Article
Engineering, Electrical & Electronic
Shehzad Ashraf Chaudhry
Summary: The paper identifies flaws in the PALK authentication scheme proposed by Khan et al., specifically pointing out errors in the login and authentication phases due to superficial ECC operations and issues with the use of public keys in the presence of multiple communicating devices. A solution iPALK is proposed by the authors, which is proven to be secure and correct using formal BAN logic and ProVerif automated tool, with performance comparisons showing iPALK to be more efficient in computation and communication costs compared to PALK.
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS
(2021)
Article
Engineering, Electrical & Electronic
Xinyin Xiang, Jin Cao
Summary: Smart grid integrates information and communication technology with traditional grid architecture to enhance efficiency and reliability of power systems. A secure authentication method is essential to prevent data tampering in smart grid communications. The proposed AKA scheme in this paper supports privacy preservation and enables secure communication between SG devices and service providers.
ELECTRIC POWER SYSTEMS RESEARCH
(2022)
Article
Computer Science, Information Systems
Seyed Hamid Baghestani, Farokhlagha Moazami, Mahdi Tahavori
Summary: This article discusses the research in the field of smart grid, focusing on the security of data transfer in smart grids and the existing protocol's limitations. The authors propose a lightweight authentication and key agreement protocol based on elliptic curve cryptography and demonstrate its security and efficiency.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
Summary: The Smart Grid (SG) improves the reliability and efficiency of the traditional power grid system by enhancing data sharing and communication. To address security requirements in SG networks, several authentication and key agreement frameworks have been proposed. However, existing schemes have limitations in terms of security and computation overhead. In this study, we propose a Security Enhanced Lightweight Authentication and Key Agreement Framework (SE-LAKAF) based on fuzzy extractor, elliptic curve cryptography, and AES-based encryption. The proposed framework ensures user anonymity, session key security, and protection against various attacks, as validated through theoretical security analysis and formal verification using AVISPA tool, BAN logic, and random oracle model. Performance analysis shows that SE-LAKAF achieves improved security with competitive communication and computation overheads.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Lunzhi Deng, Ronghai Gao
Summary: Smart grid is an automated power transmission network that requires secure information sharing. Authenticated key agreement is a good option for secure communication between smart meters and utility companies. However, traditional AKA schemes may have certificate management and security verification model issues.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
Ashish Tomar, Sachin Tripathi
Summary: Research on integrating fog computing with blockchain to address latency, single point of failure, and centralization has been expanding, with limited focus on authentication and key establishment for blockchain-based smart grid under fog environment. This paper introduces a mutual authentication and key agreement scheme for blockchain-based smart grid environment, reducing dependency on single trusted authorities and establishing secure shared keys among smart meter, fog node, and cloud server for message confidentiality. Evaluations using hyperledger fabric and cryptographic libraries show the proposed scheme to be efficient in computational and communication costs, meeting predefined security goals.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Saurabh Rana
Summary: The development of IoT technology presents new challenges for smart grid systems. To enhance security and privacy in smart grids, lightweight authentication and key agreement protocols are proposed. Analyzing and verifying these new protocols can improve the efficiency of smart grid systems.
JOURNAL OF SYSTEMS ARCHITECTURE
(2021)
Article
Computer Science, Hardware & Architecture
SungJin Yu, KiSung Park
Summary: Smart grid has gained significant attention due to its various services, but it is vulnerable to security attacks. To address this issue, we propose a secure and lightweight authentication and key agreement scheme using a fuzzy extractor. We evaluate the scheme's security and efficiency through simulations and experiments.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Chemistry, Analytical
Chen Chen, Hua Guo, Yapeng Wu, Bowen Shen, Mingyang Ding, Jianwei Liu
Summary: The IoT-enabled Smart Grid collects private electricity data from consumers using smart devices and sends it to service providers. However, this poses new security problems and many research studies focus on using authentication and key agreement protocols to protect against cyber attacks. We analyze the security of an existing protocol and show its vulnerabilities, and then propose an improved lightweight authentication and key agreement protocol that enhances the security of IoT-enabled smart grid systems. The improved scheme is proven to be secure against internal and external attackers in terms of both computation efficiency and communication cost.
Article
Automation & Control Systems
Wajahat Ali, Ikram Ud Din, Ahmad Almogren, Neeraj Kumar
Summary: The Internet of Things has revolutionized the use and management of electric grid systems, enabling two-way communication between users and power suppliers in the smart grid. However, privacy issues still exist in cyber-physical systems. This article proposes a privacy-preserving scheme called ALPHA, using orthogonal codes to ensure anonymity and untraceability of user data.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Engineering, Multidisciplinary
Siguang Chen, Li Yang, Chuanxin Zhao, Vijayakumar Varadarajan, Kun Wang
Summary: This paper proposes a double-blockchain assisted secure and anonymous data aggregation scheme for fog-enabled smart grid. By designing a three-tier architecture-based data aggregation framework and integrating fog computing and blockchain technology, efficient and secure data collection is achieved. The use of encryption, batch aggregation signature, and anonymous authentication enables a secure and anonymous data aggregation mechanism that supports power dispatching and price adjustment.
Article
Computer Science, Information Systems
Shadi Nashwan
Summary: Smart irrigation is a significant agriculture management system globally, especially in the context of water scarcity. The development of smart systems using IoT and WSN technologies will play a crucial role in various sectors. Security challenges, however, hinder the widespread adoption of these systems. This paper proposes a secure authentication scheme based on Diffie-Hellman key agreement to address these challenges.
Article
Computer Science, Information Systems
Venkatasamy Sureshkumar, S. Mugunthan, Ruhul Amin
Summary: Vehicle-to-Grid (V2G) is the convergence of smart grid, electric vehicle, and information and communication technology, enabling communication between the smart grid and electric vehicles to provide various services. Researchers are addressing the challenge of communication security in the V2G environment and proposing new communication architectures and authentication protocols.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2022)
Article
Automation & Control Systems
Jangirala Srinivas, Ashok Kumar Das, Xiong Li, Muhammad Khurram Khan, Minho Jo
Summary: This article presents a new anonymous signature-based authenticated key exchange scheme for IoT-enabled smart grid environment, called AAS-IoTSG, which allows for dynamic smart meter addition. The security of AAS-IoTSG has been rigorously tested and the comparative study shows it has better security and functionality features with less communication and computation overheads compared to existing authentication mechanisms in smart grid systems.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Roozbeh Sarenche, Mahmoud Salmasizadeh, Mohammad Hassan Ameri, Mohammad Reza Aref
Summary: This paper proposes a protocol to securely implement different double auction mechanisms in the smart grid, ensuring user privacy through pseudo-identities and encryption, and verifying participant behavior using the Pedersen commitment scheme. Theoretical analysis and implementation results suggest that the proposed scheme is efficient for smart grid entities involved in the auction process.
INFORMATION SCIENCES
(2021)
Article
Computer Science, Information Systems
Yanrong Lu, Ding Wang, Mohammad S. Obaidat, Pandi Vijayakumar
Summary: Cyber-physical system (CPS) combined with artificial intelligence (AI) is used to extract information from the large volumes of data in the Industrial Internet of Things (IIoT). However, the traditional host-centric communication model of the current Internet faces challenges due to the increasing data traffic and number of IIoT devices. To address this, we propose an information-centric networking (ICN)-based system model that processes data closer to the edge in CPS. We also propose an edge-assisted authentication scheme in CPS to protect against unauthorized access and reduce workload for resource-constrained devices.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Chi Lin, Pengfei Wang, Chuanying Ji, Mohammad S. Obaidat, Lei Wang, Guowei Wu, Qiang Zhang
Summary: The ubiquitous and fine-grained features of WiFi signals make it promising for contactless authentication. Existing methods are sensitive to environmental dynamics and over-depend on certain activities. This article presents WiTL, a transfer learning-based contactless authentication system that detects unique human features and removes environment dynamics. The system includes a Height Estimation algorithm based on Angle of Arrival and a transfer learning technology combined with Residual Network and adversarial network. Experiments demonstrate WiTL's high accuracy in multi-scenes and multi-activities identity recognition, surpassing state-of-the-art systems.
ACM TRANSACTIONS ON SENSOR NETWORKS
(2023)
Article
Computer Science, Information Systems
Ying Xie, Xiaohui Liu, Mohammad S. Obaidat, Xiong Li, Pandi Vijayakumar
Summary: Based on IoB, MCS utilizes IoT to recruit users by analyzing behavioral patterns. However, due to nondeterministic user mobility and behaviors, MCS cannot provide stable and high-quality services. This article proposes a stochastic semialgebraic hybrid system (SSAHS) model to characterize user mobility and behaviors, and introduces a nondeterministic evaluation mechanism to measure and predict user behavior and recruit high-quality users. Simulation experiments demonstrate that the proposed user recruitment scheme achieves higher quality of service compared to competing strategies.
ACM TRANSACTIONS ON SENSOR NETWORKS
(2023)
Article
Chemistry, Physical
Zhiqian Yang, Liqun Duan, Gang Chang, Wenke Zhou, Zhi Zhang, Fan Wu, Aming Xie, Ziming Xiong
Summary: In this study, a series of carbon microfiber/FeS composites were synthesized using a molten-salt-guided synthetic strategy. The microstructures, electromagnetic response behaviors, and microwave absorption properties of these composites were systematically investigated. The results showed that the prepared composites exhibited effective microwave absorption performance, and the choice of molten salt system had an influence on the properties of the composites.
Article
Computer Science, Information Systems
Ruijin Wang, Jinshan Lai, Zhiyang Zhang, Xiong Li, Pandi Vijayakumar, Marimuthu Karuppiah
Summary: This article proposes a Privacy Protection Scheme for Federated Learning under Edge Computing (PPFLEC), which addresses the privacy disclosure and security issues in edge intelligent computing through a lightweight privacy protection protocol, an algorithm based on digital signature and hash function, and a periodic average training strategy.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
(2023)
Article
Computer Science, Information Systems
Qinya Li, Zun Li, Zhenzhe Zheng, Fan Wu, Shaojie Tang, Zhao Zhang, Guihai Chen
Summary: With the fast-growing market demand, more and more IoT data is being traded online in cloud-based data marketplaces. However, data consumers face difficulties in making purchasing decisions due to uncertain data quality and inflexible pricing interface. To address these issues, potential solutions include launching data demonstrations and releasing free sampling data to reduce uncertainty about data quality, and implementing flexible pricing based on the volume of data used. The economic benefits of these mechanisms are not yet clear. In this paper, we design optimal data selling mechanisms for IoT data exchange and derive two main findings based on theoretical analysis and evaluation on a real-world Taxi GPS dataset.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Information Systems
Prince Silas Kwesi Oberko, Tianang Yao, Hu Xiong, Saru Kumari, Sachin Kumar
Summary: This article presents a secure access design for smart grids based on the Ethereum blockchain, resolving security issues in the smart energy system. The design includes functions such as identity verification, public-key storage, and revocable lists, ensuring system security under complex theory and multi-attack scenarios.
JOURNAL OF INTERNET TECHNOLOGY
(2023)
Article
Computer Science, Hardware & Architecture
Anuradha Banerjee, Abu Sufian, Ashutosh Srivastava, Sachin Kumar Gupta, Saru Kumari, Sachin Kumar
Summary: Unmanned Aerial Vehicles (UAVs) have the potential to enhance Internet of Things (IoT) devices through various sensors and systems. However, there are challenges such as resource allocation, security, trajectory optimization, and energy management that require extensive research. In this article, an energy-efficient and time-saving task scheduling algorithm is proposed, which effectively divides IoT devices into clusters based on proximity. By using an ARMA model, the algorithm predicts task arrival times and estimated payments, allowing cluster heads to advise UAVs on their next arrival time. Simulation results demonstrate significant improvements in energy and delay compared to existing task scheduling methods. The ARMA model ensures efficient utilization of UAV processing capacity by ensuring a sufficient task queue at cluster heads.
MICROPROCESSORS AND MICROSYSTEMS
(2023)
Article
Computer Science, Information Systems
Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari
Summary: Cloud-based RFID system provides real-time data for easy access and interpretation. However, the security and privacy of constrained devices in these systems pose challenges.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Fan Wu, Feng Lyu, Huaqing Wu, Ju Ren, Yaoxue Zhang, Xuemin (Sherman) Shen
Summary: This article explores data-driven approaches to optimize edge system performance by mining user association patterns in WLAN. The study describes the collected association traces and analyzes the impact of user association patterns on edge system performance. Three data-driven approaches are proposed, including efficient resource deployment, mobility-aware user service migration, and distributed cooperative learning for edge intelligence. A case study on distributed learning validates the effectiveness of the proposed cooperation scheme, CoLo.
Article
Engineering, Civil
Muhammad Asad Saleem, Xiong Li, Muhammad Faizan Ayub, Salman Shamshad, Fan Wu, Haider Abbas
Summary: The popularity of vehicles has led to the development of smart cities, making vehicular ad-hoc network (VANET) a widely used communication method for obtaining information about road conditions, speed, vehicle location, and traffic congestion. However, the security of private data in VANET is a critical task due to various security threats. In this article, a lightweight and secure privacy-preserving key agreement protocol for VANETs is proposed, which utilizes hashing technique for efficient and secure data transmission.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Telecommunications
Dharminder Chaudhary, M. S. P. Durgarao, Dheerendra Mishra, Saru Kumari
Summary: This article introduces a blockchain design using module lattices and efficient aggregate signatures for verifying multiple nodes. The design ensures security against quantum attacks and is simulated in ns-3 for latency and throughput testing.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2023)
Article
Engineering, Multidisciplinary
Jing Wang, Debiao He, Aniello Castiglione, Brij B. Gupta, Marimuthu Karuppiah, Libing Wu
Summary: Deploying CNN inference on resource-constrained devices is a challenge in IIoT, but a new framework called PCNNCEC has been designed to address this issue. The framework enables efficient and privacy-preserving CNN inference through private comparison protocols and secure two-party computation protocols. Experimental results show that PCNNCEC achieves a better tradeoff between latency and throughput compared to other protocols.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Review
Materials Science, Multidisciplinary
Jing Qiao, Lutong Li, Jiurong Liu, Na Wu, Wei Liu, Fan Wu, Zhihui Zeng
Summary: Rare earth plays a crucial role in electromagnetic wave absorption materials, and the strategies of doping rare earth elements and constructing rare earth oxide composites are important for the fabrication of high-efficiency electromagnetic wave absorption materials. This review provides a comprehensive summary of the research background, classification, features, progress, and future development of rare earth electromagnetic wave absorption materials, offering guidance for future development.
JOURNAL OF MATERIALS SCIENCE & TECHNOLOGY
(2024)