2018
DOI: 10.3390/en11040759
|View full text |Cite
|
Sign up to set email alerts
|

Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids

Abstract: Abstract:Microgrids play an important role in today's power systems as the distributed generation is becoming increasingly common. They can operate in two possible modes: (i) standalone and (ii) grid-connected. The transitional state from standalone to grid-connected mode is very critical and requires the microgrid to be synchronized with the main grid. Thus, secure, reliable and trustworthy control and communication is utmost necessary to prevent out-of-sync connection which could severely damage the microgri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…These schemes provide many enhancements in certain areas other than the security enhancements on the ECC itself. For instance, [20]- [22] proposed schemes that use ECC without detailing how messages are encoded and mapped to the selected curve. As a result, these schemes reduce the computation process and power consumption.…”
Section: Related Workmentioning
confidence: 99%
“…These schemes provide many enhancements in certain areas other than the security enhancements on the ECC itself. For instance, [20]- [22] proposed schemes that use ECC without detailing how messages are encoded and mapped to the selected curve. As a result, these schemes reduce the computation process and power consumption.…”
Section: Related Workmentioning
confidence: 99%
“…It is clearly evident from the results that the proposed mechanism needs fewer keys for both authentication and secure channel establishment and occupies less memory if compared with [24] and RSA mechanism. Although there is little difference in the memory requirements if compared with [25] and DSA, but there is a big difference in the end-to-end delay as discussed in the previous section. The memory requirement of the TV-HORS mechanism is extremely high as it needs more than 500 KB of memory to store secret keys for the authentication and secure channel establishment.…”
Section: Algorithm Cryptographic Operationsmentioning
confidence: 98%
“…Noteworthily, existing schemes have introduced significant enhancements in many areas of the elliptic curve, including scalar multiplication on the elliptic curve, encoding phase processing, and the mapping phase. To illustrate, MCS schemes in [53,54] and similar proposed schemes in [55,56] use ECC without elaborating on the processing associated with each phase. For this reason, these schemes provide reduction on the processing computation and power consumption.…”
Section: Related Workmentioning
confidence: 99%