2014
DOI: 10.1109/jsyst.2013.2260942
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Authentication and Key Management Mechanisms for Smart Grid Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
126
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 171 publications
(127 citation statements)
references
References 16 publications
0
126
0
1
Order By: Relevance
“…A key agreement protocol for the SG is proposed in [20], which reduces the number of hash functions used and the delay caused by the security process. Recently, an identity-based scheme is proposed to provide authentication between the SM and the AS, and reduces the total number of exchanged packets, but increases the CPO [21]. Many researchers have proposed solutions in order to resist against different attacks in the SG system, such as replay, MITM, impersonation, and DoS.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…A key agreement protocol for the SG is proposed in [20], which reduces the number of hash functions used and the delay caused by the security process. Recently, an identity-based scheme is proposed to provide authentication between the SM and the AS, and reduces the total number of exchanged packets, but increases the CPO [21]. Many researchers have proposed solutions in order to resist against different attacks in the SG system, such as replay, MITM, impersonation, and DoS.…”
Section: Related Workmentioning
confidence: 99%
“…Table II shows a comparison of the security capabilities of the proposed protocol with the existing protocols. Note that [20] and [21] partially protect DoS attacks by simply limiting the key agreement sessions.…”
Section: B Defenses Against Security Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the protocol does not provide authentication among SM, HAN, and HAs. Nicanfar et al [44] proposed a scheme that provides the mutual authentication between the SM and the AS of the SG. This scheme is based on an identity-based PKI and reduces the exchanged packets during authentication, but, generates a large overhead.…”
Section: Obj-2: Low Computational and Storage Cost And Obj-3: Low Commentioning
confidence: 99%