2014
DOI: 10.1109/jsyst.2013.2271537
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
169
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 247 publications
(170 citation statements)
references
References 23 publications
0
169
0
1
Order By: Relevance
“…This is the proof of membership. A good example of this in the context of a smart grid and smart meter is provided in [14]. c) Consensus model: To avoid any influence of a malicious node, the simple consensus algorithm described in Table II is widely adopted in the blockchain world.…”
Section: B General Designmentioning
confidence: 99%
“…This is the proof of membership. A good example of this in the context of a smart grid and smart meter is provided in [14]. c) Consensus model: To avoid any influence of a malicious node, the simple consensus algorithm described in Table II is widely adopted in the blockchain world.…”
Section: B General Designmentioning
confidence: 99%
“…However, this scheme neither discusses the generated overhead nor provides authentication in a home environment. Recently, an authentication scheme using a Merkle hash tree technique was proposed to prevent replay, injection, and message modification attacks [23]. However, communication only between the HAN and the NAN is considered.…”
Section: Related Workmentioning
confidence: 99%
“…However, the storage overhead in the smart meters cannot be neglected due to the fact that smart meters storage ability is limited [12][13][14][15].…”
Section: Storage Overheadmentioning
confidence: 99%