[go: up one dir, main page]

Bayat et al., 2017 - Google Patents

A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid

Bayat et al., 2017

Document ID
16443433943429331693
Author
Bayat M
Atashgah M
Aref M
Publication year
Publication venue
Wireless Personal Communications

External Links

Snippet

Nicanfar and Leung proposed a multilayer consensus elliptic curve based password authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their protocol is secure against possible attacks. In this paper, we show that the MCEPAK protocol …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Lee et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
Xie et al. Chaotic maps-based three-party password-authenticated key agreement scheme
Tan A chaotic maps-based authenticated key agreement protocol with strong anonymity
Farash et al. Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
Hsieh et al. Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks
Xiong et al. A novel multiserver authentication scheme using proxy resignature with scalability and strong user anonymity
Odelu et al. A secure anonymity preserving authentication scheme for roaming service in global mobility networks
Luo et al. A security communication model based on certificateless online/offline signcryption for Internet of Things
Xu et al. PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
Bayat et al. A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid
Sarhan et al. An approach to identity management in clouds without trusted third parties
Peng et al. Efficient distributed decryption scheme for IoT gateway-based applications
Ogundoyin et al. EDAS: Efficient data aggregation scheme for Internet of Things
Ming et al. Proxy signcryption scheme in the standard model
Baccouri et al. Lightweight authentication scheme based on elliptic curve el gamal
Song et al. Hardening password-based credential databases
Patonico et al. Elliptic curve‐based proxy re‐signcryption scheme for secure data storage on the cloud
Shakiba Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks
Jabbari et al. A revised key agreement protocol based on chaotic maps
Li et al. A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service
Ding et al. Efficient authentication and key agreement protocol with anonymity for delay tolerant networks
Doshi An enhanced approach for CP-ABE with proxy re-encryption in IoT paradigm
Lee Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie–Hellman assumption
Zhang et al. Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services
Al-Attab et al. Authentication scheme for insecure networks in cloud computing