{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:43:05Z","timestamp":1775144585820,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s40860-020-00113-2","type":"journal-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T08:03:49Z","timestamp":1601539429000},"page":"249-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Cryptanalysis and improvement of a three-factor user authentication scheme for smart grid environment"],"prefix":"10.1007","volume":"6","author":[{"given":"Harmanpreet Singh","family":"Grover","sequence":"first","affiliation":[]},{"family":"Adarsh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5382-0035","authenticated-orcid":false,"given":"Devender","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,1]]},"reference":[{"key":"113_CR1","unstructured":"Uses of Wearable devices. https:\/\/www.smartgrid.gov\/the_smart_grid\/smart_grid.html. Accessed on Dec 2017"},{"key":"113_CR2","unstructured":"Wearable Technology. https:\/\/en.wikipedia.org\/wiki\/Internet_of_things. Accessed on Dec 2017"},{"key":"113_CR3","doi-asserted-by":"crossref","unstructured":"Alnasser A, Rikli NE (2014) Design of a trust security model for smart meters in an urban power grid network. In: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, pp. 105\u2013108. ACM","DOI":"10.1145\/2642687.2642703"},{"key":"113_CR4","unstructured":"Blanchet B et\u00a0al. (2001) An efficient cryptographic protocol verifier based on prolog rules. In: csfw, vol. 1, pp 82\u201396"},{"issue":"7","key":"113_CR5","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/JSAC.2014.2332121","volume":"32","author":"ACF Chan","year":"2014","unstructured":"Chan ACF, Zhou J (2014) Cyber-physical device authentication for the smart grid electric vehicle ecosystem. IEEE J Selected Areas Commun 32(7):1509\u20131517","journal-title":"IEEE J Selected Areas Commun"},{"issue":"1","key":"113_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/TDSC.2014.2313861","volume":"12","author":"TW Chim","year":"2015","unstructured":"Chim TW, Yiu SM, Li VO, Hui LC, Zhong J (2015) Prga: Privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid. IEEE trans Dependable Secure Comput 12(1):85\u201397","journal-title":"IEEE trans Dependable Secure Comput"},{"issue":"1","key":"113_CR7","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s12083-014-0324-9","volume":"9","author":"AK Das","year":"2016","unstructured":"Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Netwk Appl 9(1):223\u2013244","journal-title":"Peer-to-peer Netwk Appl"},{"key":"113_CR8","doi-asserted-by":"crossref","unstructured":"Doh I, Lim J, Chae K (2015) Secure authentication for structured smart grid system. In: Innovative mobile and internet services in ubiquitous computing (IMIS), 2015 9th international conference on, pp. 200\u2013204. IEEE","DOI":"10.1109\/IMIS.2015.32"},{"issue":"4","key":"113_CR9","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","volume":"2","author":"MM Fouda","year":"2011","unstructured":"Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen XS (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675\u2013685","journal-title":"IEEE Trans Smart Grid"},{"key":"113_CR10","doi-asserted-by":"crossref","unstructured":"Gazdar T, Rachedi A, Benslimane A, Belghith A (2012) A distributed advanced analytical trust model for vanets. In: Global communications conference (GLOBECOM), 2012 IEEE, pp. 201\u2013206. IEEE","DOI":"10.1109\/GLOCOM.2012.6503113"},{"issue":"8","key":"113_CR11","doi-asserted-by":"publisher","first-page":"3657","DOI":"10.1109\/TVT.2014.2360883","volume":"64","author":"N Haddadou","year":"2015","unstructured":"Haddadou N, Rachedi A, Ghamri-Doudane Y (2015) A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Trans Vehicular Technol 64(8):3657\u20133674","journal-title":"IEEE Trans Vehicular Technol"},{"issue":"14","key":"113_CR12","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1049\/iet-com.2016.0091","volume":"10","author":"D He","year":"2016","unstructured":"He D, Wang H, Khan MK, Wang L (2016) Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun 10(14):1795\u20131802","journal-title":"IET Commun"},{"issue":"12","key":"113_CR13","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1080\/0144929X.2014.934286","volume":"33","author":"J Imgraben","year":"2014","unstructured":"Imgraben J, Engelbrecht A, Choo KKR (2014) Always connected, but are smart mobile users getting more security savvy? a survey of smart mobile device users. Behav Inform Technol 33(12):1347\u20131360","journal-title":"Behav Inform Technol"},{"issue":"3","key":"113_CR14","doi-asserted-by":"publisher","first-page":"1732","DOI":"10.1109\/TSG.2015.2449278","volume":"7","author":"HJ Jo","year":"2016","unstructured":"Jo HJ, Kim IS, Lee DH (2016) Efficient and privacy-preserving metering protocols for smart grid systems. IEEE Trans Smart Grid 7(3):1732\u20131742","journal-title":"IEEE Trans Smart Grid"},{"issue":"10","key":"113_CR15","doi-asserted-by":"crossref","first-page":"e3745","DOI":"10.1002\/ett.3745","volume":"30","author":"D Kaur","year":"2019","unstructured":"Kaur D, Kumar D, Saini KK, Grover HS (2019) An improved user authentication protocol for wireless sensor networks. Trans Emerging Telecommun Technol 30(10):e3745","journal-title":"Trans Emerging Telecommun Technol"},{"key":"113_CR16","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology\u2014CRYPTO\u201999, pp. 789\u2013789. Springer","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"2","key":"113_CR17","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/JSYST.2013.2271537","volume":"8","author":"H Li","year":"2014","unstructured":"Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst J 8(2):655\u2013663","journal-title":"IEEE Syst J"},{"key":"113_CR18","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.compeleceng.2016.02.017","volume":"52","author":"K Mahmood","year":"2016","unstructured":"Mahmood K, Chaudhry SA, Naqvi H, Shon T, Ahmad HF (2016) A lightweight message authentication scheme for smart grid communications in power sector. Comput Electr Eng 52:114\u2013124","journal-title":"Comput Electr Eng"},{"issue":"5","key":"113_CR19","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"113_CR20","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/JSYST.2013.2260942","volume":"8","author":"H Nicanfar","year":"2014","unstructured":"Nicanfar H, Jokar P, Beznosov K, Leung VC (2014) Efficient authentication and key management mechanisms for smart grid communications. IEEE Syst J 8(2):629\u2013640","journal-title":"IEEE Syst J"},{"issue":"9","key":"113_CR21","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inform Forensics Security 10(9):1953\u20131966","journal-title":"IEEE Trans Inform Forensics Security"},{"issue":"1","key":"113_CR22","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TCE.2016.7448560","volume":"62","author":"V Odelu","year":"2016","unstructured":"Odelu V, Das AK, Goswami A (2016) Seap: secure and efficient authentication protocol for nfc applications using pseudonyms. IEEE Trans Consumer Electron 62(1):30\u201338","journal-title":"IEEE Trans Consumer Electron"},{"key":"113_CR23","doi-asserted-by":"crossref","unstructured":"Odelu V, Das AK, Wazid M, Conti M (2016) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid","DOI":"10.1109\/TSG.2016.2602282"},{"key":"113_CR24","doi-asserted-by":"crossref","unstructured":"Rachedi A, Benslimane A (2008) Security and pseudo-anonymity with a cluster-based approach for manet. In: Global telecommunications conference, 2008. IEEE GLOBECOM 2008. IEEE, pp. 1\u20136. IEEE","DOI":"10.1109\/GLOCOM.2008.ECP.378"},{"issue":"5","key":"113_CR25","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1109\/TIFS.2015.2512525","volume":"11","author":"N Saxena","year":"2016","unstructured":"Saxena N, Choi BJ, Lu R (2016) Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Trans Inform Forensics Security 11(5):907\u2013921","journal-title":"IEEE Trans Inform Forensics Security"},{"issue":"2","key":"113_CR26","first-page":"906","volume":"7","author":"JL Tsai","year":"2016","unstructured":"Tsai JL, Lo NW (2016) Secure anonymous key distribution scheme for smart grid. IEEE Trans Smart Grid 7(2):906\u2013914","journal-title":"IEEE Trans Smart Grid"},{"issue":"1","key":"113_CR27","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TETC.2015.2392380","volume":"4","author":"YM Tseng","year":"2016","unstructured":"Tseng YM, Huang SS, Tsai TT, Ke JH (2016) List-free id-based mutual authentication and key agreement protocol for multiserver architectures. IEEE Trans Emerging Topics Comput 4(1):102\u2013112","journal-title":"IEEE Trans Emerging Topics Comput"},{"key":"113_CR28","doi-asserted-by":"crossref","unstructured":"Wang D, Wang P (2016) Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2016.2605087"},{"issue":"6","key":"113_CR29","doi-asserted-by":"publisher","first-page":"3144","DOI":"10.1109\/TII.2017.2732999","volume":"13","author":"M Wazid","year":"2017","unstructured":"Wazid M, Das AK, Kumar N, Rodrigues JJ (2017) Secure three-factor user authentication scheme for renewable-energy-based smart grid environment. IEEE Trans Ind Inform 13(6):3144\u20133153","journal-title":"IEEE Trans Ind Inform"},{"issue":"2","key":"113_CR30","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TSG.2011.2120634","volume":"2","author":"D Wu","year":"2011","unstructured":"Wu D, Zhou C (2011) Fault-tolerant and scalable key management for smart grid. IEEE Trans Smart Grid 2(2):375\u2013381","journal-title":"IEEE Trans Smart Grid"},{"key":"113_CR31","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.compeleceng.2015.02.015","volume":"45","author":"F Wu","year":"2015","unstructured":"Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput Electr Eng 45:274\u2013285","journal-title":"Comput Electr Eng"},{"issue":"3","key":"113_CR32","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TSG.2012.2199141","volume":"3","author":"J Xia","year":"2012","unstructured":"Xia J, Wang Y (2012) Secure key distribution for the smart grid. IEEE Trans Smart Grid 3(3):1437\u20131443","journal-title":"IEEE Trans Smart Grid"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-020-00113-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-020-00113-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-020-00113-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,8]],"date-time":"2023-10-08T20:05:52Z","timestamp":1696795552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-020-00113-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,1]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["113"],"URL":"https:\/\/doi.org\/10.1007\/s40860-020-00113-2","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,1]]},"assertion":[{"value":"6 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}