{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T02:50:57Z","timestamp":1714618257190},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,12,15]],"date-time":"2011-12-15T00:00:00Z","timestamp":1323907200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s11227-011-0674-5","type":"journal-article","created":{"date-parts":[[2011,12,14]],"date-time":"2011-12-14T08:24:35Z","timestamp":1323851075000},"page":"435-455","source":"Crossref","is-referenced-by-count":11,"title":["Secure communication mechanism for ubiquitous Smart grid infrastructure"],"prefix":"10.1007","volume":"64","author":[{"given":"Binod","family":"Vaidya","sequence":"first","affiliation":[]},{"given":"Dimitrios","family":"Makrakis","sequence":"additional","affiliation":[]},{"given":"Hussein","family":"Mouftah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,12,15]]},"reference":[{"key":"674_CR1","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/112600.112618","volume-title":"Proceedings of the tenth annual ACM symposium on principles of distributed computing PODC\u201991","author":"M Abadi","year":"1991","unstructured":"Abadi M, Tuttle MR (1991) A\u00a0semantics for a logic of authentication. In: Proceedings of the tenth annual ACM symposium on principles of distributed computing PODC\u201991, Aug 1991. ACM Press, New York, pp 201\u2013216"},{"key":"674_CR2","volume-title":"Proc of EDIST conference","author":"J Alfred","year":"2009","unstructured":"Alfred J (2009) Securing smart meters and the home energy network. In: Proc of EDIST conference"},{"key":"674_CR3","unstructured":"AMI System Security Requirements V1.01 (2008) UCAIUG: AMI-SEC-ASAP, Dec 2008"},{"key":"674_CR4","first-page":"1","volume-title":"Proc of IEEE international conference on communications workshops (ICC)","author":"JM Bohli","year":"2010","unstructured":"Bohli JM, Sorge C, Ugus O (2010) A privacy model for Smart metering. In: Proc of IEEE international conference on communications workshops (ICC), pp 1\u20135, May 2010"},{"key":"674_CR5","unstructured":"Brown MK, Little HA, Davis DL (2010) Device authentication. US2010\/0106970, Apr 2010"},{"issue":"1","key":"674_CR6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"},{"issue":"6","key":"674_CR7","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1016\/j.csi.2007.01.004","volume":"29","author":"YF Chung","year":"2007","unstructured":"Chung YF, Huang KH, Lai F, Chen TS (2007) ID-based digital signature scheme on the elliptic curve cryptosystem. Comput Stand Interfaces 29(6):601\u2013604","journal-title":"Comput Stand Interfaces"},{"key":"674_CR8","first-page":"15","volume-title":"Proc of IEEE PES general meeting\u2014conversion and delivery of electrical energy in the 21st century","author":"FM Cleveland","year":"2008","unstructured":"Cleveland FM (2008) Cyber security issues for advanced metering infrastructure (AMI). In: Proc of IEEE PES general meeting\u2014conversion and delivery of electrical energy in the 21st century, p\u00a015, Jul 2008"},{"key":"674_CR9","first-page":"1","volume-title":"Proc of IEEE\/PES power systems conference and exposition (PSCE 2011)","author":"SSSR Depuru","year":"2011","unstructured":"Depuru SSSR, Wang L, Devabhaktuni V, Gudi N (2011) Smart meters for power grid\u2014challenges, issues, advantages and status. In: Proc of IEEE\/PES power systems conference and exposition (PSCE 2011), pp 1\u20137, Mar 2011"},{"key":"674_CR10","series-title":"LNCS","first-page":"186","volume-title":"Advances in Cryptology\u2014Proc of Crypto\u201986","author":"A Fiat","year":"1987","unstructured":"Fiat A, Shamir A (1987) How to prove yourself: practical solutions to identification and signature problems. In: Advances in Cryptology\u2014Proc of Crypto\u201986. LNCS, vol 263. Springer, Berlin, pp 186\u2013194"},{"key":"674_CR11","first-page":"1035","volume-title":"Proc of the IEEE INFOCOM\u201911 workshop\u2014SCNC","author":"MM Fouda","year":"2011","unstructured":"Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen X(S) (2011) Towards a light-weight message authentication mechanism tailored for Smart grid communications. In: Proc of the IEEE INFOCOM\u201911 workshop\u2014SCNC, pp 1035\u20131040, Apr 2011"},{"issue":"4","key":"674_CR12","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1007\/s00145-006-0224-0","volume":"19","author":"M Girault","year":"2006","unstructured":"Girault M, Poupard G, Stern J (2006) On the fly authentication and signature schemes based on groups of unknown order. J Cryptol 19(4):463\u2013487","journal-title":"J Cryptol"},{"key":"674_CR13","first-page":"234","volume-title":"Proc of the IEEE symposium on research in security and privacy","author":"L Gong","year":"1990","unstructured":"Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proc of the IEEE symposium on research in security and privacy, Oakland, CA, USA, pp 234\u2013248"},{"key":"674_CR14","unstructured":"Guidelines for Smart Grid Cyber Security (2010) NISTIR 7628, vol 1\u20133, NIST, US Dept of Commerce, Aug 2010"},{"key":"674_CR15","series-title":"LNCS","first-page":"162","volume-title":"Smart card research and advanced applications","author":"G Hofferek","year":"2010","unstructured":"Hofferek G, Wolkerstorfer J (2010) Coupon recalculation for the GPS authentication scheme. In: Smart card research and advanced applications. LNCS, vol 5189. Springer, Berlin, pp 162\u2013175"},{"issue":"177","key":"674_CR16","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"issue":"2\u20133","key":"674_CR17","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Des Codes Cryptogr 19(2\u20133):173\u2013193","journal-title":"Des Codes Cryptogr"},{"key":"674_CR18","volume-title":"Proc of 20th international conference on electricity distribution (CIRED 2009)","author":"K Kok","year":"2009","unstructured":"Kok K, Karnouskos S, Nestle D, Dimeas A, Weidlich A, Warmer C, Strauss P, Buchholz B, Drenkard S, Hatziargyriou N, Lioliou V (2009) Smart houses for a smart grid. In: Proc of 20th international conference on electricity distribution (CIRED 2009), Jun 2009"},{"key":"674_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/PSCE.2011.5772596","volume-title":"Proc of IEEE\/PES power systems conference and exposition (PSCE 2011)","author":"S Lakshminarayanan","year":"2011","unstructured":"Lakshminarayanan S (2011) Authentication and authorization for Smart grid application interfaces. In: Proc of IEEE\/PES power systems conference and exposition (PSCE 2011), pp 1\u20135, Mar 2011"},{"key":"674_CR20","volume-title":"Proc of 26th annual computer security applications conference ACSAC\u201910","author":"S McLaughlin","year":"2010","unstructured":"McLaughlin S, Podkuiko D, Miadzvezhanka S, Delozier A, McDaniel P (2010) Multi-vendor penetration testing in advanced metering infrastructure. In: Proc of 26th annual computer security applications conference ACSAC\u201910. ACM Press, New York"},{"issue":"1","key":"674_CR21","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/TSG.2010.2046347","volume":"1","author":"AR Metke","year":"2010","unstructured":"Metke AR, Ekl RL (2010) Security technology for Smart grid networks. IEEE Trans Smart Grid, 1(1):99\u2013107","journal-title":"IEEE Trans Smart Grid"},{"key":"674_CR22","series-title":"Lecture notes in computer science","first-page":"235","volume-title":"Advances in cryptology","author":"C Schnorr","year":"1990","unstructured":"Schnorr C (1990) Efficient identification and signature schemes for smart cards. In: Advances in cryptology. Lecture notes in computer science, vol 435. Springer, Berlin, pp 235\u2013251"},{"key":"674_CR23","unstructured":"Security Profile for Advanced Metering Infrastructure Ver 1.9 (2010) UCAIUG & NIST cyber security coordination task group, May 2010"},{"key":"674_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/APPEEC.2010.5448261","volume-title":"Proc of Asia-Pacific power and energy engineering conference (APPEEC 2010)","author":"R Shein","year":"2010","unstructured":"Shein R (2010) Security measures for advanced metering infrastructure components. In: Proc of Asia-Pacific power and energy engineering conference (APPEEC 2010), pp 1\u20133"},{"key":"674_CR25","unstructured":"Smart Meters and Smart Meter Systems: a\u00a0metering industry perspective. EEI-AEIC-UTC White Paper, Mar 2011"},{"key":"674_CR26","first-page":"14","volume-title":"Proceedings of IEEE symposium on research in security and privacy","author":"PF Syverson","year":"1994","unstructured":"Syverson PF, van Oorschot PC (1994) On unifying some cryptographic protocol logics. In: Proceedings of IEEE symposium on research in security and privacy, pp 14\u201328, May 1994"},{"key":"674_CR27","unstructured":"UCAIug Home Area Network System Requirements Specification Ver 2.0 (2010) OpenHAN task force, Aug 2010"},{"key":"674_CR28","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/ICCE.2011.5722864","volume-title":"Proc IEEE international conference on consumer electronics (ICCE 2011)","author":"B Vaidya","year":"2011","unstructured":"Vaidya B, Makrakis D, Mouftah HT (2011) Device authentication mechanism for Smart energy home area networks. In: Proc IEEE international conference on consumer electronics (ICCE 2011), pp 787\u2013788, Jan 2011"},{"key":"674_CR29","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1145\/168588.168617","volume-title":"Proc of the ACM conference on computer communications security","author":"PC Oorschot van","year":"1993","unstructured":"van Oorschot PC (1993) Extending cryptographic logics of belief to key agreement protocols. In: Proc of the ACM conference on computer communications security, pp 232\u2013243, Nov 1993"},{"key":"674_CR30","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1109\/WCNC.2011.5779257","volume-title":"Proc of IEEE wireless communications and networking conference (WCNC 2011)","author":"Y Yan","year":"2011","unstructured":"Yan Y, Qian Y, Sharif H (2011) A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid. In: Proc of IEEE wireless communications and networking conference (WCNC 2011), pp 909\u2013914, Mar 2011"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0674-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0674-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0674-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:24:05Z","timestamp":1559370245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0674-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,15]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["674"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0674-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12,15]]}}}