{"id":"https://openalex.org/W7152544544","doi":"https://doi.org/10.1109/icecet63943.2025.11472008","title":"Lightweight LoRa Privacy and Security for Application in Smart Grid","display_name":"Lightweight LoRa Privacy and Security for Application in Smart Grid","publication_year":2025,"publication_date":"2025-07-03","ids":{"openalex":"https://openalex.org/W7152544544","doi":"https://doi.org/10.1109/icecet63943.2025.11472008"},"language":null,"primary_location":{"id":"doi:10.1109/icecet63943.2025.11472008","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086666061","display_name":"Zephania Philani Khumalo","orcid":null},"institutions":[{"id":"https://openalex.org/I177181097","display_name":"Durban University of Technology","ror":"https://ror.org/0303y7a51","country_code":"ZA","type":"education","lineage":["https://openalex.org/I177181097"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Zephania Philani Khumalo","raw_affiliation_strings":["Durban University of Technology (DUT),Steve Biko Campus,Electronic Engineering Department,Durban,South Africa"],"affiliations":[{"raw_affiliation_string":"Durban University of Technology (DUT),Steve Biko Campus,Electronic Engineering Department,Durban,South Africa","institution_ids":["https://openalex.org/I177181097"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5116882549","display_name":"Mbulelo S.P. Ngong","orcid":null},"institutions":[{"id":"https://openalex.org/I177181097","display_name":"Durban University of Technology","ror":"https://ror.org/0303y7a51","country_code":"ZA","type":"education","lineage":["https://openalex.org/I177181097"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Mbulelo SP Ngongoma","raw_affiliation_strings":["Durban University of Technology (DUT),Steve Biko Campus,Electronic Engineering Department,Durban,South Africa"],"affiliations":[{"raw_affiliation_string":"Durban University of Technology (DUT),Steve Biko Campus,Electronic Engineering Department,Durban,South Africa","institution_ids":["https://openalex.org/I177181097"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086666061"],"corresponding_institution_ids":["https://openalex.org/I177181097"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66457019,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.933899998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.933899998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.014600000344216824,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.007199999876320362,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3808000087738037},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.3377000093460083},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3111000061035156},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.2955000102519989},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.2750999927520752},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.26910001039505005}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5866000056266785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5302000045776367},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3808000087738037},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.3377000093460083},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3111000061035156},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.26910001039505005},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.25450000166893005},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25380000472068787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecet63943.2025.11472008","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet63943.2025.11472008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1675339804","https://openalex.org/W4405336574"],"related_works":[],"abstract_inverted_index":{"The":[0,74],"integration":[1],"of":[2,41,100,129,149],"Long":[3],"Range":[4],"(LoRa)":[5],"communication":[6,69],"technology":[7],"into":[8],"smart":[9,43,136,151],"grid":[10,152],"applications":[11],"provides":[12,110],"a":[13,48,140],"cost-effective":[14],"and":[15,24,32,51,81,92,114,121,147],"energy-efficient":[16],"solution":[17,142],"for":[18,143],"long-range":[19],"data":[20,89],"transmission.":[21],"However,":[22],"security":[23,52],"privacy":[25,50],"concerns,":[26],"such":[27],"as":[28],"eavesdropping,":[29],"replay":[30],"attacks,":[31],"unauthorized":[33],"access,":[34],"pose":[35],"significant":[36],"challenges":[37],"to":[38,66,87],"the":[39,56,97,108,127,130,145],"reliability":[40,148],"LoRa-based":[42,135],"grids.":[44],"This":[45],"paper":[46],"presents":[47],"lightweight":[49,78],"framework":[53],"that":[54],"leverages":[55],"NTRU":[57],"(N-th":[58],"degree":[59],"truncated":[60],"polynomial":[61],"ring":[62],"unit)":[63],"encryption":[64],"algorithm":[65],"ensure":[67],"secure":[68],"with":[70],"minimal":[71],"computational":[72],"overhead.":[73],"proposed":[75,131],"scheme":[76,109],"incorporates":[77],"authentication":[79],"protocols":[80],"an":[82],"optimized":[83],"key":[84],"management":[85],"strategy":[86],"enhance":[88],"confidentiality,":[90],"integrity,":[91],"access":[93],"control":[94],"while":[95,117],"addressing":[96],"resource":[98],"constraints":[99],"LoRa":[101],"devices.":[102],"By":[103],"integrating":[104],"NTRU\u2019s":[105],"lattice-based":[106],"encryption,":[107],"resistance":[111],"against":[112],"quantum":[113],"classical":[115],"attacks":[116],"maintaining":[118],"low":[119],"latency":[120],"energy":[122],"efficiency.":[123],"Performance":[124],"evaluations":[125],"demonstrate":[126],"effectiveness":[128],"approach":[132],"in":[133],"securing":[134],"grids,":[137],"making":[138],"it":[139],"viable":[141],"enhancing":[144],"resilience":[146],"next-generation":[150],"networks.":[153]},"counts_by_year":[],"updated_date":"2026-04-11T06:13:24.991567","created_date":"2026-04-10T00:00:00"}
