2020
DOI: 10.1109/tii.2020.2974258
|View full text |Cite
|
Sign up to set email alerts
|

Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections With Privacy Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(49 citation statements)
references
References 28 publications
0
49
0
Order By: Relevance
“…Since log-in and authentication phases are frequently executed, only these two phases are considered here for overhead calculations as given in the existing works of literature. For the calculation of execution time, we have considered the hardware platform as taken by several pieces of research 41,58,77 which comprises of Intel dual-core processor with a clock speed of 2.20 GHz, Ubuntu 12.04.1 LTS 32 bit Operating System and 2 GB memory. All of the cryptographic operations are utilized with a fundamental cryptographic PBC library (version 0.5.12) 78-80 built on the GMP Library (version 5.0.5).…”
Section: Security Featuresmentioning
confidence: 99%
“…Since log-in and authentication phases are frequently executed, only these two phases are considered here for overhead calculations as given in the existing works of literature. For the calculation of execution time, we have considered the hardware platform as taken by several pieces of research 41,58,77 which comprises of Intel dual-core processor with a clock speed of 2.20 GHz, Ubuntu 12.04.1 LTS 32 bit Operating System and 2 GB memory. All of the cryptographic operations are utilized with a fundamental cryptographic PBC library (version 0.5.12) 78-80 built on the GMP Library (version 5.0.5).…”
Section: Security Featuresmentioning
confidence: 99%
“…There are a lot of security protocols that have been proposed in recent years for V2G communications [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32]. Most of mentioned schemes could not provide one or more important features in both terms of security and efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…However, their proposed scheme not only has the disadvantage of Gope's scheme in [29], but also uses heavyweight cryptographic primitives. Quite recently in 2020, Abbasinezhad-Mood et al [31] have presented a key agreement protocol for V2G connections based on escrow-less Chebyshev chaotic map. Despite providing good security features, their scheme endures of lacking location privacy, physical security, and heavyweight design.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A CL-NIKE protocol does not allow the leakage of both x A and D A or the private key. is is very different from authenticated KE protocols because authenticated KE protocols use ephemeral keys [24,25], and the security of the shared key could be guaranteed by the ephemeral keys even if both participants' private keys are lost. In order to realize the noninteractive key establishment, there is no ephemeral keys used in NIKE protocols; thus, the leakage of private keys is not allowed in NIKE protocols.…”
Section: Security and Communication Networkmentioning
confidence: 99%