2018
DOI: 10.1109/access.2018.2875681
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…ere is no uniform definition of the system scheme. e definition proposed by the United States industry is currently used a single system or a systemwide system to achieve the mission's objectives under established operating conditions [18]. e system scheme contains task planning and deployment, system operation mode, and other factors according to the circumstances of the operating conditions.…”
Section: Concept Of Scheme Evaluationmentioning
confidence: 99%
“…ere is no uniform definition of the system scheme. e definition proposed by the United States industry is currently used a single system or a systemwide system to achieve the mission's objectives under established operating conditions [18]. e system scheme contains task planning and deployment, system operation mode, and other factors according to the circumstances of the operating conditions.…”
Section: Concept Of Scheme Evaluationmentioning
confidence: 99%
“…Li et al, presented one two-way authentication scheme based on SM2 for the radio frequency identification system and proved it with BAN logic [25]. Li et al, proposed an improved SM2-based key agreement and a mutual identify authentication scheme for smart grid [26]. However, the security schemes above were all achieved by PKI systems, which have complicated certificate management and were not suitable for the power IoT with a large number of terminals.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 3 shows the comparison of the execution time in the proposed scheme and schemes [20,21,26]. We calculate the processing time of security gateway by increasing the number of the simulated concurrency from 1 to 10,000.…”
Section: Performance Analysismentioning
confidence: 99%
“…The categories of cryptographic approaches deployed in SG authentication are explained below. [24] Cryptography using hash-based message authentication code and Diffie-Hellman key establishment Cryptography PS10 [25] The secure chip that stores the provider credentials such as IP address, provider address, and associated phone number in a file included in the chip Hardware PS11 [26] Cryptography using Merkel trees depending on a hash function Cryptography PS12 [27] Hardware authentication approach using ring oscillator physically unclonable function (RO PUF) to derive keys Hardware PS13 [28] Password and symmetric key, and one hash function to ensure key integrity Password PS14 [29] Authentication approach based on certificateless cryptosystem Cryptography PS15 [30] Lightweight authentication approach using elliptic curve Cryptography PS16 [31] Cryptography using Diffie-Hellman key establishment and timestamps Cryptography PS17 [32] Cryptography based on lightweight Diffie-Hellman Cryptography PS18 [33] Authentication approach using elliptic curve cryptography Cryptography PS19 [34] Cryptography using PUF to derive keys Hardware PS20 [35] Enhanced elliptic curve cryptography-based authentication Cryptography PS21 [36] Lightweight elliptic curve approach using third party Cryptography PS22 [31] Cryptography using public key scheme with password data validation at server Password PS23 [37] Source authentication based on the concept of inf-TESLA Cryptography PS24 [38] Cryptography using a hash function with a secret key shared between parties, hash-based message authentication code (HMAC) Cryptography PS25 [39] Cryptography used a key exchanged protocol based on chaotic maps Cryptography PS26 [40] Signature and secret key based efficient authentication protocol against pollution attack (EAPA) Signature PS27 [41] Merkle-tree-based authentication scheme for SG Cryptography…”
Section: Extracting Informationmentioning
confidence: 99%