메뉴 건너뛰기




Volumn 2, Issue 4, 2011, Pages 686-696

Multicast authentication in the smart grid with one-time signature

Author keywords

Authentication; multicast; one time signature; security; smart grid

Indexed keywords

AUTHENTICATION DELAYS; BANDWIDTH OVERHEADS; COMPUTATION COSTS; COMPUTING RESOURCE; DATA-COMMUNICATION; FIELD DEVICES; FORGERY ATTACKS; HEURISTIC SOLUTIONS; LIMITED STORAGE; MULTICAST COMMUNICATION; MULTICAST MESSAGES; MULTICASTS; NONLINEAR INTEGER PROGRAMMING PROBLEM; ONE-TIME SIGNATURE; OPERATION AND CONTROL; SECURITY; SIGNATURE GENERATION; SMART GRID; STORAGE COSTS; WIDE AREA PROTECTION;

EID: 82155192847     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2011.2138172     Document Type: Article
Times cited : (154)

References (28)
  • 2
    • 34548493704 scopus 로고
    • Provably unforgeable signatures
    • J. N. E. Bos and D. Chaum, "Provably unforgeable signatures," in Proc. CRYPTO, 1992, pp. 1-14.
    • (1992) Proc. CRYPTO , pp. 1-14
    • Bos, J.N.E.1    Chaum, D.2
  • 7
    • 70450161107 scopus 로고    scopus 로고
    • Multicasting in delay tolerant networks: A social network perspective
    • W. Gao, Q. Li, B. Zhao, and G. Cao, "Multicasting in delay tolerant networks: A social network perspective," in Proc. ACM MobiHoc, 2009, pp. 299-308.
    • (2009) Proc. ACM MobiHoc , pp. 299-308
    • Gao, W.1    Li, Q.2    Zhao, B.3    Cao, G.4
  • 8
    • 82155200668 scopus 로고    scopus 로고
    • Analyzing naspinet data flows
    • R. Hasan, R. Bobba, and H. Khurana, "Analyzing naspinet data flows," in Proc. PSCE, 2006, pp. 1-6.
    • (2006) Proc. PSCE , pp. 1-6
    • Hasan, R.1    Bobba, R.2    Khurana, H.3
  • 9
    • 79954590260 scopus 로고    scopus 로고
    • Standard Communication Delivery Time Performance Requirements for Electric Power Substation Automation
    • IEEE
    • IEEE Standard Communication Delivery Time Performance Requirements for Electric Power Substation Automation, IEEE Standard 1646-2004, 2004.
    • (2004) IEEE Standard , pp. 1646-2004
  • 10
    • 61449182711 scopus 로고    scopus 로고
    • Grid of the future
    • A. Ipakchi and F. Albuyeh, "Grid of the future," PAE-M, vol. 7, no. 2, pp. 52-62, 2009.
    • (2009) PAE-M , vol.7 , Issue.2 , pp. 52-62
    • Ipakchi, A.1    Albuyeh, F.2
  • 11
    • 24944508408 scopus 로고    scopus 로고
    • Distillation codes and applications to dos resistant multicast authentication
    • C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. D. Tygar, "Distillation codes and applications to dos resistant multicast authentication," in Proc. NDSS, 2004, pp. 37-56.
    • (2004) Proc. NDSS , pp. 37-56
    • Karlof, C.1    Sastry, N.2    Li, Y.3    Perrig, A.4    Tygar, J.D.5
  • 12
    • 0003605145 scopus 로고
    • Constructing digital signatures from a one way function
    • L. Lamport, "Constructing digital signatures from a one way function," SRI Int., Tech. Rep. CSL-98, 1979.
    • (1979) SRI Int., Tech. Rep. CSL-98
    • Lamport, L.1
  • 13
    • 85000276942 scopus 로고    scopus 로고
    • Multi-level utesla: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning, "Multi-level utesla: Broadcast authentication for distributed sensor networks," ACM Trans. Embedded Comput. Syst., vol. 3, no. 4, pp. 800-836, 2004.
    • (2004) ACM Trans. Embedded Comput. Syst. , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 14
    • 33749513007 scopus 로고    scopus 로고
    • Practical broadcast authentication in sensor networks
    • Washington DC
    • D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks," in Proc. MOBIQUITOUS, Washington, DC, 2005, pp. 118-132.
    • (2005) Proc. MOBIQUITOUS , pp. 118-132
    • Liu, D.1    Ning, P.2    Zhu, S.3    Jajodia, S.4
  • 17
    • 0001263548 scopus 로고
    • A certified digital signature
    • R. C. Merkle, "A certified digital signature," in Proc. CRYPTO, 1989, pp. 218-238.
    • (1989) Proc. CRYPTO , pp. 218-238
    • Merkle, R.C.1
  • 19
    • 3042690189 scopus 로고    scopus 로고
    • Horse: An extension of an r-time signature scheme with fast signing and verification
    • W. D. Neumann, "Horse: an extension of an r-time signature scheme with fast signing and verification," in Proc. ITCC, 2004, pp. 129-134.
    • (2004) Proc. ITCC , pp. 129-134
    • Neumann, W.D.1
  • 21
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signing of multicast streams over lossy channels
    • A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. IEEE Symp. Security Privacy, 2000, pp. 56-73.
    • (2000) Proc. IEEE Symp. Security Privacy , pp. 56-73
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 22
    • 82155191172 scopus 로고    scopus 로고
    • Efficient multicast packet authentication
    • A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient multicast packet authentication," in Proc. NDSS, 2003, pp. 251-262.
    • (2003) Proc. NDSS , pp. 251-262
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 23
    • 0010277907 scopus 로고
    • Digitalized signatures
    • R. A. Demillo D. P. Dobkin, A. K. Jones, and R. J. Lipton, Eds. New York: Academic
    • M. O. Rabin, "Digitalized signatures," in Foundations of Secure Computation, R. A. Demillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, Eds. New York: Academic, 1978, pp. 155-166.
    • (1978) Foundations of Secure Computation , pp. 155-166
    • Rabin, M.O.1
  • 24
    • 84947431932 scopus 로고    scopus 로고
    • Better than BiBa: Short one-time signatures with fast signing and verifying
    • L. Reyzin and N. Reyzin, "Better than BiBa: Short one-time signatures with fast signing and verifying," in Proc. Australian Conf. Inf. Security Privacy, 2002, pp. 144-153.
    • (2002) Proc. Australian Conf. Inf. Security Privacy , pp. 144-153
    • Reyzin, L.1    Reyzin, N.2
  • 25
    • 84902345608 scopus 로고    scopus 로고
    • Lessons Learned from the Maroochy Water Breach
    • New York: Springer ch. 6
    • J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," in Critical Infrastructure Protection. New York: Springer, 2008, ch. 6, pp. 73-82.
    • (2008) Critical Infrastructure Protection , pp. 73-82
    • Slay, J.1    Miller, M.2
  • 27
    • 71949122112 scopus 로고    scopus 로고
    • Ocast: Optimal multicast routing protocol for wireless sensor networks
    • L. Su, B. Ding, Y. Yang, T. Abdelzaher, G. Cao, and J. Hou, "Ocast: Optimal multicast routing protocol for wireless sensor networks," in Proc. IEEE ICNP, 2009, pp. 151-160.
    • (2009) Proc. IEEE ICNP , pp. 151-160
    • Su, L.1    Ding, B.2    Yang, Y.3    Abdelzaher, T.4    Cao, G.5    Hou, J.6
  • 28
    • 70349653420 scopus 로고    scopus 로고
    • Time-valid onetime signature for time critical multicast data authentication
    • Q. Wang, H. Khurana, Y. Huang, and K. Nahrstedt, "Time-valid onetime signature for time critical multicast data authentication," in Proc. IEEE INFOCOM, 2009, pp. 1233-1241.
    • (2009) Proc. IEEE INFOCOM , pp. 1233-1241
    • Wang, Q.1    Khurana, H.2    Huang, Y.3    Nahrstedt, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.