2021
DOI: 10.1155/2021/5560621
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Blockchain-Based Authentication and Authorization Protocol for Smart Grid

Abstract: Authentication and authorization (A & A) mechanisms are critical to the security of Internet of Things (IoT) applications. Smart grid system processing and exchanging data without human intervention, known as smart grids, are well-known as IoT scenarios. Entities in such smart grid systems need to identify and validate one another and ensure the integrity of data exchange mechanisms. However, at present, most commonly used A & A protocols are centralized, resulting in security risks such as information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 24 publications
0
16
1
Order By: Relevance
“…Zhong et al [166] propose an authentication and authorization protocol for a smart power grid system using a consortium blockchain. The system addresses the common security threats to the BC authentication system for smart grid networks by analyzing various threat models.…”
Section: E Generic Bc-based Idms Solutionsmentioning
confidence: 99%
See 4 more Smart Citations
“…Zhong et al [166] propose an authentication and authorization protocol for a smart power grid system using a consortium blockchain. The system addresses the common security threats to the BC authentication system for smart grid networks by analyzing various threat models.…”
Section: E Generic Bc-based Idms Solutionsmentioning
confidence: 99%
“…In this respect, however, every network is unique. By using user validation, a chain of trust mechanism, and building consensus protocols that imply an increased cost per identity this attack can be resisted in a blockchain [17], [19], [161], [166], [210], [212]. Many blockchains employ various consensus methods, including PoW, PoS, and DPoS, to prevent Sybil attacks [166].…”
Section: E Sybil Attackmentioning
confidence: 99%
See 3 more Smart Citations