Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Dec 25, 2015 · In this paper, we propose an authentication and authorization scheme for mitigating outsider and insider threats in the smart grid by verifying ...
In this paper, we propose an authentication and authorization scheme for mitigating outsider and insider threats in the smart grid by verifying the user ...
People also ask
Abstract—The smart grid, as the next generation of the power grid, is characterized by employing many different types of intelligent devices, such as ...
Feb 24, 2016 · Abstract—The smart grid, as the next generation of the power grid, is characterized by employing many different types of intelligent devices ...
Lu, “Authentication and. Authorization Scheme for Various User Roles and Devices in Smart Grid”, IEEE transactions on information forensics and security, Vol ...
SaxenaN. et al. Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Trans. Inf. Forensics ...
Dec 10, 2021 · Our scheme employs different shared keys between the user, GW and smart devices and one-time hash function techniques to provide PFS ...
We propose three different authentication mechanisms for devices in the HAN: 1) between the gateway and the smart meter, 2) between the smart appliances and the ...
Mar 12, 2020 · Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Trans. Inf. Forensics Secur. 2016;11:907–921 ...
May 12, 2019 · proposed a lightweight message authentication scheme with user anonymity and claimed that their scheme is provably secure. But we found that ...