{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T21:54:17Z","timestamp":1766181257332,"version":"3.37.3"},"reference-count":36,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T00:00:00Z","timestamp":1557619200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772377","61572370","61572379","GCIS201608"],"award-info":[{"award-number":["61772377","61572370","61572379","GCIS201608"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772377","61572370","61572379","GCIS201608"],"award-info":[{"award-number":["61772377","61572370","61572379","GCIS201608"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772377","61572370","61572379","GCIS201608"],"award-info":[{"award-number":["61772377","61572370","61572379","GCIS201608"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["61772377","61572370","61572379","GCIS201608"],"award-info":[{"award-number":["61772377","61572370","61572379","GCIS201608"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,5,12]]},"abstract":"<jats:p>Smart grid has emerged as the next-generation electricity grid with power flow optimization and high power quality. Smart grid technologies have attracted the attention of industry and academia in the last few years. However, the tradeoff between security and efficiency remains a challenge in the practical deployment of the smart grid. Most recently, Li et al. proposed a lightweight message authentication scheme with user anonymity and claimed that their scheme is provably secure. But we found that their scheme fails to achieve mutual authentication and mitigate some typical attacks (e.g., impersonation attack, denial of service attack) in the smart grid environment. To address these drawbacks, we present a new message authentication scheme with reasonable efficiency. Security and performance analysis results show that the proposed scheme can satisfy the security and lightweight requirements of practical implementations and deployments of the smart grid.<\/jats:p>","DOI":"10.1155\/2019\/4836016","type":"journal-article","created":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T23:31:14Z","timestamp":1557703874000},"page":"1-12","source":"Crossref","is-referenced-by-count":25,"title":["Anonymous and Efficient Message Authentication Scheme for Smart Grid"],"prefix":"10.1155","volume":"2019","author":[{"given":"Libing","family":"Wu","sequence":"first","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"},{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"}]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"},{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"College of Communication and Information, University of Kentucky, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":true,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"},{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600304CM"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160661"},{"journal-title":"Future Generation Computer Systems","year":"2018","key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2271537"},{"journal-title":"Journal of Parallel and Distributed Computing","year":"2017","key":"10"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesit.2018.01.001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260942"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440658"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512525"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.02.017"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2655014"},{"issue":"4","key":"13","doi-asserted-by":"crossref","first-page":"405","DOI":"10.23919\/TEMS.2017.8241362","volume":"1","year":"2017","journal-title":"CES Transactions on Electrical Machines and Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2720159"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2705218"},{"journal-title":"Journal of Information Science","year":"2018","key":"16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.031"},{"issue":"10","key":"18","first-page":"3184","volume":"65","year":"2016","journal-title":"Institute of Electrical and Electronics Engineers. Transactions on Computers"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2732999"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.10.036"},{"issue":"3","key":"21","first-page":"1900","volume":"9","year":"2018","journal-title":"IEEE Transactions on Smart Grid"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2313861"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2332121"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.012"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2344-z"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.002"},{"issue":"10","key":"28","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.3390\/app7101007","volume":"7","year":"2017","journal-title":"Applied Sciences"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3194845"},{"key":"30","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","volume":"78","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.003"},{"first-page":"199","volume-title":"Zero-knowledge authentication and intrusion detection system for grid computing security","year":"2018","key":"32"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2789442"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2301517"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2851295"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2596286"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4836016.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4836016.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4836016.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,12]],"date-time":"2020-12-12T13:08:01Z","timestamp":1607778481000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/4836016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,12]]},"references-count":36,"alternative-id":["4836016","4836016"],"URL":"https:\/\/doi.org\/10.1155\/2019\/4836016","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,5,12]]}}}