2016
DOI: 10.1002/dac.3195
|View full text |Cite
|
Sign up to set email alerts
|

PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI)

Abstract: Advanced metering infrastructure (AMI) provides 2‐way communications between the utility and the smart meters. Developing authenticated key exchange (AKE) and broadcast authentication (BA) protocols is essential to provide secure communications in AMI. The security of all existing cryptographic protocols is based on the assumption that secret information is stored in the nonvolatile memories. In the AMI, the attackers can obtain some or all of the stored secret information from memories by a great variety of i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(21 citation statements)
references
References 55 publications
0
21
0
Order By: Relevance
“…Also, to reduce storage and communication costs in key management, a multi-group key graph structure is proposed in this work. The proposed key graph technique allows multiple DR projects to share a Benmalek et al [49] Benmalek et al [51] Example: Liu et al [48] Yu et al [52] Example: Parvez et al [54] Example: Nicanfar et al [55] Example: Wan et al [32] Example: Nabeel et al [57] Example: Khasawneh et al [4] Hash Chain Example: Delavar et al [58] new set of keys. When a user joins or leaves a DR project, the communication cost for rekeying operations does not increase significantly compared to the cost induced by using separate LKH tree inside each DR project.…”
Section: A Key Graph Techniquementioning
confidence: 99%
“…Also, to reduce storage and communication costs in key management, a multi-group key graph structure is proposed in this work. The proposed key graph technique allows multiple DR projects to share a Benmalek et al [49] Benmalek et al [51] Example: Liu et al [48] Yu et al [52] Example: Parvez et al [54] Example: Nicanfar et al [55] Example: Wan et al [32] Example: Nabeel et al [57] Example: Khasawneh et al [4] Hash Chain Example: Delavar et al [58] new set of keys. When a user joins or leaves a DR project, the communication cost for rekeying operations does not increase significantly compared to the cost induced by using separate LKH tree inside each DR project.…”
Section: A Key Graph Techniquementioning
confidence: 99%
“…In 2017, Delavar et al [32] proposed a broadcast authentication scheme based on Physical Unclonable Function (PUF) named PUF-BA. They proposed their scheme with assumption that s are computationally resources constraints and the expense of communication grows as the number of connected s increases.…”
Section: B Related Workmentioning
confidence: 99%
“…In addition, they assumed that s are located in an unprotected environment which can be physically threatened by adversaries. Although their scheme was proposed for networks with resources constrained devices, yet it required high computational power from s. To overcome the high computational overhead of [32], quite recently in 2019, Ameri et al [33] proposed a provably secure broadcast authentication scheme for smart grid based on PUF. They used the advantage of Bose-Chaudhuri-Hocquenghem (BCH) coding algorithm for error correcting to make the PUF responses reliable.…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations