida International University},
abstract = {Advanced Metering Infrastructure (AMI) applications for Smart Grid (SG) typically employ wireless mesh based data collection approaches that collect smart meter data via multi-hop routing. One of the mesh-based solutions that is viable to use is the IEEE 802.11s wireless mesh standard. However, when TCP is employed in this standard for periodic smart meter data collection, the performance starts to degrade due to classical congestion mechanism of TCP which is falsely triggered due to the link failures. The main reason for frequent link failures is the occurring of collisions among beacons sent by the Peering Management Protocol (PMP) of IEEE 802.11s standard to maintain link connectivity among the smart meters (SMs). This in turn causes doubling of the retransmission timeout (RTO) of TCP assuming that there is congestion and thus introduces extra overhead and packet delay. In this paper, we propose a},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Prem Akula, Mohamed Mahmoud, Kemal Akkaya, Min Songi
Privacy-preserving and secure communication scheme for power injection in smart grid Proceedings Article
In: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 37–42, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Privacy-preserving and secure communication scheme for power injection in smart grid},
author = {Prem Akula and Mohamed Mahmoud and Kemal Akkaya and Min Songi},
url = {https://ieeexplore.ieee.org/abstract/document/7436273/},
year = {2015},
date = {2015-11-02},
booktitle = {2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
pages = {37–42},
publisher = {IEEE},
school = {Florida International University},
abstract = {In this paper, we propose a secure and privacy-preserving communication scheme for power injection for the smart grid storage units. The idea is based on collecting masked bids from storage units at an aggregator and send aggregated bids to the utility rather than the individual ones. The utility company can ensure the integrity and authenticity of the aggregated bid without accessing the individual bids. In this way, no party will have access to the storage units' data and make use of it to achieve unfair financial gains. Our evaluations have demonstrated that the proposed scheme is secure and can achieve the privacy requirements. Moreover, the scheme requires acceptable communication and computation overhead.},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Nico Saputro, Kemal Akkaya, Ismail Guvenc
Privacy-aware communication protocol for hybrid IEEE 802.11 s/LTE Smart Grid architectures Proceedings Article
In: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp. 905–911, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Privacy-aware communication protocol for hybrid IEEE 802.11 s/LTE Smart Grid architectures},
author = {Nico Saputro and Kemal Akkaya and Ismail Guvenc},
url = {https://ieeexplore.ieee.org/abstract/document/7365945/},
year = {2015},
date = {2015-10-26},
booktitle = {2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)},
pages = {905–911},
publisher = {IEEE},
school = {Florida International University},
abstract = {Smart Grid (SG) is expected to use a variety of communications technologies as the underlying communications infrastructures. The interworking between heterogeneous communications network is crucial to support reliability and end-to-end features. In this paper, we consider a hybrid SG communications architecture that consists of a IEEE 802.11s mesh-based smart meter network and an LTE-based wide area network for collecting smart meter data. While a gateway can be used to bridge these networks, it will still not possible to pin point a smart meter directly from the utility control center nor running a TCP-based application that requires a connection establishment phase. We propose a gateway address translation based approach to enable execution of end-to-end protocols without making any changes to LTE and 802.11s mesh networks. Specifically, we introduce a new layer at the gateway which will},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Mohamed MEA Mahmoud, Jelena Mišić, Kemal Akkaya, Xuemin Shen
Investigating public-key certificate revocation in smart grid Proceedings Article
In: pp. 490–503, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Investigating public-key certificate revocation in smart grid},
author = {Mohamed MEA Mahmoud and Jelena Mišić and Kemal Akkaya and Xuemin Shen},
url = {https://ieeexplore.ieee.org/abstract/document/7054434/},
year = {2015},
date = {2015-03-04},
journal = {IEEE Internet of Things Journal},
volume = {2},
number = {6},
issue = {6},
pages = {490–503},
publisher = {IEEE},
school = {Florida International University},
abstract = {The public key cryptography (PKC) is essential for securing many applications in smart grid. For the secure use of the PKC, certificate revocation schemes tailored to smart grid applications should be adopted. However, little work has been done to study certificate revocation in smart grid. In this paper, we first explain different motivations that necessitate revoking certificates in smart grid. We also identify the applications that can be secured by PKC and thus need certificate revocation. Then, we explain existing certificate revocation schemes and define several metrics to assess them. Based on this assessment, we identify the applications that are proper for each scheme and discuss how the schemes can be modified to fully satisfy the requirements of its potential applications. Finally, we study certificate revocation in pseudonymous public key infrastructure (PPKI), where a large number of certified public/private keys},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Khaled Rabieh, Mohamed Mahmoud, Samet Tonyali
Customized certificate revocation lists for IEEE 802.11 s-based smart grid AMI networks Proceedings Article
In: pp. 2366–2374, IEEE, 2015.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Customized certificate revocation lists for IEEE 802.11 s-based smart grid AMI networks},
author = {Kemal Akkaya and Khaled Rabieh and Mohamed Mahmoud and Samet Tonyali},
url = {https://ieeexplore.ieee.org/abstract/document/7024936/},
year = {2015},
date = {2015-01-28},
journal = {IEEE Transactions on smart grid},
volume = {6},
number = {5},
issue = {5},
pages = {2366–2374},
publisher = {IEEE},
school = {Florida International University},
abstract = {Public-key cryptography (PKC) is widely used in smart grid (SG) communications to reduce the overhead of key management. However, PKC comes with its own problems in terms of certificate management. Specifically, certificate revocation lists (CRLs) need to be maintained and distributed to the smart meters (SMs) in order to ensure security of the communications. The size of CRLs may grow over time and eventually may introduce additional delay, bandwidth, and storage overhead when various applications are run on SG. In this paper, we propose novel algorithms for creating customized CRLs with reduced size for IEEE 802.11s-based advanced metering infrastructure (AMI) networks. Rather than maintaining a huge-size single CRL that introduces unnecessary search time and storage, the idea is to cluster/group SMs within the AMI network and create CRLs based on these groups. The grouping is mainly},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Farshad Koohifar, Nico Saputro, Ismail Guvenc
Hybrid Wi-Fi/LTE architecture with aggregation for smart meter communications Journal Article
In: 2015.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {Hybrid Wi-Fi/LTE architecture with aggregation for smart meter communications},
author = {Kemal Akkaya and Farshad Koohifar and Nico Saputro and Ismail Guvenc},
url = {https://repository.unpar.ac.id/handle/123456789/14755},
year = {2015},
date = {2015-00-00},
publisher = {IEEE},
school = {Florida International University},
abstract = {The 3GPP Long Term Evolution (LTE) technology and its evolutions are promising candidate technologies to support smart meter communications. However, smart meter traffic is uplink heavy and needs large number of simultaneously connected users. This reduces LTEs potential to be employed for smart meter communications. To improve the overall performance, in this paper, we propose a hybrid WiFi-LTE aggregation data communication architecture. Specifically, two IEEE 802.11 based layers (IEEE 802.11b/g/n and IEEE 802.11s) are added to the bottom of the LTE architecture to aggregate local smart grid data and pass the aggregated data through limited number of LTE enabled nodes. These hybrid network architectures are evaluated using extensive ns-3 simulations, and their performance are compared with baseline LTE under smart grid traffic profile. Results show that proposed architectures can improve control channel and random access channel performance, at the cost of tolerable latency degradation.},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Nico Saputro, Kemal Akkaya
Periodic data reporting strategies for IEEE 802.11 s-based smart grid AMI networks Proceedings Article
In: 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 314–319, IEEE, 2014.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Periodic data reporting strategies for IEEE 802.11 s-based smart grid AMI networks},
author = {Nico Saputro and Kemal Akkaya},
url = {https://ieeexplore.ieee.org/abstract/document/7007665/},
year = {2014},
date = {2014-11-03},
booktitle = {2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
pages = {314–319},
publisher = {IEEE},
school = {Florida International University},
abstract = {IEEE 802.11s-based wireless mesh networks are one of the options to implement Neighborhood Area Networks (NANs) in Smart Grid (SG). Typically, TCP is used along with 802.11s to provide reliability when collecting fine-grained smart meter (SM) data. Due to the need for real-time monitoring of the grid, SM data needs to be collected at the same time which creates a lot of traffic and interference among the SMs. In this paper, we propose novel mechanisms to set the periodic reporting time of each SM to improve the performance of TCP in IEEE 802.11s-based NANs in terms of packet delay. The first idea is based on using the location of the SMs in the network topology and assigns a periodic reporting time based on its distance from the gateway. The second idea imitates the time division multiple access methods and assigns a separate slot for each SM. We extensively evaluated the proposed strategies of setting},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Kemal Akkaya, Khaled Rabieh, Mohamed Mahmoud, Samet Tonyali
Efficient generation and distribution of crls for ieee 802.11 s-based smart grid ami networks Proceedings Article
In: 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 982–988, IEEE, 2014.
Abstract | Links | BibTeX | Tags: Smart Grid
@inproceedings{nokey,
title = {Efficient generation and distribution of crls for ieee 802.11 s-based smart grid ami networks},
author = {Kemal Akkaya and Khaled Rabieh and Mohamed Mahmoud and Samet Tonyali},
url = {https://ieeexplore.ieee.org/abstract/document/7007776/},
year = {2014},
date = {2014-11-03},
booktitle = {2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
pages = {982–988},
publisher = {IEEE},
school = {Florida International University},
abstract = {In this paper, we propose a novel algorithm for reducing the size of certificate revocation lists (CRLs) created and distributed for IEEE 802.11s-based Smart Grid Advanced Metering Infrastructure (AMI) networks. Rather than maintaining a huge-size single CRL that introduces unnecessary search time and storage, the idea is to generate groups of smart meters (SMs) within the AMI network and create CRLs based on these groups. Creating groups is appropriate in AMI networks since the SMs are stationary in contrary to traditional mobile wireless networks. Our proposed grouping algorithm is based on the created paths from leaf SMs to the gateway as well as the immediate neighborhood of each SM. Via grouping, the length of the CRL for each SM and the corresponding distribution overhead can be reduced significantly. Simulation results have shown that our approach can maintain a balance between the size of},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {inproceedings}
}
Nico Saputro, Kemal Akkaya
On preserving user privacy in smart grid advanced metering infrastructure applications Journal Article
In: Security and Communication Networks, vol. 7, iss. 1, no. 1, pp. 206–220, 2014.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {On preserving user privacy in smart grid advanced metering infrastructure applications},
author = {Nico Saputro and Kemal Akkaya},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.706},
year = {2014},
date = {2014-01-00},
journal = {Security and Communication Networks},
volume = {7},
number = {1},
issue = {1},
pages = {206–220},
school = {Florida International University},
abstract = {Advanced metering infrastructure (AMI) enables realtime collection of power consumption data through the Smart Grid communication network. With the current deployment of smart meters (SMs), one of the concerns that started to be raised by the customers is on the privacy of their power consumption data. The exposure of these data can lead to several privacy problems that need to be addressed before the customers can be convinced for the use of SMs. This paper has two contributions. First, it identifies the threats regarding user and data privacy in AMI applications and comprehensively surveys the existing solutions to address these threats. We categorize the existing approaches on privacy and discuss pros and cons of these approaches with respect to some criteria. Second, we pick one of the existing solutions on privacy, namely the homomorphic encryption, and evaluate its feasibility and impact on},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Nico Saputro, Kemal Akkaya
An improved tcp for reduced packet delay in ieee 802.11 s-based smart grid ami networks Journal Article
In: pp. 86–97, 2014.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {An improved tcp for reduced packet delay in ieee 802.11 s-based smart grid ami networks},
author = {Nico Saputro and Kemal Akkaya},
url = {https://link.springer.com/chapter/10.1007/978-3-319-13329-4_8},
year = {2014},
date = {2014-00-00},
booktitle = {Ad Hoc Networks: 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers 6},
pages = {86–97},
publisher = {Springer International Publishing},
school = {Florida International University},
abstract = {Transmission Control Protocol (TCP) can handle packet losses by retransmitting them when the corresponding acknowledgement (ACK) packets are not received within a certain time interval. This time interval is referred to as retransmission timeout (RTO) and setting its value is critical to reduce the packet delay in Smart Grid Advanced Metering Infrastructure (AMI) networks. In this paper, we propose a novel mechanism to set the RTO of each smart meter (SM) to improve the performance of TCP in IEEE 802.11s-based AMI networks in terms of packet delay. The idea is based on using the location of the SMs in the network topology and assign an RTO based on its distance from the gateway. In addition, we propose eliminating the doubling of RTO value when ACK packets are not received. The simulation results under ns-3 simulator indicate that the delay performance can be improved at least 40 percent with the},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Nico Saputro, Kemal Akkaya, Suleyman Uludag
A survey of routing protocols for smart grid communications Journal Article
In: Computer Networks, vol. 56, iss. 11, no. 11, pp. 2742–2771, 2012.
Abstract | Links | BibTeX | Tags: Smart Grid
@article{nokey,
title = {A survey of routing protocols for smart grid communications},
author = {Nico Saputro and Kemal Akkaya and Suleyman Uludag},
url = {https://www.sciencedirect.com/science/article/pii/S1389128612001429},
year = {2012},
date = {2012-07-31},
journal = {Computer Networks},
volume = {56},
number = {11},
issue = {11},
pages = {2742–2771},
publisher = {elsevier},
school = {Florida International University},
abstract = {With the recent initiatives to upgrade the existing power grid to the Smart Grid (SG), there has been a significant interest in the design and development of an efficient communications infrastructure for connecting different components of the SG. In addition to the currently used underlying networks and protocols, new wired/wireless approaches are being planned for deployment for different components/applications of the SG. Based on the data requirements of the applications, new challenges have arisen at the network layer of the protocol stack with respect to routing and data forwarding. In this paper, we focus on the routing issues in the SG communications infrastructure which consists of different network components, such as Home Area Networks (HANs), Neighborhood Area Networks (NANs) and Wide Area Networks (WANs). We provide a comprehensive survey of the existing routing research and analyze the},
keywords = {Smart Grid},
pubstate = {published},
tppubtype = {article}
}
Citations: 18671
h-index: 54
i10-index: 162