Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: Telecommunication Systems 4/2021

14.09.2021

A secure and efficient key agreement framework for critical energy infrastructure using mobile device

verfasst von: Akber Ali Khan, Vinod Kumar, Musheer Ahmad, B. B. Gupta, Musheer Ahmad, Ahmed A. Abd El-Latif

Erschienen in: Telecommunication Systems | Ausgabe 4/2021

Einloggen, um Zugang zu erhalten
share
TEILEN

Abstract

Internet of Energy (IoE) provides two-way communication for reform of energy utilization between service providers and consumers. To provide secure, efficient, and reliable operations in IoE should be protected from cyber-attacks. Many frameworks have been proposed so far to address security and privacy concerns of these systems. In the vehicle-grid system, we propose a useful mutual authenticated key agreement framework using elliptic curve cryptography and hash function. The aim of the proposed protocol is to maintain secure communication between vehicles and the grid system with reliable computation and communication costs. In the proposed protocol, a vehicular user securely access services that are provided by the grid server. We prove the security of the proposed framework in formal and informal ways. We also show the correctness of the mutual authentication and key agreement of this framework by using Burrows–Abadi–Needham logic. We provide formal security verification of the proposed protocol by using AVISPA tool. Further, we show that this work is better in terms of computation and communication costs compare to other related protocols in the same environment. As a result, the proposed framework is a real life-application in this system.

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Testen Sie jetzt 15 Tage kostenlos.

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




Testen Sie jetzt 15 Tage kostenlos.

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Testen Sie jetzt 15 Tage kostenlos.

Literatur
1.
Zurück zum Zitat Zhang, W.-Z., Elgendy, I. A., Hammad, M., Iliyasu, A. M., Du, X., Guizani, M., & Abd El-Latif, A. A. (2020). Secure and optimized load balancing for multitier IoT and edge-cloud computing systems. IEEE Internet of Things Journal, 8(10), 8119–8132. Zhang, W.-Z., Elgendy, I. A., Hammad, M., Iliyasu, A. M., Du, X., Guizani, M., & Abd El-Latif, A. A. (2020). Secure and optimized load balancing for multitier IoT and edge-cloud computing systems. IEEE Internet of Things Journal, 8(10), 8119–8132.
2.
Zurück zum Zitat Abou-Nassar, E. M., Iliyasu, A. M., El-Kafrawy, P. M., Song, O.-Y., Bashir, A. K., & Abd El-Latif, A. A. (2020). Ditrust chain: Towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access, 8, 111223–111238. CrossRef Abou-Nassar, E. M., Iliyasu, A. M., El-Kafrawy, P. M., Song, O.-Y., Bashir, A. K., & Abd El-Latif, A. A. (2020). Ditrust chain: Towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access, 8, 111223–111238. CrossRef
4.
Zurück zum Zitat Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2020). Iot-based big data secure management in the fog over a 6g wireless network. IEEE Internet of Things Journal, 8(7), 5164–5171. Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2020). Iot-based big data secure management in the fog over a 6g wireless network. IEEE Internet of Things Journal, 8(7), 5164–5171.
5.
Zurück zum Zitat Abd El-Latif, A. A., Abd-El-Atty, B., Venegas-Andraca, S. E., Elwahsh, H., Piran, M. J., Bashir, A. K., et al. (2020). Providing end-to-end security using quantum walks in IoT networks. IEEE Access, 8, 92687–92696. Abd El-Latif, A. A., Abd-El-Atty, B., Venegas-Andraca, S. E., Elwahsh, H., Piran, M. J., Bashir, A. K., et al. (2020). Providing end-to-end security using quantum walks in IoT networks. IEEE Access, 8, 92687–92696.
6.
Zurück zum Zitat Gad, R., Talha, M., Abd El-Latif, A. A., Zorkany, M., Ayman, E.-S., Nawal, E.-F., & Muhammad, G. (2018). Iris recognition using multi-algorithmic approaches for cognitive internet of things (CIoT) framework. Future Generation Computer Systems, 89, 178–191. CrossRef Gad, R., Talha, M., Abd El-Latif, A. A., Zorkany, M., Ayman, E.-S., Nawal, E.-F., & Muhammad, G. (2018). Iris recognition using multi-algorithmic approaches for cognitive internet of things (CIoT) framework. Future Generation Computer Systems, 89, 178–191. CrossRef
7.
Zurück zum Zitat Mishra, A., Gupta, N., & Gupta, B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using pox controller. Telecommunication Systems, 77(1), 47–62. Mishra, A., Gupta, N., & Gupta, B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using pox controller. Telecommunication Systems, 77(1), 47–62.
8.
Zurück zum Zitat Zhou, K., Yang, S., & Shao, Z. (2016). Energy internet: The business perspective. Applied Energy, 178, 212–222. CrossRef Zhou, K., Yang, S., & Shao, Z. (2016). Energy internet: The business perspective. Applied Energy, 178, 212–222. CrossRef
9.
Zurück zum Zitat Gupta, B., & Quamara, M. (2020). An overview of internet of things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32, e4946. CrossRef Gupta, B., & Quamara, M. (2020). An overview of internet of things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32, e4946. CrossRef
10.
Zurück zum Zitat Gungor, V. C., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., & Hancke, G. P. (2012). A survey on smart grid potential applications and communication requirements. IEEE Transactions on Industrial Informatics, 9, 28–42. CrossRef Gungor, V. C., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., & Hancke, G. P. (2012). A survey on smart grid potential applications and communication requirements. IEEE Transactions on Industrial Informatics, 9, 28–42. CrossRef
11.
Zurück zum Zitat Gharavi, H., & Ghafurian, R. (2011). Smart grid: The electric energy system of the future (Vol. 99). IEEE. Gharavi, H., & Ghafurian, R. (2011). Smart grid: The electric energy system of the future (Vol. 99). IEEE.
12.
Zurück zum Zitat Abd El-Latif, A. A., Abd-El-Atty, B., Mehmood, I., Muhammad, K., Venegas-Andraca, S. E., & Peng, J. (2021). Quantum-inspired blockchain-based cybersecurity: Securing smart edge utilities in IoT-based smart cities. Information Processing & Management, 58, 102549. CrossRef Abd El-Latif, A. A., Abd-El-Atty, B., Mehmood, I., Muhammad, K., Venegas-Andraca, S. E., & Peng, J. (2021). Quantum-inspired blockchain-based cybersecurity: Securing smart edge utilities in IoT-based smart cities. Information Processing & Management, 58, 102549. CrossRef
13.
Zurück zum Zitat Li, D., Deng, L., Gupta, B. B., Wang, H., & Choi, C. (2019). A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences, 479, 432–447. CrossRef Li, D., Deng, L., Gupta, B. B., Wang, H., & Choi, C. (2019). A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences, 479, 432–447. CrossRef
14.
Zurück zum Zitat Sani, A. S., Yuan, D., Jin, J., Gao, L., Yu, S., & Dong, Z. Y. (2019). Cyber security framework for internet of things-based energy internet. Future Generation Computer Systems, 93, 849–859. CrossRef Sani, A. S., Yuan, D., Jin, J., Gao, L., Yu, S., & Dong, Z. Y. (2019). Cyber security framework for internet of things-based energy internet. Future Generation Computer Systems, 93, 849–859. CrossRef
16.
Zurück zum Zitat Dong, Z. (2016). Towards an intelligent future energy grid. New South Wales: The University of Sydney. Dong, Z. (2016). Towards an intelligent future energy grid. New South Wales: The University of Sydney.
18.
Zurück zum Zitat Wu, D., & Zhou, C. (2011). Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2, 375–381. CrossRef Wu, D., & Zhou, C. (2011). Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2, 375–381. CrossRef
19.
Zurück zum Zitat Xia, J., & Wang, Y. (2012). Secure key distribution for the smart grid. IEEE Transactions on Smart Grid, 3, 1437–1443. CrossRef Xia, J., & Wang, Y. (2012). Secure key distribution for the smart grid. IEEE Transactions on Smart Grid, 3, 1437–1443. CrossRef
20.
Zurück zum Zitat Nicanfar, H., & Leung, V. C. (2013). Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system. IEEE Transactions on Smart Grid, 4, 253–264. CrossRef Nicanfar, H., & Leung, V. C. (2013). Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system. IEEE Transactions on Smart Grid, 4, 253–264. CrossRef
21.
Zurück zum Zitat Park, J. H., Kim, M., & Kwon, D. (2013). Security weakness in the smart grid key distribution scheme proposed by Xia and Wang. IEEE Transactions on Smart Grid, 4, 1613–1614. CrossRef Park, J. H., Kim, M., & Kwon, D. (2013). Security weakness in the smart grid key distribution scheme proposed by Xia and Wang. IEEE Transactions on Smart Grid, 4, 1613–1614. CrossRef
22.
Zurück zum Zitat Odelu, V., Das, A. K., Wazid, M., & Conti, M. (2016). Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid, 9, 1900–1910. Odelu, V., Das, A. K., Wazid, M., & Conti, M. (2016). Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid, 9, 1900–1910.
23.
Zurück zum Zitat Tsai, J.-L., & Lo, N.-W. (2016). Secure anonymous key distribution scheme for smart grid. IEEE Transactions on Smart Grid, 7, 906–914. Tsai, J.-L., & Lo, N.-W. (2016). Secure anonymous key distribution scheme for smart grid. IEEE Transactions on Smart Grid, 7, 906–914.
24.
Zurück zum Zitat Chen, Y., Martínez, J.-F., Castillejo, P., & López, L. (2017). An anonymous authentication and key establish scheme for smart grid: Fauth. Energies, 10, 1354. CrossRef Chen, Y., Martínez, J.-F., Castillejo, P., & López, L. (2017). An anonymous authentication and key establish scheme for smart grid: Fauth. Energies, 10, 1354. CrossRef
25.
Zurück zum Zitat Gope, P., & Sikdar, B. (2018). Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Transactions on Smart Grid, 10, 3953–3962. CrossRef Gope, P., & Sikdar, B. (2018). Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Transactions on Smart Grid, 10, 3953–3962. CrossRef
26.
Zurück zum Zitat Mohammadali, A., Haghighi, M. S., Tadayon, M. H., & Mohammadi-Nodooshan, A. (2016). A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Transactions on Smart Grid, 9, 2834–2842. CrossRef Mohammadali, A., Haghighi, M. S., Tadayon, M. H., & Mohammadi-Nodooshan, A. (2016). A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Transactions on Smart Grid, 9, 2834–2842. CrossRef
27.
Zurück zum Zitat Gope, P., & Sikdar, B. (2019). An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Transactions on Smart Grid, 10, 6607–6618. CrossRef Gope, P., & Sikdar, B. (2019). An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Transactions on Smart Grid, 10, 6607–6618. CrossRef
28.
Zurück zum Zitat Li, X., Wu, F., Kumari, S., Xu, L., Sangaiah, A. K., & Choo, K.-K.R. (2019). A provably secure and anonymous message authentication scheme for smart grids. Journal of Parallel and Distributed Computing, 132, 242–249. CrossRef Li, X., Wu, F., Kumari, S., Xu, L., Sangaiah, A. K., & Choo, K.-K.R. (2019). A provably secure and anonymous message authentication scheme for smart grids. Journal of Parallel and Distributed Computing, 132, 242–249. CrossRef
29.
Zurück zum Zitat Mahmood, K., Chaudhry, S. A., Naqvi, H., Kumari, S., Li, X., & Sangaiah, A. K. (2018). An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Generation Computer Systems, 81, 557–565. CrossRef Mahmood, K., Chaudhry, S. A., Naqvi, H., Kumari, S., Li, X., & Sangaiah, A. K. (2018). An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Generation Computer Systems, 81, 557–565. CrossRef
30.
Zurück zum Zitat He, D., Wang, H., Khan, M. K., & Wang, L. (2016). Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Communications, 10, 1795–1802. CrossRef He, D., Wang, H., Khan, M. K., & Wang, L. (2016). Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Communications, 10, 1795–1802. CrossRef
31.
Zurück zum Zitat Khan, A. A., Kumar, V., Ahmad, M., & Rana, S. (2021). Lakaf: Lightweight authentication and key agreement framework for smart grid network. Journal of Systems Architecture, 116, 102053. CrossRef Khan, A. A., Kumar, V., Ahmad, M., & Rana, S. (2021). Lakaf: Lightweight authentication and key agreement framework for smart grid network. Journal of Systems Architecture, 116, 102053. CrossRef
32.
Zurück zum Zitat Yang, Z., Yu, S., Lou, W., & Liu, C. (2011). Privacy-preserving communication and precise reward architecture for v2g networks in smart grid. IEEE Transactions on Smart Grid, 2, 697–706. CrossRef Yang, Z., Yu, S., Lou, W., & Liu, C. (2011). Privacy-preserving communication and precise reward architecture for v2g networks in smart grid. IEEE Transactions on Smart Grid, 2, 697–706. CrossRef
33.
Zurück zum Zitat Guo, H., Wu, Y., Bao, F., Chen, H., & Ma, M. (2011). Ubapv2g: A unique batch authentication protocol for vehicle-to-grid communications. IEEE Transactions on Smart Grid, 2, 707–714. CrossRef Guo, H., Wu, Y., Bao, F., Chen, H., & Ma, M. (2011). Ubapv2g: A unique batch authentication protocol for vehicle-to-grid communications. IEEE Transactions on Smart Grid, 2, 707–714. CrossRef
34.
Zurück zum Zitat Abdallah, A., & Shen, X. S. (2016). Lightweight authentication and privacy-preserving scheme for v2g connections. IEEE Transactions on Vehicular Technology, 66, 2615–2629. CrossRef Abdallah, A., & Shen, X. S. (2016). Lightweight authentication and privacy-preserving scheme for v2g connections. IEEE Transactions on Vehicular Technology, 66, 2615–2629. CrossRef
35.
Zurück zum Zitat Tanveer, M., Zahid, A. H., Ahmad, M., Baz, A., & Alhakami, H. (2020). Lake-IoD: Lightweight authenticated key exchange protocol for the internet of drone environment. IEEE Access, 8, 155645–155659. CrossRef Tanveer, M., Zahid, A. H., Ahmad, M., Baz, A., & Alhakami, H. (2020). Lake-IoD: Lightweight authenticated key exchange protocol for the internet of drone environment. IEEE Access, 8, 155645–155659. CrossRef
36.
Zurück zum Zitat Luo, M., Chang, X., Nie, L., Yang, Y., Hauptmann, A. G., & Zheng, Q. (2017a). An adaptive semisupervised feature analysis for video semantic recognition. IEEE Transactions on Cybernetics, 48, 648–660. CrossRef Luo, M., Chang, X., Nie, L., Yang, Y., Hauptmann, A. G., & Zheng, Q. (2017a). An adaptive semisupervised feature analysis for video semantic recognition. IEEE Transactions on Cybernetics, 48, 648–660. CrossRef
37.
Zurück zum Zitat Luo, M., Nie, F., Chang, X., Yang, Y., Hauptmann, A. G., & Zheng, Q. (2017b). Adaptive unsupervised feature selection with structure regularization. IEEE Transactions on Neural Networks and Learning Systems, 29, 944–956. CrossRef Luo, M., Nie, F., Chang, X., Yang, Y., Hauptmann, A. G., & Zheng, Q. (2017b). Adaptive unsupervised feature selection with structure regularization. IEEE Transactions on Neural Networks and Learning Systems, 29, 944–956. CrossRef
38.
Zurück zum Zitat Stallings, W. (2006). Cryptography and Network Security, 4/E, Pearson Education India. Stallings, W. (2006). Cryptography and Network Security, 4/E, Pearson Education India.
39.
Zurück zum Zitat Kumari, A., Yahya Abbasi, M., Kumar, V., & Khan, A. A. (2019). A secure user authentication protocol using elliptic curve cryptography. Journal of Discrete Mathematical Sciences and Cryptography, 22, 521–530. CrossRef Kumari, A., Yahya Abbasi, M., Kumar, V., & Khan, A. A. (2019). A secure user authentication protocol using elliptic curve cryptography. Journal of Discrete Mathematical Sciences and Cryptography, 22, 521–530. CrossRef
41.
Zurück zum Zitat Stinson, D. R. (2006). Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography, 38, 259–277. CrossRef Stinson, D. R. (2006). Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography, 38, 259–277. CrossRef
42.
Zurück zum Zitat Kumar, V., Jangirala, S., & Ahmad, M. (2018). An efficient mutual authentication framework for healthcare system in cloud computing. Journal of Medical Systems, 42, 1–25. CrossRef Kumar, V., Jangirala, S., & Ahmad, M. (2018). An efficient mutual authentication framework for healthcare system in cloud computing. Journal of Medical Systems, 42, 1–25. CrossRef
43.
Zurück zum Zitat Wang, W., Huang, H., Zhang, L., & Su, C. (2021). Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Networking and Applications, 14(5), 2681–2693. Wang, W., Huang, H., Zhang, L., & Su, C. (2021). Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Networking and Applications, 14(5), 2681–2693.
44.
Zurück zum Zitat Abbasinezhad-Mood, D., & Nikooghadam, M. (2018). An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Transactions on Industrial Electronics, 65, 7996–8004. CrossRef Abbasinezhad-Mood, D., & Nikooghadam, M. (2018). An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Transactions on Industrial Electronics, 65, 7996–8004. CrossRef
45.
Zurück zum Zitat Islam, S. H. (2014). Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dynamics, 78, 2261–2276. CrossRef Islam, S. H. (2014). Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dynamics, 78, 2261–2276. CrossRef
46.
Zurück zum Zitat Khan, A. A., Kumar, V., Ahmad, M., Rana, S., & Mishra, D. (2020). Palk: Password-based anonymous lightweight key agreement framework for smart grid. International Journal of Electrical Power & Energy Systems, 121, 106121. CrossRef Khan, A. A., Kumar, V., Ahmad, M., Rana, S., & Mishra, D. (2020). Palk: Password-based anonymous lightweight key agreement framework for smart grid. International Journal of Electrical Power & Energy Systems, 121, 106121. CrossRef
47.
Zurück zum Zitat Chaudhry, S. A., Naqvi, H., Sher, M., Farash, M. S., & Hassan, M. U. (2017). An improved and provably secure privacy preserving authentication protocol for sip. Peer-to-Peer Networking and Applications, 10, 1–15. Chaudhry, S. A., Naqvi, H., Sher, M., Farash, M. S., & Hassan, M. U. (2017). An improved and provably secure privacy preserving authentication protocol for sip. Peer-to-Peer Networking and Applications, 10, 1–15.
48.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 426, 233–271. CrossRef Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 426, 233–271. CrossRef
49.
Zurück zum Zitat Chaturvedi, A., Mishra, D., & Mukhopadhyay, S. (2017). An enhanced dynamic id-based authentication scheme for telecare medical information systems. Journal of King Saud University-Computer and Information Sciences, 29, 54–62. CrossRef Chaturvedi, A., Mishra, D., & Mukhopadhyay, S. (2017). An enhanced dynamic id-based authentication scheme for telecare medical information systems. Journal of King Saud University-Computer and Information Sciences, 29, 54–62. CrossRef
50.
Zurück zum Zitat Kumar, V., Ahmad, M., Mishra, D., Kumari, S., & Khan, M. K. (2020). Rseap: Rfid based secure and efficient authentication protocol for vehicular cloud computing. Vehicular Communications, 22, 100213. CrossRef Kumar, V., Ahmad, M., Mishra, D., Kumari, S., & Khan, M. K. (2020). Rseap: Rfid based secure and efficient authentication protocol for vehicular cloud computing. Vehicular Communications, 22, 100213. CrossRef
51.
Zurück zum Zitat Armando, A., Basin, D., Cuellar, J., Rusinowitch, M., & Viganó, L. (2006). Avispa: automated validation of internet security protocols and applications. ERCIM News, 64, 76 Armando, A., Basin, D., Cuellar, J., Rusinowitch, M., & Viganó, L. (2006). Avispa: automated validation of internet security protocols and applications. ERCIM News, 64, 76
52.
Zurück zum Zitat Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P. H., Héam, P.-C. , Kouchnarenko, O., Mantovani, J., et al. (2005). The avispa tool for the automated validation of internet security protocols and applications. In International conference on computer aided verification (pp. 281–285). Springer, Berlin. Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P. H., Héam, P.-C. , Kouchnarenko, O., Mantovani, J., et al. (2005). The avispa tool for the automated validation of internet security protocols and applications. In International conference on computer aided verification (pp. 281–285). Springer, Berlin.
Metadaten
Titel
A secure and efficient key agreement framework for critical energy infrastructure using mobile device
verfasst von
Akber Ali Khan
Vinod Kumar
Musheer Ahmad
B. B. Gupta
Musheer Ahmad
Ahmed A. Abd El-Latif
Publikationsdatum
14.09.2021
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 4/2021
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-021-00826-6

Weitere Artikel der Ausgabe 4/2021

Telecommunication Systems 4/2021 Zur Ausgabe