2020
DOI: 10.1109/tii.2019.2927512
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Key Establishment Scheme for Communications of Smart Meters and Service Providers in Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(40 citation statements)
references
References 22 publications
0
27
0
Order By: Relevance
“…The advent of bidirectional communications in SG turns electrical components intelligent. Advanced computing in SG use information technologies and business approach to make it ready for modern time load dispatch, scheduling, and control [22,26,30]. The deployment of advanced information technologies like efficient data communication, intelligent electronics devices, and internet of things (IoT), increases the overall performance of power systems.…”
Section: Smart Grid -Power System Automation Scenariomentioning
confidence: 99%
“…The advent of bidirectional communications in SG turns electrical components intelligent. Advanced computing in SG use information technologies and business approach to make it ready for modern time load dispatch, scheduling, and control [22,26,30]. The deployment of advanced information technologies like efficient data communication, intelligent electronics devices, and internet of things (IoT), increases the overall performance of power systems.…”
Section: Smart Grid -Power System Automation Scenariomentioning
confidence: 99%
“…The authors implemented the cryptographic elements on two state-of-the-art ARM chips, which was beneficial for the researches in this field. In 2019, Abbasinezhad-Mood et al [10] talked about the present key establishment schemes' security weaknesses, indicated that many solutions suffered from known session-specific temporary information attack, private key leakage, key escrow problem. Then, they proposed a key establishment scheme that could be free from these security challenges and key escrow problem, computational and communication costs were also acceptable.…”
Section: Related Workmentioning
confidence: 99%
“…A CL-NIKE protocol does not allow the leakage of both x A and D A or the private key. is is very different from authenticated KE protocols because authenticated KE protocols use ephemeral keys [24,25], and the security of the shared key could be guaranteed by the ephemeral keys even if both participants' private keys are lost. In order to realize the noninteractive key establishment, there is no ephemeral keys used in NIKE protocols; thus, the leakage of private keys is not allowed in NIKE protocols.…”
Section: Security and Communication Networkmentioning
confidence: 99%