2011
DOI: 10.1109/tsg.2011.2138172
|View full text |Cite
|
Sign up to set email alerts
|

Multicast Authentication in the Smart Grid With One-Time Signature

Abstract: Abstract-Multicast has been envisioned to be useful in many smart grid applications such as demand-response, wide area protection, in-substation protection and various operation and control. Since the multicast messages are related to critical control, authentication is necessary to prevent message forgery attacks. In this paper, we first identify the requirements of multicast communication and multicast authentication in the smart grid. Based on these requirements, we find that one-time signature based multic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
90
0
2

Year Published

2012
2012
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 158 publications
(92 citation statements)
references
References 19 publications
0
90
0
2
Order By: Relevance
“…The schemes relying on per-packet signature and verification introduce substantial computation cost. In this direction, Li and Cao [41] have introduced a one-time signature scheme for multicast authentication in the SG, which reduces the storage cost by eight-times and lowers signature size by 40% as compared to HORS by Reyzin and Reyzin [42], and prevents message forgery attacks. After that, a batch verification and signature authorization protocol that generates low overhead and provides fault tolerance was proposed by Li et al [43].…”
Section: Obj-2: Low Computational and Storage Cost And Obj-3: Low Commentioning
confidence: 99%
“…The schemes relying on per-packet signature and verification introduce substantial computation cost. In this direction, Li and Cao [41] have introduced a one-time signature scheme for multicast authentication in the SG, which reduces the storage cost by eight-times and lowers signature size by 40% as compared to HORS by Reyzin and Reyzin [42], and prevents message forgery attacks. After that, a batch verification and signature authorization protocol that generates low overhead and provides fault tolerance was proposed by Li et al [43].…”
Section: Obj-2: Low Computational and Storage Cost And Obj-3: Low Commentioning
confidence: 99%
“…A watermark is a recognizable image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness or density variations in the paper [16]. Watermarks are commonly used as security features of banknotes, passports, postage stamps, and other documents to prevent counterfeiting.…”
Section: Digital Watermark Based Authentica-tionmentioning
confidence: 99%
“…In [2], pattern identification based approach using probabilistic neural network is proposed to detect the fake malicious measurements online. In order to enhance precision and reduce process latency, similar approach such as evidence theory [15], support vector machine [16], and orthogonal least square based radial basis function neural network [17] has been investigated. However, these methods could not satisfy both latency and generalization requirement since state space complexity increases substantially for substations with complex diagram.…”
Section: Introductionmentioning
confidence: 99%
“…According to Qinghua Li and Guohong Cao [2] multicast authentication has been envisioned to be useful in many Smart Grid applications such as demand-response, wide area protection, in-substation protection, and various operation and control. Since the multicast messages are related to critical control, authentication is necessary to prevent message forgery attacks.…”
Section: Related Workmentioning
confidence: 99%