2020 IEEE 6th World Forum on Internet of Things (WF-IoT) 2020
DOI: 10.1109/wf-iot48130.2020.9221442
|View full text |Cite
|
Sign up to set email alerts
|

A Trusted Authentication Scheme for IoT-based Smart Grid Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…To increase effectiveness and performance, these methods are used in a variety of sectors, including healthcare, transit, and industry. CPS, however, faces significant difficulties with security and privacy issues because they are susceptible to cyberattacks that could jeopardize their usefulness and security levels [24,25,26]. To handle these issues, a number of security and private approaches have been put forth for different use cases.…”
Section: Review Of Security Models For Securing Cyber Physical Deploy...mentioning
confidence: 99%
“…To increase effectiveness and performance, these methods are used in a variety of sectors, including healthcare, transit, and industry. CPS, however, faces significant difficulties with security and privacy issues because they are susceptible to cyberattacks that could jeopardize their usefulness and security levels [24,25,26]. To handle these issues, a number of security and private approaches have been put forth for different use cases.…”
Section: Review Of Security Models For Securing Cyber Physical Deploy...mentioning
confidence: 99%
“…PUFs use a challenge-response mechanism to obtain unique devicespecific binary secret keys. SPUFs have recently emerged as a promising hardwarebased security primitive to protect intelligent systems, including consumer electronics and smart grid, against invasive and non-invasive attacks [33,34]. Such attacks include counterfeit parts in electronics consumer manufacturing, physical tampering and reverse-engineering attacks used by an adversary for design cloning and/or overbidding, detection of fault-injection attacks on SRAM and EEPROM based devices, and detection of malicious circuitry such as hardware Trojans [22-24, 31, 35-44].…”
Section: Related Workmentioning
confidence: 99%
“…The storage requirement for the authentication levels of the proposed scheme according to NIST standards is also explored in this section. For L1, the authentication process is performed where 128 different authentication bits are encrypted and sent every time a PEV needs to authenticate itself to the UCCC [34]. For a community of 200 vehicles, an external hard drive with a size of 25,600 bits = 3.12 kB (128× 200) is required to store the encrypted PUF secret key information in terms of encrypted binary PUF response bits.…”
Section: Storage Requirementsmentioning
confidence: 99%