Security in modern smart metering communications and in smart grid networks has been an area of interest recently. In this field, identity-based mutual authentication including credential privacy without active involvement of a trusted third party is an important building block for smart grid technology. Recently, several schemes have been proposed for the smart grid with various security features (e.g., mutual authentication and key agreement). Moreover, these schemes are said to offer session key security under the widely accepted Canetti-Krawczyk (CK) security model. Instead, we argue that all of them are still vulnerable under the CK model. To remedy the problem, we present a new provably secure key agreement model for smart metering co...
In the energy sector, IoT manifests in the form of next-generation power grids that provide enhanced...
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which de...
Abstract—1 This paper studies the security requirements for remote authentication and communication ...
Security in modern smart metering communications and in smart grid networks has been an area of inte...
With the gradual maturity of the smart grid (SG), security challenges have become one of the importa...
Smart meters have ensured effective end-user energy consumption data management and helping the powe...
Authentication and key agreement schemes in smart grid have received much attentions by researchers ...
In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, an...
The smart meters in electricity grids enable fine-grained consumption monitoring. Thus, suppliers co...
Information and Communication Technologies (ICT) are one of the underpinning platforms of smart grid...
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart...
Integration of information communication technology via the Internet of Things devices and sensors c...
Integration of information communication technology via the Internet of Things devices and sensors c...
Abstract—Smart Grid (SG) consists of many sub-systems and networks, all working together as a system...
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart...
In the energy sector, IoT manifests in the form of next-generation power grids that provide enhanced...
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which de...
Abstract—1 This paper studies the security requirements for remote authentication and communication ...
Security in modern smart metering communications and in smart grid networks has been an area of inte...
With the gradual maturity of the smart grid (SG), security challenges have become one of the importa...
Smart meters have ensured effective end-user energy consumption data management and helping the powe...
Authentication and key agreement schemes in smart grid have received much attentions by researchers ...
In this article, a secure and lightweight authentication scheme, which provides trust, anonymity, an...
The smart meters in electricity grids enable fine-grained consumption monitoring. Thus, suppliers co...
Information and Communication Technologies (ICT) are one of the underpinning platforms of smart grid...
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart...
Integration of information communication technology via the Internet of Things devices and sensors c...
Integration of information communication technology via the Internet of Things devices and sensors c...
Abstract—Smart Grid (SG) consists of many sub-systems and networks, all working together as a system...
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart...
In the energy sector, IoT manifests in the form of next-generation power grids that provide enhanced...
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which de...
Abstract—1 This paper studies the security requirements for remote authentication and communication ...