2016
DOI: 10.1371/journal.pone.0151253
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids

Abstract: In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(23 citation statements)
references
References 20 publications
0
22
0
Order By: Relevance
“…To provide security properties, a mitigation authentication protocol is proposed by [193]. The scheme provides mutual authentication and key agreement, and preserves identity privacy.…”
Section: He Data Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…To provide security properties, a mitigation authentication protocol is proposed by [193]. The scheme provides mutual authentication and key agreement, and preserves identity privacy.…”
Section: He Data Managementmentioning
confidence: 99%
“…Pros: authentication with identity protection; privacy protection at SM; and less storage overhead and communication cost. [193] Cons: no threat model; and no simulations/proof-of-concepts Data management -HAN, NAN Simulation 2,3,4…”
Section: Data Management -Sm Nan Simulation 49mentioning
confidence: 99%
“…Zhang et al [18] designed an authentication protocol based on elliptic curve cryptography for an SG, which can provide privacy protection. The authors claimed that the protocol has the advantages of identity protection, mutual authentication, and key agreement.…”
Section: Related Literaturementioning
confidence: 99%
“…A key agreement and mutual authentication protocol are efficient solutions to solving this problem. Several studies have also proposed protocols related to SGs [15,16,17,18,19]. However, a mutual authentication protocol for an SG based on the use of edge computing has yet to be proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Besides these ways of protecting the privacy of smart meter consumption, authentication between the smart meter and the aggregator is another factor that should receive attention when thinking about privacy protection. Elliptic curve [18][19][20][21][22][23][24][25] and bilinear map pairing [26][27][28][29][30] are two of the most commonly used encryption methods for authentication schemes. Generally speaking, the bilinear map requires more computation cost than the elliptic curve method, and the elliptic curve method is more efficient.…”
Section: Related Workmentioning
confidence: 99%