2022
DOI: 10.1002/ett.4528
|View full text |Cite
|
Sign up to set email alerts
|

Trusted authority based session key agreement and authentication algorithm for smart grid networks

Abstract: The information exchanged over the smart grid networks is sensitive and private. As such, proper mechanisms must be put in place to protect these messages from security and privacy violations. Although many schemes have been presented in literature to address these challenges, a number of them rarely consider concurrent authentication of smart meters, while some are inefficient or still lack some of the smart grid network security and privacy requirements. In this article, a novel concurrent smart meters authe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(27 citation statements)
references
References 56 publications
0
27
0
Order By: Relevance
“…Although the heuristic algorithm in [62] succeeds in establishing safest paths from the source to the destination, it fails to eliminate malicious nodes from the network. To solve this challenge, the scheme developed in [63] can be deployed. To counter malicious nodes within the network, a two-phase scheme is presented in [64].…”
Section: Related Workmentioning
confidence: 99%
“…Although the heuristic algorithm in [62] succeeds in establishing safest paths from the source to the destination, it fails to eliminate malicious nodes from the network. To solve this challenge, the scheme developed in [63] can be deployed. To counter malicious nodes within the network, a two-phase scheme is presented in [64].…”
Section: Related Workmentioning
confidence: 99%
“…To address this challenge, other privacy-preserving authentication (PPA) protocols have been presented in [81], [82], [83], [84], [85] and [86]. Unfortunately, these protocols generally do not provide perfect forward secrecy [87]. To prevent data manipulation over the communication channels and boost trust [88], Intrusion Detection Systems (IDS) have been deployed.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [21] show that their protocol is resistant against MitM, packet replays, impersonation, forgery and privileged insider attacks. However, the provable security [22] component of this protocol is missing. On the other hand, the scheme in [2] is shown to be robust against many security attacks and also offers information privacy.…”
Section: Related Workmentioning
confidence: 99%