2019
DOI: 10.1109/tii.2019.2922697
|View full text |Cite
|
Sign up to set email alerts
|

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

2
89
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 103 publications
(91 citation statements)
references
References 20 publications
2
89
0
Order By: Relevance
“…This section proposes a privacy-preserving lightweight authentication scheme for demand response management in the SG environment to overcome various security drawbacks of Kumar et al's protocol [6]. In our scheme, the general data flow of the SG system model in public channel is the same as Kumar et al's scheme [6]. The proposed scheme is composed of seven process: pre-deployment, SG registration, UC registration, authentication, dynamic SG device addition, and dynamic UC addition.…”
Section: Proposed Schemementioning
confidence: 99%
See 4 more Smart Citations
“…This section proposes a privacy-preserving lightweight authentication scheme for demand response management in the SG environment to overcome various security drawbacks of Kumar et al's protocol [6]. In our scheme, the general data flow of the SG system model in public channel is the same as Kumar et al's scheme [6]. The proposed scheme is composed of seven process: pre-deployment, SG registration, UC registration, authentication, dynamic SG device addition, and dynamic UC addition.…”
Section: Proposed Schemementioning
confidence: 99%
“…In Table 2, we evaluate the security features of the proposed scheme with existing schemes [6,20,21,28]. The schemes in [20,28] cannot withstand session key disclosure attack and those in [20,21,28] provide dynamic node addition phase.…”
Section: Security Featuresmentioning
confidence: 99%
See 3 more Smart Citations