2020
DOI: 10.1109/jsyst.2019.2963235
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Mutual Authentication for Smart Grid Neighborhood Area Network Communications Based on Physically Unclonable Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
56
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 60 publications
(56 citation statements)
references
References 35 publications
0
56
0
Order By: Relevance
“…They showed that compare to previous schemes not only their scheme has better security claims but also it performed better than schemes [11] and [12] in terms of storage, communication, and computational costs. Quite recently in 2020, Kaveh et al presented a mutual authentication scheme based on physically unclonable function (PUF) for NAN communication system of the smart grid [14]. In the proposed scheme, a PUF-based one-time pad key has been deployed that leads to increasing the security of the system against brute-force and physical attacks.…”
Section: Related Workmentioning
confidence: 99%
“…They showed that compare to previous schemes not only their scheme has better security claims but also it performed better than schemes [11] and [12] in terms of storage, communication, and computational costs. Quite recently in 2020, Kaveh et al presented a mutual authentication scheme based on physically unclonable function (PUF) for NAN communication system of the smart grid [14]. In the proposed scheme, a PUF-based one-time pad key has been deployed that leads to increasing the security of the system against brute-force and physical attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The Boneh, Goh, and Nissim ( BGN ) cryptosystem and blinding factors were used to develop data aggregation with a privacy‐preserving scheme to resist the inside attackers from the learning of customer behavior patterns 23 . The Lifted ElGamal encryption method was introduced to provide SM i data collection with privacy and used distributed blinded values for efficient communication during SM i data collection 24 . The privacy‐preserving SM i reading collection scheme was introduced by Schaller et al 25 with the help of blinded values to detect the information leakage during the data communication.…”
Section: Related Workmentioning
confidence: 99%
“…Since the manufacturing process variations are entirely random, the PUFs responses are usually hard to predict [4]. These unique features of PUF make it very suitable for security applications such as key generation, authentication, and identification [5]- [9].…”
Section: Introductionmentioning
confidence: 99%