Loading...
Please wait, while we are loading the content...
Similar Documents
Correctness of an Authentication Scheme for Managing Demand Response in Smart Grid
Content Provider | Scilit |
---|---|
Author | Chaudhry, Shehzad Ashraf Yahya, Khalid Al-Turjman, Fadi |
Copyright Year | 2020 |
Description | In recent years, many efforts are seen to secure the smart grid environment through various methods. However, a large number of such methods were proved insecure, whereas, some other methods are heavy weight due to underlying computational costly operations like pairing and modular exponentiation. In 2019, Kumar et al. (IEEE Transactions on Industrial Informatics, 15(12), 6572–6582, 2019) proposed an elliptic curve cryptography-based solution (EccAuth) to secure transfer of data between entities of a smart grid. The analysis in this chapter, however, shows that their scheme has incorrect authentication phase. Precisely, in the presence of multiple devices, the request-receiving device in their scheme cannot process authentication request. Moreover, due to the absence of initial verification on receiving side, their scheme is subject to unnecessarily process arbitrary message even sent by adversary. Book Name: Smart Grid in IoT-Enabled Spaces |
Related Links | https://content.taylorfrancis.com/books/download?dac=C2020-0-13884-9&isbn=9781003055235&doi=10.1201/9781003055235-10&format=pdf |
Ending Page | 231 |
Page Count | 9 |
Starting Page | 223 |
DOI | 10.1201/9781003055235-10 |
Language | English |
Publisher | Informa UK Limited |
Publisher Date | 2020-09-09 |
Access Restriction | Open |
Subject Keyword | Book Name: Smart Grid in Iot-enabled Spaces Industrial Engineering Smart Grid Authentication Devices Scheme Request Various Methods Based Solution Receiving Side |
Content Type | Text |
Resource Type | Chapter |