2019
DOI: 10.1002/dac.4137
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure

Abstract: Sprouting populace mass within the urban areas furnishes critical challenges of providing uninterruptible community services to fulfill the primitive needs of inhabitants in smart cities. Smart cities facilitate and uplift the living standards of inhabitants through various smart systems or infrastructures, and smart grid is one of them. Secure transmission is a key requirement in the advanced metering infrastructure (AMI) of most smart grids, and key establishment cryptographic protocols can be used to achiev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 46 publications
(22 citation statements)
references
References 25 publications
(59 reference statements)
0
22
0
Order By: Relevance
“…This method is helpless to brute-force attack. 4 The usage of PRNG in this approach can help the intruder to use the short period of pseudo-random number generator (PRNG) to generate private keys. 21 In the study by Ullah et al, 5 another technique of data security for WSNs is given.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This method is helpless to brute-force attack. 4 The usage of PRNG in this approach can help the intruder to use the short period of pseudo-random number generator (PRNG) to generate private keys. 21 In the study by Ullah et al, 5 another technique of data security for WSNs is given.…”
Section: Resultsmentioning
confidence: 99%
“…The analysis in Elhoseny et al 3 introduced a new technique named as EGASON. This approach uses ECC for a key generation 4 and then the genetic algorithm approach is used for the encryption and decoding of information. While using ECC, this approach may suffer from brute-force attack and high computation cost in comparison with symmetric key functions.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…This work is secure and efficient in communication system. Mahmood et al [58] presented an enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. Hussain et al [59] discussed security weaknesses of Das et al's protocol [60] like traceability, stolenverifier attack, stolen smart device attack and non provision of perfect forward secrecy.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, as the adaption of e-Healthcare increases, the need of patient-privacy should be the first priority as all the communication is taking place through public channel [6], [7]. To prevent various threats, an authentication scheme can be implemented to ensure that TMIS are only accessed by legitimate users [8]- [11]. Recently, Wu et al [12] introduced a two-factor authentication scheme by employing smart-card and password for TMIS.…”
Section: Introductionmentioning
confidence: 99%