2021
DOI: 10.1109/access.2021.3121291
|View full text |Cite
|
Sign up to set email alerts
|

ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids

Abstract: Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power grids. In an SG system, the smart meter (SM) is the critical component that collects the power usage information related to users and delivers the accumulated vital information to the central service provider (CSP) via the Internet, imperiled to numerous pernicious security threats. Consequently, it is crucial to preserve the integrity of the communication between SMs and CSP for the smooth running of the SG sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…Tanveer et al [ 252 ] used ECC and PUF to make reliable smart grid communication. The PUF was used to decrypt the secret keys in the smart meter.…”
Section: Iot Security Solutionsmentioning
confidence: 99%
“…Tanveer et al [ 252 ] used ECC and PUF to make reliable smart grid communication. The PUF was used to decrypt the secret keys in the smart meter.…”
Section: Iot Security Solutionsmentioning
confidence: 99%
“…Thakare and Kim [29] presented a cryptographic protocol for user authentication in IoT environments. Besides, Tanveer et al [30] proposes an anonymous and reliable authentication protocol for smart grid systems. All above-mentioned works, except [26] and [16], did not design their protocols with threefactor authentication.…”
Section: A Related Workmentioning
confidence: 99%
“…The Dolev-Yao (DY) [44], [45] is considered as the threat model (TM) for the proposed REAS-TMIS. Under the DY model, an adversary, denoted by A, has the capabilities of seizing all the messages exchanged during the AKE phase.…”
Section: B Attack Modelmentioning
confidence: 99%