2014
DOI: 10.1002/sec.1006
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and fault-diagnosable authentication architecture for AMI in smart grid

Abstract: The recently emerging advanced metering infrastructure (AMI) is envisioned to be one of the most prominent features of smart grid. Security, especially authentication, is crucial for the success of large-scale AMI deployment. Unfortunately, AMI's natural requirements-efficiency, scalability, fault diagnoses, and reliability-cannot be fully satisfied by existing authentication schemes. To validate the delay-tolerant AMI metering data, we present a new authentication architecture that boosts the utilization of a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Li and Hong [19] proposed a signature scheme for wireless sensor networks and based on the signature scheme they devised a certificate-less access control scheme. The authentication scheme of Li et al [20] enables batch verification in the message verification process, which significantly reduces the computation cost. Lu et al [21] proposed a secure and privacy-preserving framework for healthcare emergency, the scheme enables two users to authenticate each other without the help of a trusted third party.…”
Section: Related Workmentioning
confidence: 99%
“…Li and Hong [19] proposed a signature scheme for wireless sensor networks and based on the signature scheme they devised a certificate-less access control scheme. The authentication scheme of Li et al [20] enables batch verification in the message verification process, which significantly reduces the computation cost. Lu et al [21] proposed a secure and privacy-preserving framework for healthcare emergency, the scheme enables two users to authenticate each other without the help of a trusted third party.…”
Section: Related Workmentioning
confidence: 99%
“…They also introduced an incremental verification technique that allows the collector node to identify SMs feeding fake CDs. Li et al [30] proposed an efficient and fault-diagnosable authentication architecture for AMI, which is also based on the BLS signature scheme. To further reduce overheads, Lu et al [8] proposed a scheme which packs user's multidimensional CDs into a single ECD, whereas Ruj and Nayak [9] proposed a decentralized aggregation method, in which data are aggregated at local gateways en route for a central entity.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, several authentication protocols have been proposed [ 4 19 ] to protect the data transmission between communication entities. In an attempt to prevent the adversary from obtaining the daily habit of the customer through analyzing the electricity usage pattern, T.W.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with previous studies, this protocol was more efficient due to the usage of ECC, but a primitive password should be preloaded between an appliance and the Home Area Network controller, which made this solution hard to scale and might arouse an intractable problem of password table maintenance. Recently, Li et al proposed fault-diagnosable authentication architecture for advanced metering infrastructure in smart grid [ 19 ]. Since this work only focused on authentication, key negotiation was not considered in the proposed authentication mechanism.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation