2023
DOI: 10.3390/s23083991
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System

Abstract: The IoT-enabled Smart Grid uses IoT smart devices to collect the private electricity data of consumers and send it to service providers over the public network, which leads to some new security problems. To ensure the communication security in a smart grid, many researches are focusing on using authentication and key agreement protocols to protect against cyber attacks. Unfortunately, most of them are vulnerable to various attacks. In this paper, we analyze the security of an existent protocol by introducing a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(12 citation statements)
references
References 37 publications
0
11
0
Order By: Relevance
“…Although identity protection is assured, this technique incurs high computation costs [6]. To offer efficiency in smart grids, lightweight authentication schemes are developed in [1,6,29,[31][32][33][34]. However, the schemes in [6,31,32] have not been evaluated against de-synchronization attacks.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Although identity protection is assured, this technique incurs high computation costs [6]. To offer efficiency in smart grids, lightweight authentication schemes are developed in [1,6,29,[31][32][33][34]. However, the schemes in [6,31,32] have not been evaluated against de-synchronization attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, the protocol in [29] has not been evaluated against spoofing and guessing attacks. Although the schemes in [1,33] are resilient against de-synchronization attacks, they have not been evaluated against spoofing attacks. On the other hand, the scheme in [34] cannot withstand desynchronization attacks [29].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations