4.8 Article

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 13, 期 6, 页码 3144-3153

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2017.2732999

关键词

Key agreement; NS2 simulation; renewable energy; security; smart grid (SG); user authentication

资金

  1. National Funding from the FCT-Fundacao para a Ciencia e a Tecnologia [UID/EEA/50008/2013]
  2. Government of the Russian Federation [074-U01]
  3. Finep
  4. Funttel, under the Centro de Referencia em Radicomunicacoes-CRR project of the Instituto Nacional de Telecomunicacoes (Inatel), Brazil [01.14.0231.00]

向作者/读者索取更多资源

Smart grid (SG) technology has recently received significant attention due to its usage in maintaining demand response management in power transmission systems. In SG, charging of electric vehicles becomes one of the emerging applications. However, authentication between a vehicle user and a smart meter is required so that both of them can securely communicate for managing demand response during peak hours. To address the above mentioned issues, in this paper, we propose a new efficient three-factor user authentication scheme for a renewable energy-based smart grid environment (TUAS-RESG), which uses the lightweight cryptographic computations such as one-way hash functions, bitwise XOR operations, and elliptic curve cryptography. The detailed security analysis shows the robustness of TUAS-RESG against various well-known attacks. Moreover, TUAS-RESG provides superior security with additional features, such as dynamic smart meter addition, flexibility for password and biometric update, user and smart meter anonymity, and untraceability as compared to other related existing schemes. The practical demonstration of TUAS-RESG is also proved using the widely accepted NS2 simulation.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system

Narendra K. Dewangan, Preeti Chandrakar, Saru Kumari, Joel J. P. C. Rodrigues

Summary: Blockchain technology is popular for its properties, but certificate management faces issues. Using blockchain can improve security and privacy in certificate management.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks

M. Indushree, Manish Raj, Vipul Kumar Mishra, R. Shashidhara, Ashok Kumar Das, K. Vivekananda Bhat

Summary: Designing a secure and efficient authentication protocol for mobility network is crucial and challenging due to network attacks in seamless roaming of mobile users and broadcast nature of communication. The proposed Mobile-Chain is a secure blockchain-based authentication system that protects user privacy and provides provable security. Its implementation on the ethereum blockchain platform using smart contracts shows robustness against security threats in mobility networks.

COMPUTER COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Enforcing Intelligent Learning-Based Security in Internet of Everything

Shrid Pant, Mehul Sharma, Deepak Kumar Sharma, Deepak Gupta, Joel J. P. C. Rodrigues

Summary: This article proposes a machine learning-based architecture to identify malicious and benign nodes in an IoE network. Through simulations, it is shown that GPSO-based learning algorithms provide reliable, robust, and scalable solutions, and significantly outperform other security protocols in the classification of nodes.

IEEE INTERNET OF THINGS JOURNAL (2023)

Editorial Material Computer Science, Hardware & Architecture

Security, Trust and Privacy Solutions for Intelligent Internet of Vehicular Things-Part II

Uttam Ghosh, Hellen Maziku, Hari Prabhat Gupta, Biplab Sikdar, Joel J. P. C. Rodrigues

IEEE CONSUMER ELECTRONICS MAGAZINE (2023)

Article Engineering, Electrical & Electronic

An Efficient Machine Learning-Based Resource Allocation Scheme for SDN-Enabled Fog Computing Environment

Jagdeep Singh, Parminder Singh, Mustapha Hedabou, Neeraj Kumar

Summary: Fog computing is a new technology that provides accessibility of computing resources close to end-users, addressing the limitations of network bandwidth and delay in cloud computing. Resource allocation is crucial for managing resources in a fog computing environment. However, traditional techniques do not meet the low latency requirements of modern fog computing applications. This article proposes a resource allocation technique for SDN-enabled fog computing with Collaborative Machine Learning (CML), which reduces execution time, energy consumption, and latency.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Hardware & Architecture

A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT

Chien-Ming Chen, Shuangshuang Liu, Xuanang Li, S. K. Hafizul Islam, Ashok Kumar Das

Summary: With the improvement of the public medical system, the medical service industry has become more intelligent. The Internet-of-Medical-Things (IoMT) is crucial in smart medicine. The use of remote wireless monitoring platforms in IoMT systems has reduced the risk of virus infection among medical staff. However, data security during transmission remains a concern. To address this, we propose a three-factor enhanced protocol that ensures confidentiality and privacy. Comparing our protocol with existing ones, ours has efficient performance in terms of execution time and communication costs.

JOURNAL OF SYSTEMS ARCHITECTURE (2023)

Article Computer Science, Information Systems

COUNT: Blockchain framework for resource accountability in e-healthcare

Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues

Summary: The progress of sensor devices, digital communication, and computing techniques enhances the functionalities of e-healthcare, where the medical facilities are manageable based on the Internet. Now a days, e-healthcare not only helps in disease diagnosis, or tele-medicine, but also implies to general medical scope and medical resource management. Thus, Internet-of-Medical Thing (IoMT) becomes an umbrella term to connect e-healthcare, tele-medicine, and medical supply chain management.

COMPUTER COMMUNICATIONS (2023)

Article Engineering, Civil

Intelligent Drones Trajectory Generation for Mapping Weed Infested Regions Over 6G Networks

Gunasekaran Raja, Nisha Deborah Philips, Ramesh Krishnan Ramasamy, Kapal Dev, Neeraj Kumar

Summary: This paper proposes a method called DTG-GN for generating unmanned aerial vehicle (UAV) trajectories using an improved genetic algorithm and non-uniform rational P-splines optimization. The method aims to improve the efficiency of monitoring agricultural lands by optimizing the smoothness and accuracy of the trajectories. The improved genetic algorithm selects an optimal path, while the non-uniform rational P-splines optimization improves the smoothness of the trajectory. The 6G network is utilized to ensure seamless connectivity between the UAV and the ground control station. Experimental results demonstrate that DTG-GN reduces the time and trajectory length for generating optimal trajectories compared to conventional methods.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Chemistry, Analytical

Unmanned Ariel Vehicle (UAV) Path Planning for Area Segmentation in Intelligent Landmine Detection Systems

Ahmed Barnawi, Krishan Kumar, Neeraj Kumar, Nisha Thakur, Bander Alzahrani, Amal Almansour

Summary: Landmine contamination is a global problem with devastating consequences, which can be solved by using unmanned aerial vehicles (UAVs). Automation of the landmine detection process is necessary to fully utilize the potential of UAVs, which are used to airborne sensors for the discovery stage. This study presents a framework for autonomous UAV-based landmine detection, using deep learning for area segmentation and constructing coverage route plans.

SENSORS (2023)

Article Computer Science, Information Systems

Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey

Abhishek Bisht, Ashok Kumar Das, Debasis Giri

Summary: Personal Health Records (PHRs) pose challenges in storage and sharing, but Searchable Encryption (SE) combined with Blockchain offers a promising solution. This survey explores research on SE and blockchain technology, comparing existing solutions for secure storage and sharing of PHRs.

SECURITY AND PRIVACY (2023)

Article Computer Science, Information Systems

Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications

Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty, Abdullah Alqahtani

Summary: The healthcare sector is crucial and with the evolution of technologies like IoT, machine learning, and blockchain, it has advantages. Data in this sector is vulnerable due to its private and confidential nature, requiring a secured framework for data transmission. This article presents a blockchain-based authentication and key management mechanism for IoMT-based smart healthcare applications (SBAKM-HS). Comparative analysis shows that SBAKM-HS outperforms other existing schemes, and security verification confirms its resilience against potential attacks. Real-tested implementation of SBAKM-HS demonstrates its impact on system performance.

IEEE ACCESS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Design of an Energy Aware Cluster-Based Routing Scheme to Minimize Energy Consumption in Wireless Sensor Networks

Shashank Barthwal, Sumit Pundir, Mohammad Wazid, D. P. Singh, Sakshi Pundir

Summary: Efficient usage of sensor nodes for minimizing energy consumption in wireless sensor networks using an improved energy aware cluster-based routing mechanism (IEACRP) enhances network stability, lifetime, and throughput.

ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I (2023)

Article Engineering, Civil

Multi-Target-Aware Dynamic Resource Scheduling for Cloud-Fog-Edge Multi-Tier Computing Network

Peiying Zhang, Ning Chen, Guanjun Xu, Neeraj Kumar, Ahmed Barnawi, Mohsen Guizani, Youxiang Duan, Keping Yu

Summary: With the maturity of 5G and ITS technologies, the limited lifetime and computing capability of mobile devices pose challenges to QoS. To address the efficiency and sustainability issues, this paper proposes a multi-target-aware dynamic resource scheduling algorithm and utilizes deep reinforcement learning to interact with the MTCN environment effectively.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Efficient Personal-Health-Records Sharing in Internet of Medical Things Using Searchable Symmetric Encryption, Blockchain, and IPFS

Abhishek Bisht, Ashok Kumar Das, Dusit Niyato, Youngho Park

Summary: This paper proposes a dynamic, efficient, and practical PHR sharing scheme that combines searchable symmetric encryption, blockchain technology, and Inter-Planetary File System (IPFS). The proposed scheme guarantees the confidentiality of PHRs, verifiability of search results, and forward security. Extensive test-bed experiments demonstrate that the proposed scheme can be applied in practical scenarios related to the IoMT environment.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2023)

Article Computer Science, Information Systems

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges

Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sachin Shetty

Summary: This article introduces the privacy and security threats in online social networks (OSNs) and reviews and classifies related research works. It also discusses machine learning-based solutions for security attacks in OSNs and provides future research directions and possible solutions.

SECURITY AND PRIVACY (2023)

暂无数据