{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:36:19Z","timestamp":1768296979067,"version":"3.49.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:00:00Z","timestamp":1498262400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s11277-017-4623-3","type":"journal-article","created":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T14:18:31Z","timestamp":1498313911000},"page":"2551-2579","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Secure and Efficient Chaotic Maps Based Authenticated Key-Exchange Protocol for Smart Grid"],"prefix":"10.1007","volume":"97","author":[{"given":"Majid","family":"Bayat","sequence":"first","affiliation":[]},{"given":"Mohammad Beheshti","family":"Atashgah","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,24]]},"reference":[{"key":"4623_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., & Pointcheval, D. (2005). Simple password-based encrypted key exchange protocols. In Topics in cryptology\u2014CT-RSA 2005 (pp. 191\u2013208). Springer.","DOI":"10.1007\/978-3-540-30574-3_14"},{"issue":"1","key":"4623_CR2","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.chaos.2004.12.023","volume":"26","author":"G Alvarez","year":"2005","unstructured":"Alvarez, G. (2005). Security problems with a chaos-based deniable authentication scheme. Chaos, Solitons and Fractals, 26(1), 7\u201311.","journal-title":"Chaos, Solitons and Fractals"},{"key":"4623_CR3","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., et al. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In International conference on computer aided verification (pp. 281\u2013285). Springer.","DOI":"10.1007\/11513988_27"},{"key":"4623_CR4","unstructured":"Bellare, M., & Rogaway, P. (2000). The AuthA protocol for password-based authenticated key exchange. Tech. rep., Citeseer."},{"key":"4623_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. In Advances in cryptology, Eurocrypt 2000 (pp. 139\u2013155). Springer.","DOI":"10.1007\/3-540-45539-6_11"},{"key":"4623_CR6","doi-asserted-by":"crossref","unstructured":"Bellovin, S. M., & Merritt, M. (1992). Encrypted key exchange: Password-based protocols secure against dictionary attacks. In 1992 IEEE computer society symposium on research in security and privacy, 1992. Proceedings (pp. 72\u201384). IEEE.","DOI":"10.1109\/RISP.1992.213269"},{"key":"4623_CR7","doi-asserted-by":"crossref","unstructured":"Bellovin, S. M., & Merritt, M. (1993). Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In Proceedings of the 1st ACM conference on computer and communications security (pp. 244\u2013250). ACM.","DOI":"10.1145\/168588.168618"},{"key":"4623_CR8","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., & Pointcheval, D. (2003). Security proofs for an efficient password-based key exchange. In Proceedings of the 10th ACM conference on computer and communications security (pp. 241\u2013250). ACM.","DOI":"10.1145\/948109.948142"},{"key":"4623_CR9","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., & Pointcheval, D. (2004). New security results on encrypted key exchange. In International workshop on public key cryptography (pp. 145\u2013158). Springer.","DOI":"10.1007\/978-3-540-24632-9_11"},{"issue":"1","key":"4623_CR10","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1002\/sec.537","volume":"6","author":"TH Chen","year":"2013","unstructured":"Chen, T. H., Wang, B. J., Tu, T. Y., & Wang, C. H. (2013). A security-enhanced key agreement protocol based on chaotic maps. Security and Communication Networks, 6(1), 108\u2013114.","journal-title":"Security and Communication Networks"},{"issue":"6","key":"4623_CR11","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4623_CR12","doi-asserted-by":"crossref","unstructured":"Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011). Towards a light-weight message authentication mechanism tailored for smart grid communications. In 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 1018\u20131023). IEEE.","DOI":"10.1109\/INFCOMW.2011.5928776"},{"issue":"4","key":"4623_CR13","doi-asserted-by":"crossref","first-page":"2401","DOI":"10.1007\/s11071-012-0628-3","volume":"70","author":"P Gong","year":"2012","unstructured":"Gong, P., Li, P., & Shi, W. (2012). A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dynamics, 70(4), 2401\u20132406.","journal-title":"Nonlinear Dynamics"},{"issue":"20","key":"4623_CR14","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.1016\/j.ins.2010.06.013","volume":"180","author":"X Guo","year":"2010","unstructured":"Guo, X., & Zhang, J. (2010). Secure group key agreement protocol based on chaotic hash. Information Sciences, 180(20), 4069\u20134074.","journal-title":"Information Sciences"},{"issue":"3","key":"4623_CR15","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.chaos.2007.01.017","volume":"38","author":"S Han","year":"2008","unstructured":"Han, S. (2008). Security of a key agreement protocol based on chaotic maps. Chaos, Solitons and Fractals, 38(3), 764\u2013768.","journal-title":"Chaos, Solitons and Fractals"},{"issue":"3","key":"4623_CR16","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1016\/j.chaos.2007.06.030","volume":"39","author":"S Han","year":"2009","unstructured":"Han, S., & Chang, E. (2009). Chaotic map based key agreement with\/out clock synchronization. Chaos, Solitons and Fractals, 39(3), 1283\u20131289.","journal-title":"Chaos, Solitons and Fractals"},{"issue":"3\u20134","key":"4623_CR17","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1504\/IJESDF.2013.058650","volume":"5","author":"D He","year":"2013","unstructured":"He, D., & Khan, M. K. (2013). Cryptanalysis of a key agreement protocol based on chaotic hash. International Journal of Electronic Security and Digital Forensics, 5(3\u20134), 172\u2013177.","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"issue":"4","key":"4623_CR18","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","volume":"83","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., & Alelaiwi, A. (2016). Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics, 83(4), 2085\u20132101.","journal-title":"Nonlinear Dynamics"},{"issue":"1\u20132","key":"4623_CR19","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s11071-015-1970-z","volume":"81","author":"A Kanso","year":"2015","unstructured":"Kanso, A., & Ghebleh, M. (2015). A structure-based chaotic hashing scheme. Nonlinear Dynamics, 81(1\u20132), 27\u201340.","journal-title":"Nonlinear Dynamics"},{"key":"4623_CR20","volume-title":"Understanding nonlinear dynamics","author":"D Kaplan","year":"2012","unstructured":"Kaplan, D., & Glass, L. (2012). Understanding nonlinear dynamics. Berlin: Springer Science & Business Media."},{"issue":"1","key":"4623_CR21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1613676.1613679","volume":"57","author":"J Katz","year":"2009","unstructured":"Katz, J., Ostrovsky, R., & Yung, M. (2009). Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM), 57(1), 3.","journal-title":"Journal of the ACM (JACM)"},{"issue":"10","key":"4623_CR22","first-page":"2229","volume":"85","author":"K Kobara","year":"2002","unstructured":"Kobara, K. (2002). Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 85(10), 2229\u20132237.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"3","key":"4623_CR23","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev, L. (2001). Chaos-based cryptography: A brief overview. IEEE Circuits and Systems Magazine, 1(3), 6\u201321.","journal-title":"IEEE Circuits and Systems Magazine"},{"key":"4623_CR24","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.ins.2014.08.041","volume":"290","author":"TF Lee","year":"2015","unstructured":"Lee, T. F. (2015). Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Information Sciences, 290, 63\u201371.","journal-title":"Information Sciences"},{"issue":"1\u20132","key":"4623_CR25","first-page":"79","volume":"69","author":"CC Lee","year":"2012","unstructured":"Lee, C. C., Chen, C. L., Wu, C. Y., & Huang, S. Y. (2012). An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dynamics, 69(1\u20132), 79\u201387.","journal-title":"Nonlinear Dynamics"},{"key":"4623_CR26","doi-asserted-by":"crossref","unstructured":"Li, F., Luo, B., & Liu, P. (2010). Secure information aggregation for smart grids using homomorphic encryption. In 2010 1st IEEE international conference on smart grid communications (SmartGridComm) (pp. 327\u2013332). IEEE.","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"4623_CR27","unstructured":"Li, M., et al. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In International conference on security and privacy in communication systems. Berlin, Heidelberg: Springer."},{"issue":"4","key":"4623_CR28","doi-asserted-by":"crossref","first-page":"2387","DOI":"10.1007\/s11071-016-2652-1","volume":"84","author":"Y Li","year":"2016","unstructured":"Li Y., Ge, G., & Xia, D. (2016). Chaotic hash function based on the dynamic S-Box with variable parameters. Nonlinear Dynamics, 84(4), 2387\u20132402.","journal-title":"Nonlinear Dynamics"},{"issue":"2","key":"4623_CR29","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11071-015-2506-2","volume":"84","author":"Y Liu","year":"2016","unstructured":"Liu, Y., & Xue, K. (2016). An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dynamics, 84(2), 549\u2013557.","journal-title":"Nonlinear Dynamics"},{"key":"4623_CR30","unstructured":"MacKenzie, P. (2002). The PAK suite: Protocols for password-authenticated key exchange. Contributions to IEEE P 1363:2."},{"issue":"1","key":"4623_CR31","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TSG.2012.2226252","volume":"4","author":"H Nicanfar","year":"2013","unstructured":"Nicanfar, H., & Leung, V. C. (2013). Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system. IEEE Transactions on Smart Grid, 4(1), 253\u2013264.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"4","key":"4623_CR32","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu, Y., & Wang, X. (2011). An anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 16(4), 1986\u20131992.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"2","key":"4623_CR33","first-page":"551","volume":"52","author":"A Pande","year":"2013","unstructured":"Pande, A., & Zambreno, J. (2013). A chaotic encryption scheme for real-time embedded systems: Design and implementation. Telecommunication Systems, 52(2), 551\u2013561.","journal-title":"Telecommunication Systems"},{"issue":"1","key":"4623_CR34","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TSG.2012.2224389","volume":"4","author":"S Ruj","year":"2013","unstructured":"Ruj, S., & Nayak, A. (2013). A decentralized security framework for data aggregation and access control in smart grids. IEEE Transactions on Smart Grid, 4(1), 196\u2013205.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"3","key":"4623_CR35","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1007\/s11071-015-2049-6","volume":"81","author":"JS Teh","year":"2015","unstructured":"Teh, J. S., Samsudin, A., & Akhavan, A. (2015). Parallel chaotic hash function based on the shuffle\u2013exchange network. Nonlinear Dynamics, 81(3), 1067\u20131079.","journal-title":"Nonlinear Dynamics"},{"key":"4623_CR36","doi-asserted-by":"crossref","unstructured":"Tseng, H. R., Jan, R. H., & Yang, W. (2009). A chaotic maps-based key agreement protocol that preserves user anonymity. In 2009 IEEE international conference on communications (pp. 1\u20136). IEEE","DOI":"10.1109\/ICC.2009.5198581"},{"issue":"3","key":"4623_CR37","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1049\/iet-ifs.2012.0279","volume":"8","author":"XY Wang","year":"2014","unstructured":"Wang, X. Y., & Gu, S. X. (2014). New chaotic encryption algorithm based on chaotic sequence and plain text. IET Information Security, 8(3), 213\u2013216.","journal-title":"IET Information Security"},{"key":"4623_CR38","doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, J., & Xu, M. (2004). Weaknesses of a password-authenticated key exchange protocol between clients with different passwords. In M. Jakobsson, M. Yung, J. Zhou (Eds.), Applied cryptography and network security (pp. 414\u2013425). Berlin, Heidelberg: Springer.","DOI":"10.1007\/978-3-540-24852-1_30"},{"issue":"4","key":"4623_CR39","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1016\/S0960-0779(04)00387-X","volume":"23","author":"D Xiao","year":"2005","unstructured":"Xiao, D., Liao, X., & Wong, K. (2005). An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals, 23(4), 1327\u20131331.","journal-title":"Chaos, Solitons and Fractals"},{"issue":"4","key":"4623_CR40","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1016\/j.ins.2006.07.026","volume":"177","author":"D Xiao","year":"2007","unstructured":"Xiao, D., Liao, X., & Deng, S. (2007). A novel key agreement protocol based on chaotic maps. Information Sciences, 177(4), 1136\u20131142.","journal-title":"Information Sciences"},{"issue":"6","key":"4623_CR41","doi-asserted-by":"crossref","first-page":"1598","DOI":"10.1016\/j.ins.2007.11.001","volume":"178","author":"D Xiao","year":"2008","unstructured":"Xiao, D., Liao, X., & Deng, S. (2008). Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Information Sciences, 178(6), 1598\u20131602.","journal-title":"Information Sciences"},{"issue":"11","key":"4623_CR42","doi-asserted-by":"crossref","first-page":"110,503","DOI":"10.1088\/1674-1056\/22\/11\/110503","volume":"22","author":"W Xing-Yuan","year":"2013","unstructured":"Xing-Yuan, W., & Da-Peng, L. (2013). A secure key agreement protocol based on chaotic maps. Chinese Physics B, 22(11), 110,503.","journal-title":"Chinese Physics B"},{"issue":"7","key":"4623_CR43","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue, K., & Hong, P. (2012). Security improvement on an anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2969\u20132977.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"7","key":"4623_CR44","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1016\/j.cnsns.2011.11.010","volume":"17","author":"EJ Yoon","year":"2012","unstructured":"Yoon, E. J. (2012). Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2735\u20132740.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"3","key":"4623_CR45","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L. (2008). Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons and Fractals, 37(3), 669\u2013674.","journal-title":"Chaos, Solitons and Fractals"},{"issue":"2","key":"4623_CR46","first-page":"326","volume":"18","author":"H Zhu","year":"2016","unstructured":"Zhu, H., Zhang, Y., Xia, Y., & Li, H. (2016). Password-authenticated key exchange scheme using chaotic maps towards a new architecture in standard model. International Journal of Network Security, 18(2), 326\u2013334.","journal-title":"International Journal of Network Security"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4623-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4623-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4623-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T00:51:47Z","timestamp":1569545507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4623-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,24]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["4623"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4623-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,24]]}}}