GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Mathematics  (1)
Material
Publisher
Person/Organisation
Language
Years
FID
  • Mathematics  (1)
  • 1
    Online Resource
    Online Resource
    Hindawi Limited ; 2014
    In:  Journal of Applied Mathematics Vol. 2014 ( 2014), p. 1-8
    In: Journal of Applied Mathematics, Hindawi Limited, Vol. 2014 ( 2014), p. 1-8
    Abstract: This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.
    Type of Medium: Online Resource
    ISSN: 1110-757X , 1687-0042
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2014
    detail.hit.zdb_id: 2578385-3
    SSG: 17,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...