{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:10:43Z","timestamp":1778605843568,"version":"3.51.4"},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111172","type":"journal-article","created":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:18:34Z","timestamp":1775913514000},"page":"111172","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["PSUL-SG : A provably secure ultra-lightweight mutual authentication and key agreement protocol for smart-grid IoT devices"],"prefix":"10.1016","volume":"135","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4370-1373","authenticated-orcid":false,"given":"Sara","family":"Araar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1609-6006","authenticated-orcid":false,"given":"Brahim","family":"Farou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0632-3172","authenticated-orcid":false,"given":"Mohamed Amine","family":"Ferrag","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8105-9810","authenticated-orcid":false,"given":"Zinedine","family":"Kouahla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0236-8541","authenticated-orcid":false,"given":"Hamid","family":"Seridi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.compeleceng.2026.111172_b1","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/JSAC.2019.2951972","article-title":"Relaying-assisted communications for demand response in smart grid: Cost modeling, game strategies, and algorithms","volume":"38","author":"Ma","year":"2020","journal-title":"IEEE J Sel Areas Commun"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111172_b2","doi-asserted-by":"crossref","first-page":"17622","DOI":"10.1109\/JIOT.2025.3539724","article-title":"GuardGrid: A queriable and privacy-preserving aggregation scheme for smart grid via function encryption","volume":"12","author":"Yu","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111172_b3","article-title":"A bi-level hybrid game framework for stochastic robust optimization in multi-integrated energy microgrids","volume":"44","author":"Gao","year":"2025","journal-title":"Sustain Energy, Grids Netwo"},{"key":"10.1016\/j.compeleceng.2026.111172_b4","doi-asserted-by":"crossref","first-page":"5647","DOI":"10.1109\/TIFS.2025.3574959","article-title":"Anonymity-enhanced sequential multi-signer ring signature for secure medical data sharing in iomt","volume":"20","author":"Xu","year":"2025","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111172_b5","doi-asserted-by":"crossref","first-page":"3918","DOI":"10.1109\/TMC.2024.3516119","article-title":"A verifiable privacy-preserving federated learning framework against collusion attacks","volume":"24","author":"Chen","year":"2025","journal-title":"IEEE Trans Mob Comput"},{"key":"10.1016\/j.compeleceng.2026.111172_b6","first-page":"1","article-title":"Towards authenticated encrypted search with constant trapdoor for mobile cloud systems","author":"Xu","year":"2025","journal-title":"IEEE Trans Mob Comput"},{"key":"10.1016\/j.compeleceng.2026.111172_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2025.127195","article-title":"Blockchain-based network-constrained peer-to-peer energy trading in a reconfigurable distribution network","volume":"405","author":"Ping","year":"2026","journal-title":"Appl Energy"},{"issue":"16","key":"10.1016\/j.compeleceng.2026.111172_b8","doi-asserted-by":"crossref","first-page":"32366","DOI":"10.1109\/JIOT.2025.3576735","article-title":"Blockchain-based verifiable decentralized identity for intelligent flexible manufacturing","volume":"12","author":"Xu","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111172_b9","first-page":"1","article-title":"Intelligent event triggered lane keeping security control for autonomous vehicle under DoS attacks","author":"Ding","year":"2025","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"10.1016\/j.compeleceng.2026.111172_b10","first-page":"1","article-title":"A deep reinforcement learning approach to time delay differential game deception resource deployment","author":"He","year":"2025","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111172_b11","doi-asserted-by":"crossref","first-page":"4998","DOI":"10.1109\/JIOT.2023.3301462","article-title":"A wireless self-service system for library using commodity RFID devices","volume":"11","author":"Hu","year":"2024","journal-title":"IEEE Internet Things J"},{"issue":"20","key":"10.1016\/j.compeleceng.2026.111172_b12","doi-asserted-by":"crossref","first-page":"19886","DOI":"10.1109\/JSEN.2022.3205017","article-title":"Energy consumption minimization for data collection from wirelessly-powered IoT sensors: Session-specific optimal design with DRL","volume":"22","author":"Xu","year":"2022","journal-title":"IEEE Sens J"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111172_b13","doi-asserted-by":"crossref","first-page":"4120","DOI":"10.1109\/JSEN.2025.3644160","article-title":"Nonlinear feature decomposition and deep temporal\u2013spatial learning for single-channel sEMG-based lower limb motion recognition","volume":"26","author":"Wei","year":"2026","journal-title":"IEEE Sens J"},{"issue":"Part 1","key":"10.1016\/j.compeleceng.2026.111172_b14","article-title":"Decoding driving states based on normalized mutual information features and hyperparameter self-optimized Gaussian kernel-based radial basis function extreme learning machine","volume":"199","author":"Chen","year":"2025","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.compeleceng.2026.111172_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2025.113478","article-title":"Advances in EEG-based emotion recognition: Challenges, methodologies, and future directions","volume":"180","author":"Chen","year":"2025","journal-title":"Appl Soft Comput"},{"key":"10.1016\/j.compeleceng.2026.111172_b16","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1038\/s41597-023-02225-9","article-title":"SRAM-based PUF readouts","volume":"10","author":"Vinagrero","year":"2023","journal-title":"Sci Data"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111172_b17","doi-asserted-by":"crossref","first-page":"580","DOI":"10.3390\/math13040580","article-title":"Lightweight authentication protocol for smart grids: An energy-efficient authentication scheme for resource-limited smart meters","volume":"13","author":"Nkenyereye","year":"2025","journal-title":"Mathematics"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111172_b18","doi-asserted-by":"crossref","first-page":"9","DOI":"10.3390\/fi16010009","article-title":"Smart grid security: A PUF-based authentication and key agreement protocol","volume":"16","author":"Bagheri","year":"2023","journal-title":"Futur Internet"},{"issue":"18","key":"10.1016\/j.compeleceng.2026.111172_b19","doi-asserted-by":"crossref","first-page":"4550","DOI":"10.3390\/en17184550","article-title":"Lightweight anonymous authentication and key agreement protocol for a smart grid","volume":"17","author":"Zhang","year":"2024","journal-title":"Energies"},{"key":"10.1016\/j.compeleceng.2026.111172_b20","article-title":"A biometric and PUF-based authentication with preserving anonymity in smart grid environment","author":"Nurkifli","year":"2024","journal-title":"Ain Shams Eng J"},{"key":"10.1016\/j.compeleceng.2026.111172_b21","doi-asserted-by":"crossref","first-page":"123666","DOI":"10.1109\/ACCESS.2025.3585982","article-title":"Lightweight and efficient protocol based on ECDH for securing smart grid communication infrastructure","volume":"13","author":"Peivandizadeh","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111172_b22","series-title":"A comparative analysis of lightweight hash functions using AVR ATXMega128 and ChipWhisperer","author":"Khan","year":"2025"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111172_b23","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1109\/TC.2008.212","article-title":"Power-up SRAM state as an identifying fingerprint and source of true random numbers","volume":"58","author":"Holcomb","year":"2009","journal-title":"IEEE Trans Comput"},{"key":"10.1016\/j.compeleceng.2026.111172_b24","article-title":"SRAM-based PUF readouts (dataset)","author":"Vinagrero Gutierrez","year":"2023","journal-title":"Zenodo"},{"key":"10.1016\/j.compeleceng.2026.111172_b25","series-title":"SRAM-based physically unclonable function using lightweight hamming-code fuzzy extractor for energy harvesting beat sensors","author":"Pham","year":"2025"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002442?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002442?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:32:28Z","timestamp":1778603548000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":25,"alternative-id":["S0045790626002442"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111172","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"PSUL-SG : A provably secure ultra-lightweight mutual authentication and key agreement protocol for smart-grid IoT devices","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111172","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111172"}}