{"id":"https://openalex.org/W4400976747","doi":"https://doi.org/10.1145/3664476.3670925","title":"How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting Anything","display_name":"How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting Anything","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400976747","doi":"https://doi.org/10.1145/3664476.3670925"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670925","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670925","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3664476.3670925","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035886106","display_name":"Oliver Eigner","orcid":null},"institutions":[{"id":"https://openalex.org/I25485817","display_name":"St. P\u00f6lten University of Applied Sciences","ror":"https://ror.org/039a2re55","country_code":"AT","type":"education","lineage":["https://openalex.org/I25485817"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Oliver Eigner","raw_affiliation_strings":["Department of Computer Science and Security, St. P\u00f6lten University of Applied Sciences, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Security, St. P\u00f6lten University of Applied Sciences, Austria","institution_ids":["https://openalex.org/I25485817"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022443776","display_name":"Hubert Sch\u00f6lnast","orcid":"https://orcid.org/0000-0002-0179-8785"},"institutions":[{"id":"https://openalex.org/I25485817","display_name":"St. P\u00f6lten University of Applied Sciences","ror":"https://ror.org/039a2re55","country_code":"AT","type":"education","lineage":["https://openalex.org/I25485817"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Hubert Sch\u00f6lnast","raw_affiliation_strings":["Department of Computer Science and Security, St. P\u00f6lten University of Applied Sciences, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Security, St. P\u00f6lten University of Applied Sciences, Austria","institution_ids":["https://openalex.org/I25485817"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048784616","display_name":"Paul Tavolato","orcid":null},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Paul Tavolato","raw_affiliation_strings":["Faculty of Computer Science, University of Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of Vienna, Austria","institution_ids":["https://openalex.org/I129774422"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035886106"],"corresponding_institution_ids":["https://openalex.org/I25485817"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12144857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7490086555480957},{"id":"https://openalex.org/keywords/metre","display_name":"Metre","score":0.6450181603431702},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5276600122451782},{"id":"https://openalex.org/keywords/smart-meter","display_name":"Smart meter","score":0.4732704162597656},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4387419819831848},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2076568901538849},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.14044752717018127},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.12003761529922485},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07504287362098694}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7490086555480957},{"id":"https://openalex.org/C151011524","wikidata":"https://www.wikidata.org/wiki/Q11573","display_name":"Metre","level":2,"score":0.6450181603431702},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5276600122451782},{"id":"https://openalex.org/C2779510800","wikidata":"https://www.wikidata.org/wiki/Q1630602","display_name":"Smart meter","level":3,"score":0.4732704162597656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4387419819831848},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2076568901538849},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.14044752717018127},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.12003761529922485},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07504287362098694},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3670925","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670925","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3664476.3670925","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670925","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1508221334","https://openalex.org/W1863648891","https://openalex.org/W1892452466","https://openalex.org/W1996126254","https://openalex.org/W2042420160","https://openalex.org/W2067792375","https://openalex.org/W2122646361","https://openalex.org/W2154663898","https://openalex.org/W2609968973","https://openalex.org/W2736542375","https://openalex.org/W2941500089","https://openalex.org/W2962742271","https://openalex.org/W2998233014","https://openalex.org/W3003925524","https://openalex.org/W4321108450","https://openalex.org/W4385518349","https://openalex.org/W6630749886"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2805944307","https://openalex.org/W2389925946","https://openalex.org/W1937929880","https://openalex.org/W4365794531","https://openalex.org/W3117127269","https://openalex.org/W3172533223"],"abstract_inverted_index":{"Smart":[0],"meter":[1,87],"networks":[2],"are":[3,127,139],"part":[4],"of":[5,19,25,30,36,65,132,145,175],"the":[6,26,34,55,63,66,90,104,133,143,151,172],"critical":[7],"infrastructure":[8],"and":[9,48,100,110,137,157,169],"therefore":[10],"central":[11,152],"to":[12,33,81,123,130],"IT":[13],"security":[14],"consideration.":[15],"Besides":[16],"various":[17],"forms":[18],"access":[20],"control":[21],"a":[22,72,107,111,167,176],"permanent":[23],"monitoring":[24,42],"network":[27,67,76,108],"traffic":[28],"is":[29,95],"utmost":[31],"importance":[32],"detection":[35],"malicious":[37],"activities":[38],"taking":[39],"place.":[40],"Such":[41],"must":[43],"happen":[44],"in":[45,54,85,171],"real":[46],"time":[47],"should":[49,158],"possibly":[50],"be":[51,79,121],"implementable":[52],"everywhere":[53],"network.":[56],"These":[57],"requirements":[58],"do":[59],"not":[60,128,148],"allow":[61],"for":[62,92],"decryption":[64],"traffic.":[68],"The":[69,114,162],"paper":[70],"describes":[71],"method":[73,119,163],"by":[74,150],"which":[75],"packets":[77,125],"can":[78,102,120],"assigned":[80],"use":[82,112,135,146],"cases":[83,136,147],"common":[84],"smart":[86],"infrastructures":[88],"without":[89],"need":[91],"decryption.":[93],"It":[94],"based":[96],"solely":[97],"on":[98],"metadata":[99],"reliably":[101],"establish":[103],"relationship":[105],"between":[106],"packet":[109],"case.":[113],"information":[115],"calculated":[116],"with":[117],"this":[118],"used":[122],"detect":[124],"that":[126],"pertaining":[129],"any":[131],"allowed":[134],"hence":[138],"highly":[140],"suspicious.":[141],"Moreover,":[142],"execution":[144],"initiated":[149],"server":[153],"become":[154],"evident,":[155],"too,":[156],"raise":[159],"corresponding":[160],"alerts.":[161],"was":[164],"implemented":[165],"as":[166],"proof-of-concept":[168],"tested":[170],"real-world":[173],"environment":[174],"medium-sized":[177],"city.":[178]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
