{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:58:56Z","timestamp":1743015536436,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789812872500"},{"type":"electronic","value":"9789812872517"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-287-251-7_39","type":"book-chapter","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T13:03:18Z","timestamp":1659963798000},"page":"569-590","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Authentication and Integrity Protection for\u00a0Real-Time Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Sye Loong","family":"Keoh","sequence":"first","affiliation":[]},{"given":"Heng Chuan","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Zhaohui","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,9]]},"reference":[{"issue":"1","key":"39_CR1","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TII.2015.2414355","volume":"12","author":"D Alahakoon","year":"2016","unstructured":"D. Alahakoon, X. Yu, Smart electricity meter data intelligence for future energy systems: A survey. IEEE Trans. Ind. Inform. 12(1), 425\u2013436 (2016)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"17\u201318","key":"39_CR2","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1016\/j.comcom.2013.09.004","volume":"36","author":"E Ancillotti","year":"2013","unstructured":"E. Ancillotti, R. Bruno, M. Conti, The role of communication systems in smart grids: Architectures, technical solutions and research challenges. Comput. Commun. 36(17\u201318), 1665\u20131697 (2013)","journal-title":"Comput. Commun."},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.comnet.2018.01.010","volume":"132","author":"M Benmalek","year":"2018","unstructured":"M. Benmalek, Y. Challal, A. Derhab, A. Bouabdallah, VerSAMI: Versatile and Scalable key management for smart grid AMI systems. Comput. Netw. 132, 161\u2013179 (2018)","journal-title":"Comput. Netw."},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"D. Bian, M. Kuzlu, M. Pipattanasomporn, S. Rahman, Analysis of communication schemes for advanced metering infrastructure (AMI). In 2014 IEEE PES general meeting \u2013 conference & exposition, IEEE (2014), pp. 1\u20135","DOI":"10.1109\/PESGM.2014.6939562"},{"issue":"9","key":"39_CR5","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.3390\/en10091354","volume":"10","author":"Y Chen","year":"2017","unstructured":"Y. Chen, J.-F. Mart\u00ednez, P. Castillejo, L. L\u00f3pez, An anonymous authentication and key establish scheme for smart grid: FAuth. Energies 10(9), 1354 (2017)","journal-title":"Energies"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s11276-015-0983-3","volume":"22","author":"D He","year":"2016","unstructured":"D. He, N. Kumar, J.-H. Lee, Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wirel. Netw 22, 491\u2013502 (2016)","journal-title":"Wirel. Netw"},{"issue":"6","key":"39_CR7","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"A. Humayed, J. Lin, F. Li, B. Luo, Cyber-physical systems security \u2013 A survey. IEEE Internet Things J. 4(6), 1802\u20131831 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"39_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"D. Johnson, A. Menezes, S. Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"39_CR9","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.rser.2015.12.114","volume":"57","author":"Y Kabalci","year":"2016","unstructured":"Y. Kabalci, A survey on smart metering and smart grid communication. Renew. Sust. Energ. Rev. 57, 302\u2013318 (2016)","journal-title":"Renew. Sust. Energ. Rev."},{"key":"39_CR10","unstructured":"S.L. Keoh, Z. Tang, Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In 2014 10th international conference on information assurance and security (2014), pp. 6\u201311"},{"issue":"4","key":"39_CR11","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1007\/s11036-017-0956-0","volume":"23","author":"S Khasawneh","year":"2018","unstructured":"S. Khasawneh, M. Kadoch, Hybrid cryptography algorithm with precomputation for advanced metering infrastructure networks. Mob. Netw. Appl. 23(4), 982\u2013993 (2018)","journal-title":"Mob. Netw. Appl."},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"H. Ko, J. Jin, S.L. Keoh, in ViotSOC: Controlling access to dynamically virtualized IoT services using service object capability. Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS \u201917 (ACM, New York, 2017), pp. 69\u201380","DOI":"10.1145\/3055186.3055194"},{"key":"39_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1997","unstructured":"N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48, 203\u2013209 (1997)","journal-title":"Math. Comput."},{"key":"39_CR14","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.compeleceng.2016.02.017","volume":"52","author":"K Mahmood","year":"2016","unstructured":"K. Mahmood, S.A. Chaudhry, H. Naqvi, T. Shon, H.F. Ahmad, A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52, 114\u2013124 (2016)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"39_CR15","doi-asserted-by":"publisher","first-page":"2834","DOI":"10.1109\/TSG.2016.2620939","volume":"9","author":"A Mohammadali","year":"2018","unstructured":"A. Mohammadali, M. Sayad Haghighi, M.H. Tadayon, A. Mohammadi-Nodooshan, A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834\u20132842 (2018)","journal-title":"IEEE Trans. Smart Grid"},{"key":"39_CR16","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.ijepes.2014.06.025","volume":"63","author":"RR Mohassel","year":"2014","unstructured":"R.R. Mohassel, A. Fung, F. Mohammadi, K. Raahemifar, A survey on advanced metering infrastructure. Int. J. Electr. Power Energy Syst. 63, 473\u2013484 (2014)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"J. Ng, S.L. Keoh, Z. Tang, H. Ko, SEABASS: Symmetric-keychain encryption and authentication for building automation systems. In 4th IEEE World Forum on Internet of Things (WF-IoT 2018), Singapore (5\u20138 Feb 2018), pp. 219\u2013224","DOI":"10.1109\/WF-IoT.2018.8355106"},{"issue":"2","key":"39_CR18","doi-asserted-by":"publisher","first-page":"7:1","DOI":"10.1145\/2619998","volume":"9","author":"RD Nicola","year":"2014","unstructured":"R.D. Nicola, M. Loreti, R. Pugliese, F. Tiezzi, A formal approach to autonomic systems programming: The SCEL language. ACM Trans. Auton. Adapt. Syst. 9(2), 7:1\u20137:29 (2014)","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"issue":"4","key":"39_CR19","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s11235-018-0446-0","volume":"69","author":"V Odelu","year":"2018","unstructured":"V. Odelu, S. Zeadally, A.K. Das, M. Wazid, D. He, A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4), 431\u2013445 (2018)","journal-title":"Telecommun. Syst."},{"issue":"9","key":"39_CR20","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.camwa.2012.02.008","volume":"65","author":"Y Piao","year":"2013","unstructured":"Y. Piao, J. Kim, U. Tariq, M. Hong, Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9), 1300\u20131309 (2013)","journal-title":"Comput. Math. Appl."},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"D.S. Roche, in Space- and time-efficient polynomial multiplication. Proceedings of the 2009 International Symposium on Symbolic and Algebraic Computation (ISSAC \u201909) (ACM, New York, 2009), pp. 295\u2013302","DOI":"10.1145\/1576702.1576743"},{"key":"39_CR22","doi-asserted-by":"crossref","unstructured":"A. Sani, D. Yuan, W. Bao, Z. Dong, in Towards secure energy internet communication scheme: An identity-based key bootstrapping protocol supporting unicast and multicast. 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) (IEEE Computer Society, Los Alamitos, 2017), pp. 1\u20135","DOI":"10.1109\/NCA.2017.8171328"},{"key":"39_CR23","doi-asserted-by":"crossref","unstructured":"M. Siekkinen, M. Hiienkari, J.K. Nurminen, J. Nieminen, How low energy is Bluetooth Low Energy? Comparative measurements with ZigBee\/802.15.4. In 2012 IEEE wireless communications and networking conference workshops (WCNCW), IEEE (2012), pp. 232\u2013237","DOI":"10.1109\/WCNCW.2012.6215496"},{"key":"39_CR24","doi-asserted-by":"crossref","unstructured":"H.C. Tan, K. Lim, S.L. Keoh, Z. Tang, D. Leong, C.S. Sum, Chameleon: A blind double trapdoor hash function for securing AMI data aggregation. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT) (2018), pp. 225\u2013230","DOI":"10.1109\/WF-IoT.2018.8355112"},{"key":"39_CR25","doi-asserted-by":"crossref","unstructured":"T. Thakur, An access control protocol for wireless sensor network using double trapdoor chameleon hash function. J. Sens. (2016), pp. 1\u20136","DOI":"10.1155\/2016\/1210938"},{"issue":"2","key":"39_CR26","first-page":"906","volume":"7","author":"J Tsai","year":"2016","unstructured":"J. Tsai, N. Lo, Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906\u2013914 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"12","key":"39_CR27","doi-asserted-by":"publisher","first-page":"7055","DOI":"10.1109\/TIE.2014.2331014","volume":"61","author":"Z Wan","year":"2014","unstructured":"Z. Wan, G. Wang, Y. Yang, S. Shi, SKM: Scalable key management for advanced metering infrastructure in smart grids. IEEE Trans. Ind. Electron. 61(12), 7055\u20137066 (2014)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"13","key":"39_CR28","doi-asserted-by":"crossref","first-page":"1983","DOI":"10.1002\/sec.1452","volume":"9","author":"M Wazid","year":"2016","unstructured":"M. Wazid, A.K. Das, S. Kumari, X. Li, F. Wu, Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur. Commun. Netw. 9(13), 1983\u20132001 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"39_CR29","unstructured":"WiSUN Alliance, Wi-SUN Alliance and FAN. https:\/\/www.wi-sun.org\/smart-utilities\/. Accessed Jan 2019"}],"container-title":["Handbook of Real-Time Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-287-251-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T11:36:38Z","timestamp":1700912198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-287-251-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789812872500","9789812872517"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-287-251-7_39","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}