2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) 2017
DOI: 10.1109/icecds.2017.8389808
|View full text |Cite
|
Sign up to set email alerts
|

Experimental study of Diffie-Hellman key exchange algorithm on embedded devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Therefore, the alarm and controllable loads are connected as an output via relays. HanRun HR911105A Ethernet shield module [32] with single port RJ45 connector is used to connect the AHM system with the operator or customers via Internet. A main contactor is connected to the input terminals of delivered electricity source to remotely control Fig.…”
Section: Ahm Hardware Circuit Designmentioning
confidence: 99%
“…Therefore, the alarm and controllable loads are connected as an output via relays. HanRun HR911105A Ethernet shield module [32] with single port RJ45 connector is used to connect the AHM system with the operator or customers via Internet. A main contactor is connected to the input terminals of delivered electricity source to remotely control Fig.…”
Section: Ahm Hardware Circuit Designmentioning
confidence: 99%
“…With the help of a Pseudo Random Number Generator (PRNG), the concentrator first generates a unique random number by using its own private key and the target EV's ID as input: = ( ∥ ) (1) Then, based on the random number , the concentrator gets the key material using the well-known Diffie-Hellman key exchange protocol [38]: = (2) where and are the parameters of the Diffie-Hellman key exchange protocol, is a prime number, and is the primitive root of .…”
Section: ) Request Command From Concentratormentioning
confidence: 99%
“…Conventionally, most secure key distribution schemes are adopted based on public key encryption algorithms like RSA and Diffie Hellman [6][7][8][9], relying on computational complexity. However, the security can be guaranteed solely when the computing ability of the eavesdropper is limited, making these encryption technologies fragile when encountering supercomputing technology [10,11].…”
Section: Introductionmentioning
confidence: 99%