{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:10:03Z","timestamp":1743117003069,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819744640"},{"type":"electronic","value":"9789819744657"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-4465-7_17","type":"book-chapter","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:01:46Z","timestamp":1720717306000},"page":"233-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preserving Multi Factor Authentication Protocol for\u00a0Next Generation Grids Deployed in\u00a0Smart Cities"],"prefix":"10.1007","author":[{"given":"Osama","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Kamabe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"issue":"10","key":"17_CR1","doi-asserted-by":"publisher","first-page":"7996","DOI":"10.1109\/TIE.2018.2807383","volume":"65","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood, D., Nikooghadam, M.: An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Trans. Industr. Electron. 65(10), 7996\u20138004 (2018)","journal-title":"IEEE Trans. Industr. Electron."},{"issue":"3","key":"17_CR2","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/TII.2019.2927512","volume":"16","author":"D Abbasinezhad-Mood","year":"2019","unstructured":"Abbasinezhad-Mood, D., Ostad-Sharif, A., Nikooghadam, M., Mazinani, S.M.: A secure and efficient key establishment scheme for communications of smart meters and service providers in smart grid. IEEE Trans. Industr. Inf. 16(3), 1495\u20131502 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"17_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109335","volume":"217","author":"W Akram","year":"2022","unstructured":"Akram, W., Mahmood, K., Li, X., Sadiq, M., Lv, Z., Chaudhry, S.A.: An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing. Comput. Netw. 217, 109335 (2022)","journal-title":"Comput. Netw."},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139\u2013155. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_11"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"issue":"7","key":"17_CR6","doi-asserted-by":"publisher","first-page":"5744","DOI":"10.1109\/JIOT.2020.3030308","volume":"8","author":"B Bera","year":"2020","unstructured":"Bera, B., Saha, S., Das, A.K., Vasilakos, A.V.: Designing blockchain-based access control protocol in IoT-enabled smart-grid system. IEEE Internet Things J. 8(7), 5744\u20135761 (2020)","journal-title":"IEEE Internet Things J."},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"101235","DOI":"10.1109\/ACCESS.2020.2996093","volume":"8","author":"SA Chaudhry","year":"2020","unstructured":"Chaudhry, S.A., Alhakami, H., Baz, A., Al-Turjman, F.: Securing demand response management: a certificate-based access control in smart grid edge computing infrastructure. IEEE Access 8, 101235\u2013101243 (2020)","journal-title":"IEEE Access"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-36288-6_2","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"JC Choon","year":"2003","unstructured":"Choon, J.C., Hee Cheon, J.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18\u201330. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_2"},{"issue":"9","key":"17_CR10","doi-asserted-by":"publisher","first-page":"6374","DOI":"10.1109\/JIOT.2021.3109314","volume":"9","author":"AK Das","year":"2021","unstructured":"Das, A.K., Bera, B., Saha, S., Kumar, N., You, I., Chao, H.C.: Ai-envisioned blockchain-enabled signature-based key management scheme for industrial cyber-physical systems. IEEE Internet Things J. 9(9), 6374\u20136388 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: 2010 first IEEE International Conference on Smart Grid Communications, pp. 238\u2013243. IEEE (2010)","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/JSYST.2018.2866067","volume":"13","author":"YK Ever","year":"2018","unstructured":"Ever, Y.K.: Secure-anonymous user authentication scheme for e-healthcare application using wireless medical sensor networks. IEEE Syst. J. 13(1), 456\u2013467 (2018)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"17_CR14","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","volume":"2","author":"MM Fouda","year":"2011","unstructured":"Fouda, M.M., Fadlullah, Z.M., Kato, N., Lu, R., Shen, X.S.: A lightweight message authentication scheme for smart grid communications. IEEE Trans. Smart grid 2(4), 675\u2013685 (2011)","journal-title":"IEEE Trans. Smart grid"},{"issue":"5","key":"17_CR15","doi-asserted-by":"publisher","first-page":"3548","DOI":"10.1109\/TII.2019.2944880","volume":"16","author":"S Garg","year":"2019","unstructured":"Garg, S., Kaur, K., Kaddoum, G., Rodrigues, J.J., Guizani, M.: Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Trans. Industr. Inf. 16(5), 3548\u20133557 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"6","key":"17_CR16","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security-a survey. IEEE Internet Things J. 4(6), 1802\u20131831 (2017)","journal-title":"IEEE Internet Things J."},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/3-540-46088-8_17","volume-title":"Financial Cryptography","author":"M Jakobsson","year":"2002","unstructured":"Jakobsson, M., Pointcheval, D.: Mutual authentication for low-power mobile devices. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 178\u2013195. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46088-8_17"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia, X., He, D., Kumar, N., Choo, K.K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Netw. 25, 4737\u20134750 (2019)","journal-title":"Wireless Netw."},{"issue":"1","key":"17_CR19","doi-asserted-by":"publisher","first-page":"187","DOI":"10.3745\/JIPS.2011.7.1.187","volume":"7","author":"JJ Kim","year":"2011","unstructured":"Kim, J.J., Hong, S.P.: A method of risk assessment for multi-factor authentication. J. Inf. Process. Syst. 7(1), 187\u2013198 (2011)","journal-title":"J. Inf. Process. Syst."},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"107046","DOI":"10.1109\/ACCESS.2020.3000790","volume":"8","author":"J Lee","year":"2020","unstructured":"Lee, J., Yu, S., Kim, M., Park, Y., Das, A.K.: On the design of secure and efficient three-factor authentication protocol using honey list for wireless sensor networks. IEEE Access 8, 107046\u2013107062 (2020)","journal-title":"IEEE Access"},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.jpdc.2017.11.008","volume":"132","author":"X Li","year":"2019","unstructured":"Li, X., Wu, F., Kumari, S., Xu, L., Sangaiah, A.K., Choo, K.K.R.: A provably secure and anonymous message authentication scheme for smart grids. J. Parallel Distrib. Comput. 132, 242\u2013249 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Lu, Z., Lu, X., Wang, W., Wang, C.: Review and evaluation of security threats on the communication networks in the smart grid. In: 2010-MILCOM 2010 Military Communications Conference, pp. 1830\u20131835. IEEE (2010)","DOI":"10.1109\/MILCOM.2010.5679551"},{"key":"17_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106888","volume":"88","author":"K Mahmood","year":"2020","unstructured":"Mahmood, K., Akram, W., Shafiq, A., Altaf, I., Lodhi, M.A., Islam, S.H.: An enhanced and provably secure multi-factor authentication scheme for internet-of-multimedia-things environments. Comput. Electr. Eng. 88, 106888 (2020)","journal-title":"Comput. Electr. Eng."},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur. Gener. Comput. Syst. 81, 557\u2013565 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"17_CR25","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.compeleceng.2016.02.017","volume":"52","author":"K Mahmood","year":"2016","unstructured":"Mahmood, K., Chaudhry, S.A., Naqvi, H., Shon, T., Ahmad, H.F.: A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52, 114\u2013124 (2016)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"17_CR26","first-page":"1900","volume":"9","author":"V Odelu","year":"2016","unstructured":"Odelu, V., Das, A.K., Wazid, M., Conti, M.: Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900\u20131910 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"17_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/cryptography2010001","volume":"2","author":"A Ometov","year":"2018","unstructured":"Ometov, A., Bezzateev, S., M\u00e4kitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-factor authentication: a survey. Cryptography 2(1), 1 (2018)","journal-title":"Cryptography"},{"issue":"3","key":"17_CR28","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.3390\/app13031424","volume":"13","author":"M Rana","year":"2023","unstructured":"Rana, M., Mahmood, K., Saleem, M.A., Al-Turjman, F., Kolhar, M.S., Altrjman, C.: Towards a provably secure authentication protocol for fog-driven IoT-based systems. Appl. Sci. 13(3), 1424 (2023)","journal-title":"Appl. Sci."},{"key":"17_CR29","unstructured":"Scheidt, E.M., Domangue, E.: Multiple factor-based user identification and authentication, US Patent 7,131,009 (2006)"},{"issue":"7","key":"17_CR30","doi-asserted-by":"publisher","first-page":"4425","DOI":"10.1109\/TII.2020.3011849","volume":"17","author":"J Srinivas","year":"2020","unstructured":"Srinivas, J., Das, A.K., Li, X., Khan, M.K., Jo, M.: Designing anonymous signature-based authenticated key exchange scheme for internet of things-enabled smart grid systems. IEEE Trans. Industr. Inf. 17(7), 4425\u20134436 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"17_CR31","first-page":"906","volume":"7","author":"JL Tsai","year":"2015","unstructured":"Tsai, J.L., Lo, N.W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906\u2013914 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"17_CR32","doi-asserted-by":"publisher","first-page":"1984","DOI":"10.1109\/TII.2019.2936278","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang, J., Wu, L., Choo, K.K.R., He, D.: Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans. Industr. Inf. 16(3), 1984\u20131992 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"15","key":"17_CR33","doi-asserted-by":"publisher","first-page":"3604","DOI":"10.1016\/j.comnet.2011.07.010","volume":"55","author":"W Wang","year":"2011","unstructured":"Wang, W., Xu, Y., Khanna, M.: A survey on the communication architectures in smart grid. Comput. Netw. 55(15), 3604\u20133629 (2011)","journal-title":"Comput. Netw."},{"issue":"6","key":"17_CR34","doi-asserted-by":"publisher","first-page":"3144","DOI":"10.1109\/TII.2017.2732999","volume":"13","author":"M Wazid","year":"2017","unstructured":"Wazid, M., Das, A.K., Kumar, N., Rodrigues, J.J.: Secure three-factor user authentication scheme for renewable-energy-based smart grid environment. IEEE Trans. Industr. Inf. 13(6), 3144\u20133153 (2017)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"17_CR35","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TSG.2011.2120634","volume":"2","author":"D Wu","year":"2011","unstructured":"Wu, D., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375\u2013381 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"17_CR36","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TSG.2012.2199141","volume":"3","author":"J Xia","year":"2012","unstructured":"Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437\u20131443 (2012)","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-4465-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:03:51Z","timestamp":1720717431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-4465-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819744640","9789819744657"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-4465-7_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Okinawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.biz\/conf\/mobisec23\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}