2020
DOI: 10.1016/j.ijepes.2020.106121
|View full text |Cite
|
Sign up to set email alerts
|

PALK: Password-based anonymous lightweight key agreement framework for smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 74 publications
(32 citation statements)
references
References 28 publications
0
24
0
Order By: Relevance
“…Reference [33] combined Physical Unclonable Function (PUF) and ECC to propose an access control and authentication scheme suitable for Telecare Information System. ECC is used in smart grids and implemented secure authentication protocols [34]. Reference [35] proved that [34] had incorrect login and authentication phase and proposed a quick solution to fix the pertinent flaws of the PALK.…”
Section: Overview Of Elliptic Curve Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…Reference [33] combined Physical Unclonable Function (PUF) and ECC to propose an access control and authentication scheme suitable for Telecare Information System. ECC is used in smart grids and implemented secure authentication protocols [34]. Reference [35] proved that [34] had incorrect login and authentication phase and proposed a quick solution to fix the pertinent flaws of the PALK.…”
Section: Overview Of Elliptic Curve Cryptographymentioning
confidence: 99%
“…ECC is used in smart grids and implemented secure authentication protocols [34]. Reference [35] proved that [34] had incorrect login and authentication phase and proposed a quick solution to fix the pertinent flaws of the PALK. A robust authentication and access control protocol for securing wireless healthcare sensor networks with ECC [36].…”
Section: Overview Of Elliptic Curve Cryptographymentioning
confidence: 99%
“…Some assumptions for A's abilities and a threat model 29 for the DA‐DS protocol are assumed; below, we describe them briefly.…”
Section: Preliminariesmentioning
confidence: 99%
“…The shared secret between S and A u can be agreed upon using any key agreement methods which are secure. 30 The information is stored by the A u as well as S for further phases. The registration phase is as depicted in Figure 3.…”
Section: Registration Phasesmentioning
confidence: 99%
“…The S registers itself with the A u and gets a S id and a shared secret code N cs . The shared secret between S and A u can be agreed upon using any key agreement methods which are secure 30 . The information is stored by the A u as well as S for further phases.…”
Section: Proposed Modelmentioning
confidence: 99%