2020
DOI: 10.1109/tii.2019.2936278
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
125
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 235 publications
(128 citation statements)
references
References 27 publications
3
125
0
Order By: Relevance
“…Badr et al: Smart Parking System with Privacy-preservation and Reputation using Blockchain C [1] C [2] C [3] C [4] C [5] C [6] C [7] C [8] C [9] C [10] C [11] C [12] C [13] C [14] C [15] C [16] C [17] C [18] C [19] C [20] C [21] C [22] C [23] C [24] C [25] C [26] C [27] C [28] C [29] C [30] C [31] C [32] C [33] C [34] C [35]…”
Section: B System Initializationmentioning
confidence: 99%
See 1 more Smart Citation
“…Badr et al: Smart Parking System with Privacy-preservation and Reputation using Blockchain C [1] C [2] C [3] C [4] C [5] C [6] C [7] C [8] C [9] C [10] C [11] C [12] C [13] C [14] C [15] C [16] C [17] C [18] C [19] C [20] C [21] C [22] C [23] C [24] C [25] C [26] C [27] C [28] C [29] C [30] C [31] C [32] C [33] C [34] C [35]…”
Section: B System Initializationmentioning
confidence: 99%
“…Motivated by the research gaps in the literature in terms of security and privacy as explained above, in this paper, we propose a blockchain-based smart parking system with privacy preservation and reputation management. In recent years, a promising blockchain technology with advantages of decentralization, security and transparency has been used in different applications, such as intelligent transportation systems [22], [23], eHealth systems [24], smart grids [25], human resource record management [26], wireless sensor networks [27], etc. Creating a blockchain network from the parking lots to manage the parking service could tackle the previously mentioned security issues as follows.…”
Section: Introductionmentioning
confidence: 99%
“…-Identity This layer distinguishes unequivocally each participating identity [18]. This does not necessarily mean that there is a direct connection with physical identity, but that, at least, the different nodes are uniquely recognized.…”
Section: A Blockchain As a Distributed Computer Systemmentioning
confidence: 99%
“…Regarding process-oriented applications, as noted by [4], these are applied in fields like billing [56] (also within specialized context like EV-charging), metering and data transferring [57], security [18], and in other processes affecting the energy business. An example is the solution given by [58].…”
Section: B Previous and Current Experiences In Dlt-energy Contextmentioning
confidence: 99%
“…The protocol minimises the vulnerabilities of IEC 62351 regarding the use of symmetric keys for communication encryption. Similarly, a novel anonymous authentication and key agreement protocol is presented in [154] providing methods of key update and revocation in aims of minimizing communication costs and employing conditional identity anonymity.…”
Section: B Authentication Authorization and Key Managementmentioning
confidence: 99%