Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Soft Computing Applications
Guest editors: Valentina Emilia Balas
Article type: Research Article
Authors: Vallent, Thokozani Felixa; * | Hanyurwimfura, Damiena | Kim, Hyunsungb | Mikeka, Chomorac
Affiliations: [a] African Center of Excellence in Internet of Things, College of Science and Technology, University of Rwanda, KN Street Nyarugenge, Kigali, Rwanda | [b] Kyungil Unversity, School of Computer Science, Gyeongsan-si, South Korea | [c] Department of Physics, University of Malawi, Chancellor College, Zomba, Malawi
Correspondence: [*] Corresponding author. Thokozani Felix Vallent, African Center of Excellence in Internet of Things, College of Science and Technology, University of Rwanda, KN Street Nyarugenge, P.O. Box 3900, Kigali, Rwanda. E-mail: tfvallent@gmail.com.
Abstract: The modern grid has various functionalities by using remote sensor automation in power management, monitoring and controlling the system. Thus, it is imperative to ensure secure communications for various agents in smart grid, since the system is information communication based. Being information based the smart grid encounters security and privacy challenges impeding its adoption. One way of dealing with these cyber concerns is in devising robust cryptosystem for data encryption and authenticated key agreement in the communications of these remotely controlled smart devices. However, many proposed solutions are provided at the expense of computations cost. Thus, this paper designs a novel authenticated key agreement scheme with anonymity based on widely acceptable elliptic curve cryptography with efficiency. The scheme ensures optimal computation and communication overload whilst achieving mutual authentication and anonymity in the key agreement process. The scheme is proven in both formal and informal security analysis in portraying its satisfaction of the standard and extended Canetti–Krawczyk (eCK) security requirements. A comparative analysis with related schemes indicates that the proposed scheme have merits over others.
Keywords: Smart grid, authenticated key agreement, identity-based key agreement, integrity, non-repudiation, mutual authentication
DOI: 10.3233/JIFS-219287
Journal: Journal of Intelligent & Fuzzy Systems, vol. 43, no. 2, pp. 1859-1869, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl