The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1016/j.future.2017.05.002
|View full text |Cite
|
Sign up to set email alerts
|

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

2
135
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 247 publications
(154 citation statements)
references
References 22 publications
2
135
0
Order By: Relevance
“…In this phase, the SM i and the NG share a key K i by running a key agreement protocol , , . The following steps are performed after the shared key generation.…”
Section: The Security‐enhanced Lightweight Communication Schemementioning
confidence: 99%
“…In this phase, the SM i and the NG share a key K i by running a key agreement protocol , , . The following steps are performed after the shared key generation.…”
Section: The Security‐enhanced Lightweight Communication Schemementioning
confidence: 99%
“…The security must be fully considered from the commencement of data collection up to their reception at the control and management center. Intensive review of the previous works shows that the security of SG is a very interesting topic and so many papers have discussed this challenging requirement. To have a taxonomy of these works, we can mention the works that have considered the key management in SG, the many works that have paid attention to false data injection attack, the miscellaneous works that have proposed privacy‐preserving schemes, and the few works that have taken the advantage of lattice‐based cryptosystem into account …”
Section: Introductionmentioning
confidence: 99%
“…For the message transmission, they have used a similar strategy to Fouda et al as EncKi(),,MiTiHMACKi()Mi. Quite recently, Mahmood et al have proposed another identity‐based key establishment protocol that can be used by different entities of SG. However, Mahmood et al have not discussed the message transmission process.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations