{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:17:53Z","timestamp":1753600673316,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030385569"},{"type":"electronic","value":"9783030385576"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38557-6_4","type":"book-chapter","created":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T14:03:04Z","timestamp":1584540184000},"page":"63-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid"],"prefix":"10.1007","author":[{"given":"Mostafa","family":"Farhdi Moghadam","sequence":"first","affiliation":[]},{"given":"Amirhossein","family":"Mohajerzdeh","sequence":"additional","affiliation":[]},{"given":"Hadis","family":"Karimipour","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Chitsaz","sequence":"additional","affiliation":[]},{"given":"Roya","family":"Karimi","sequence":"additional","affiliation":[]},{"given":"Behzad","family":"Molavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,19]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"20557","DOI":"10.1109\/ACCESS.2017.2751586","volume":"5","author":"M Chen","year":"2017","unstructured":"M. Chen, Y. Miao, Y. Hao, K. Hwang, Narrow band internet of things. IEEE Access 5, 20557\u201320577 (2017)","journal-title":"IEEE Access"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","volume":"78","author":"M Conti","year":"2018","unstructured":"M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: challenges and opportunitiesm. Futur. Gener. Comput. Syst. 78, 544\u2013546 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"2984","DOI":"10.1109\/ACCESS.2017.2786584","volume":"6","author":"H Karimipour","year":"2017","unstructured":"H. Karimipour, V. Dinavahi, Robust Massively parallel dynamic state estimation of power systems against cyber-attack. IEEE Access 6, 2984\u20132995 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"4_CR4","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1049\/iet-gtd.2015.0808","volume":"10","author":"H Karimipour","year":"2016","unstructured":"H. Karimipour, V. Dinavahi, Parallel relaxation based joint dynamic state estimation of large-scale power system. IET Gen. Trans. Dist. 10(2), 452\u2013459 (2016)","journal-title":"IET Gen. Trans. Dist."},{"unstructured":"H.M. Ruzbahani, A. Rahimnejad, H. Karimipour, Smart households demand response management with micro grid, in IEEE Innovative Smart Grid Technologies (ISGT 2019), Washington, DC (2019), pp. 1\u20135","key":"4_CR5"},{"unstructured":"A. Dehghantanha, K. Franke, Privacy-respecting digital investigation, in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (2014), pp. 129\u2013138","key":"4_CR6"},{"issue":"10","key":"4_CR7","first-page":"456","volume":"11","author":"F Ghalavand","year":"2018","unstructured":"F. Ghalavand, B.M. Alizadeh, H. Karimipour, Micro grid islanding detection based on mathematical morphology. J. Energy 11(10), 456\u2013477 (2018)","journal-title":"J. Energy"},{"issue":"9","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R Lu","year":"2012","unstructured":"R. Lu, X. Liang, X. Li, X. Lin, X. Shen, Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621\u20131631 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1539","DOI":"10.1109\/TSG.2014.2387169","volume":"6","author":"H Karimipour","year":"2015","unstructured":"H. Karimipour, V. Dinavahi, Extended Kalman filter based massively parallel dynamic state estimation. IEEE Trans. Smart Grid 6(3), 1539\u20131549 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"80778","DOI":"10.1109\/ACCESS.2019.2920326","volume":"7","author":"H Karimipour","year":"2019","unstructured":"H. Karimipour, A. Dehghantanha, R.M. Parizi, R. Choo, H. Leung, A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778\u201380788 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"4_CR11","first-page":"1265","volume":"52","author":"H Karimipour","year":"2016","unstructured":"H. Karimipour, V. Dinavahi, Parallel domain decomposition based distributed state estimation for large-scale power systems. IEEE Trans. Ind. Appl. 52(2), 1265\u20131269 (2016)","journal-title":"IEEE Trans. Ind. Appl."},{"unstructured":"N. Framework, Roadmap for Smart Grid Interoperability Standards (National Institute of Standards and Technology, 2010), p. 26","key":"4_CR12"},{"unstructured":"D.B. Rawat, C. Bajracharya, Cyber security for smart grid systems: Status, challenges and perspectives, in IEEE SoutheastCon 2015 (2015), pp. 1\u20136","key":"4_CR13"},{"issue":"4","key":"4_CR14","first-page":"10","volume":"2","author":"M Damshenas","year":"2013","unstructured":"M. Damshenas, A. Dehghantanha, R. Mahmoud, A survey on malware propagation, analysis, and detection. Int. J. Cyber-Secur. Digital Forensics 2(4), 10\u201330 (2013)","journal-title":"Int. J. Cyber-Secur. Digital Forensics"},{"unstructured":"S. Hadayeghparast, A. S. Soltaninejad, H. Karimipour, Employing composite demand response model in microgrid energy management, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1\u20135","key":"4_CR15"},{"unstructured":"S. Hadayeghparast, H. A. Shayanfar, H. Karimipour, Day-ahead scheduling of a virtual power plant in presence of an incentive-based demand response program, in IEEE I&CPS Conference, Calgary, Canada, (2019), pp. 1\u20135","key":"4_CR16"},{"issue":"8","key":"4_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2012.6257523","volume":"50","author":"P-Y Chen","year":"2012","unstructured":"P.-Y. Chen, S.-M. Cheng, K.-C. Chen, Smart attacks in smart grid communication networks. IEEE Commun. Mag. 50(8), 24\u201329 (2012)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/JSYST.2013.2260695","volume":"8","author":"P Lv","year":"2013","unstructured":"P. Lv, X. Wang, Y. Yang, M. Xu, Network virtualization for smart grid communications. IEEE Syst. J. 8(2), 471\u2013482 (2013)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"4_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.17775\/CSEEJPES.2016.00046","volume":"2","author":"Q Song","year":"2016","unstructured":"Q. Song, W. Sheng, L. Kou, D. Zhao, Z. Wu, H. Fang, Smart substation integration technology and its application in distribution power grid. CSEE J. Power Energy Syst. 2(4), 31\u201336 (2016)","journal-title":"CSEE J. Power Energy Syst."},{"unstructured":"E. Tebekaemi, D. Wijesekera, Designing an IEC 61850 based power distribution substation simulation\/emulation testbed for cyber-physical security studies, in Proceedings of the First International Conference on Cyber-Technologies and Cyber-Systems (2016), pp. 41\u201349","key":"4_CR20"},{"unstructured":"C. Wester, M. Adamiak, J. Vico, IEC61850 protocol-practical applications in industrial facilities, in 2011 IEEE Industry Applications Society Annual Meeting (2011), pp. 1\u20137","key":"4_CR21"},{"unstructured":"R. Tawde, A. Nivangune, M. Sankhe, Cyber security in smart grid SCADA automation systems, in 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (2015), pp. 1\u20135","key":"4_CR22"},{"issue":"5","key":"4_CR23","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/JIOT.2014.2358578","volume":"1","author":"D Li","year":"2014","unstructured":"D. Li, Z. Aung, J. Williams, A. Sanchez, P3: Privacy preservation protocol for automatic appliance control application in smart grid. IEEE Internet Things J. 1(5), 414\u2013429 (2014)","journal-title":"IEEE Internet Things J."},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"11626","DOI":"10.1109\/ACCESS.2017.2716440","volume":"5","author":"R Khan","year":"2017","unstructured":"R. Khan, K. Mclaughlin, D. Laverty, S. Sezer, Design and implementation of security gateway for synchrophasor based real-time control and monitoring in smart grid. IEEE Access 5, 11626\u201311644 (2017)","journal-title":"IEEE Access"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1016\/j.future.2017.04.012","volume":"83","author":"X Li","year":"2018","unstructured":"X. Li, J. Niu, S. Kumari, F. Wu, K.-K.R. Choo, A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Futur. Gener. Comput. Syst. 83, 607\u2013618 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"E. Modiri, A. Azmoodeh, A. Dehghantanha, H. Karimipour, Fuzzy pattern tree for edge attack detection and categorization. Elsevier J. Syst. Archit., 1\u201315 (2018)","key":"4_CR26","DOI":"10.1016\/j.sysarc.2019.01.017"},{"key":"4_CR27","first-page":"80","volume":"44","author":"S Mohammadi","year":"2018","unstructured":"S. Mohammadi, H. Mirvaziri, M.G. Ahsaee, H. Karimipour, Cyber intrusion detection by combined feature selection algorithm. Elsevier J. Inf. Secur. Appl. 44, 80\u201388 (2018)","journal-title":"Elsevier J. Inf. Secur. Appl."},{"unstructured":"H. Karimipour, V. Dinavahi, On false data injection attack against dynamic state estimation on smart power grids, in IEEE International Conference on Smart Energy Grid Engineering, Oshawa, Canada (2017), pp. 1\u20137","key":"4_CR28"},{"issue":"5","key":"4_CR29","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"W. Wang, Z. Lu, Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344\u20131371 (2013)","journal-title":"Comput. Netw."},{"issue":"2","key":"4_CR30","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TSG.2011.2120634","volume":"2","author":"D Wu","year":"2011","unstructured":"D. Wu, C. Zhou, Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375\u2013381 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"4_CR31","first-page":"1900","volume":"9","author":"V Odelu","year":"2016","unstructured":"V. Odelu, A.K. Das, M. Wazid, M. Conti, Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900\u20131910 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"4_CR32","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TSG.2012.2199141","volume":"3","author":"J Xia","year":"2012","unstructured":"J. Xia, Y. Wang, Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437\u20131443 (2012)","journal-title":"IEEE Trans. Smart Grid"},{"unstructured":"H. Nicanfar, P. Jokar, V.C. Leung, Smart grid authentication and key management for unicast and multicast communications, in 2011 IEEE PES Innovative Smart Grid Technologies (2011), pp. 1\u20138","key":"4_CR33"},{"key":"4_CR34","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"K. Mahmood, S.A. Chaudhry, H. Naqvi, S. Kumari, X. Li, A.K. Sangaiah, An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur. Gener. Comput. Syst. 81, 557\u2013565 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"4_CR35","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/JSYST.2013.2260942","volume":"8","author":"H Nicanfar","year":"2013","unstructured":"H. Nicanfar, P. Jokar, K. Beznosov, V.C. Leung, Efficient authentication and key management mechanisms for smart grid communications. IEEE Syst. J. 8(2), 629\u2013640 (2013)","journal-title":"IEEE Syst. J."},{"issue":"14","key":"4_CR36","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1049\/iet-com.2016.0091","volume":"10","author":"D He","year":"2016","unstructured":"D. He, H. Wang, M.K. Khan, L. Wang, Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14), 1795\u20131802 (2016)","journal-title":"IET Commun."},{"issue":"2","key":"4_CR37","first-page":"906","volume":"7","author":"J-L Tsai","year":"2015","unstructured":"J.-L. Tsai, N.-W. Lo, Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906\u2013914 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"9","key":"4_CR38","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.3390\/en10091354","volume":"10","author":"Y Chen","year":"2017","unstructured":"Y. Chen, J.-F. Mart\u00ednez, P. Castillejo, L. L\u00f3pez, An anonymous authentication and key establish scheme for smart grid: FAuth. Energies 10(9), 1354 (2017)","journal-title":"Energies"},{"issue":"10","key":"4_CR39","doi-asserted-by":"publisher","first-page":"7996","DOI":"10.1109\/TIE.2018.2807383","volume":"65","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"D. Abbasinezhad-Mood, M. Nikooghadam, An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Trans. Ind. Electron. 65(10), 7996\u20138004 (2018)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"4","key":"4_CR40","doi-asserted-by":"publisher","first-page":"4349","DOI":"10.1109\/TSG.2018.2857558","volume":"10","author":"P Kumar","year":"2019","unstructured":"P. Kumar, A. Gurtov, M. Sain, A. Martin, P.H. Ha, Lightweight authentication and key agreement for smart metering in smart energy networks. in IEEE Transactions on Smart Grid 10(4), 4349\u20134359 (July 2019)","journal-title":"in IEEE Transactions on Smart Grid"},{"issue":"4","key":"4_CR41","doi-asserted-by":"publisher","first-page":"3953","DOI":"10.1109\/TSG.2018.2844403","volume":"10","author":"P Gope","year":"2019","unstructured":"P. Gope, B. Sikdar, Privacy-aware authenticated key agreement scheme for secure smart grid communication. in IEEE Transactions on Smart Grid 10(4), 3953\u20133962 (July 2019)","journal-title":"in IEEE Transactions on Smart Grid"},{"key":"4_CR42","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1016\/j.future.2019.05.069","volume":"100","author":"L Zhang","year":"2019","unstructured":"L. Zhang, L. Zhao, S. Yin, C.-H. Chi, R. Liu, Y. Zhang, A lightweight authentication scheme 403 with privacy protection for smart grid communications. Futur. Gener. Comput. Syst. 100, 770\u2013778 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4_CR43","doi-asserted-by":"publisher","first-page":"22633","DOI":"10.1109\/ACCESS.2019.2898376","volume":"7","author":"Y Chen","year":"2019","unstructured":"Y. Chen, J.-F. Mart\u00ednez, P. Castillejo, L. L\u00f3pez, A bilinear map pairing based authentication scheme for smart grid communications: PAuth. IEEE Access 7, 22633\u201322643 (2019)","journal-title":"IEEE Access"},{"key":"4_CR44","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.adhoc.2019.03.005","volume":"89","author":"D Abbasinezhad-Mood","year":"2019","unstructured":"D. Abbasinezhad-Mood, M. Nikooghadam, S.M. Mazinani, A. Babamohammadi, A. Ostad-Sharif, More efficient key establishment protocol for smart grid communications: design and experimental evaluation on ARM-based hardware. Ad Hoc Netw. 89, 119\u2013131 (2019)","journal-title":"Ad Hoc Netw."},{"issue":"6","key":"4_CR45","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1109\/TSG.2016.2526045","volume":"8","author":"K Sha","year":"2016","unstructured":"K. Sha, N. Alatrash, Z. Wang, A secure and efficient framework to read isolated smart grid devices. IEEE Trans. Smart Grid 8(6), 2519\u20132531 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"11","key":"4_CR46","first-page":"4815","volume":"14","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"D. Abbasinezhad-Mood, M. Nikooghadam, Efficient anonymous password-authenticated key exchange protocol to read isolated smart meters by utilization of extended Chebyshev chaotic maps. IEEE Trans. Ind. Inf. 14(11), 4815\u20134828 (2018)","journal-title":"IEEE Trans. Ind. Inf."}],"container-title":["Handbook of Big Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38557-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T03:10:15Z","timestamp":1666149015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38557-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030385569","9783030385576"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38557-6_4","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}