2022
DOI: 10.1007/s11227-022-04944-z
|View full text |Cite
|
Sign up to set email alerts
|

A novel efficient and lightweight authentication scheme for secure smart grid communication systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
0
0
Order By: Relevance
“…Digital watermarking in Block discrete cosine transform (DCT) domain is one of the most widely used digital watermarking algorithms, which has the advantages of good concealment and strong robustness. Moreover, the statistical distribution of coefficients in DCT domain has a good mathematical model, which can theoretically calculate the embedded watermark capacity [15]. Therefore, in this paper, DCT technology is used to embed digital watermark into high privacy information of power communication network.…”
Section: Watermark Embedding and Extractionmentioning
confidence: 99%
“…Digital watermarking in Block discrete cosine transform (DCT) domain is one of the most widely used digital watermarking algorithms, which has the advantages of good concealment and strong robustness. Moreover, the statistical distribution of coefficients in DCT domain has a good mathematical model, which can theoretically calculate the embedded watermark capacity [15]. Therefore, in this paper, DCT technology is used to embed digital watermark into high privacy information of power communication network.…”
Section: Watermark Embedding and Extractionmentioning
confidence: 99%
“…The smart grid can achieve reliability and flexibility for the devices in the power grid through the communication system, such as the mobile communication system and the integration of satellite communication network 1 . However, the integrated smart grid still faces some security challenges such as the injection attack and the replay attack, as given in Figure 1 2 . The lightweight continuous identity authentication protocol proposed can provide a solution for extending continuous identity authentication to IoT devices in satellite‐integrated smart grid, which can alleviate the pressure of resource constrained IoT devices in computing, communication, and other aspects, and achieve lightweight and efficient authentication.…”
Section: Introductionmentioning
confidence: 99%
“…1 However, the integrated smart grid still faces some security challenges such as the injection attack and the replay attack, as given in Figure 1. 2 The lightweight continuous identity authentication protocol proposed can provide a solution for extending continuous identity authentication to IoT devices in satellite-integrated smart grid, which can alleviate the pressure of resource constrained IoT devices in computing, communication, and other aspects, and achieve lightweight and efficient authentication. However, with the development of Quantum computer, Shor algorithm, 3 Grover algorithm, 4 and other algorithms, which pose a security threat to the satellite integrated smart grid using traditional cryptographic algorithms for identity authentication, and the satellite integrated smart grid environment may be attacked by quantum.…”
Section: Introductionmentioning
confidence: 99%