Denial of Service Attack on Protocols for Smart Grid Communications

[1]  Chin-Chen Chang,et al.  A Pairing-free ID-based Key Agreement Protocol with Different PKGs , 2014 .

[2]  Sherali Zeadally,et al.  Key management solutions in the smart grid environment , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).

[3]  Gary A. Kildall,et al.  A unified approach to global program optimization , 1973, POPL.

[4]  Swapnoneel Roy,et al.  Energy Oriented Vulnerability Analysis on Authentication Protocols for CPS , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.

[5]  Swapnoneel Roy,et al.  On vulnerability analysis of several password authentication protocols , 2015, Innovations in Systems and Software Engineering.

[6]  Dejan J. Sobajic,et al.  Artificial Neural-Net Based Dynamic Security Assessment for Electric Power Systems , 1989, IEEE Power Engineering Review.

[7]  Wei-Chi Ku,et al.  Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..

[8]  Lih-Chyau Wuu,et al.  Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..

[9]  Neetesh Saxena,et al.  State of the Art Authentication, Access Control, and Secure Integration in Smart Grid , 2015 .

[10]  Fan Wu,et al.  An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity , 2015, Secur. Commun. Networks.

[11]  Kevin J. Houle,et al.  Trends in Denial of Service Attack Technology , 2001 .

[12]  Huei-Ru Tseng,et al.  A secure and privacy-preserving communication protocol for V2G networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[13]  Yu Li,et al.  Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication , 2011, 30th IEEE International Performance Computing and Communications Conference.

[14]  Yongge Wang,et al.  Secure Key Distribution for the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[15]  Christos Xenakis,et al.  Self-organised Key Management for the Smart Grid , 2015, ADHOC-NOW.

[16]  Victor C. M. Leung,et al.  Efficient Authentication and Key Management Mechanisms for Smart Grid Communications , 2014, IEEE Systems Journal.

[17]  Paul F. Syverson,et al.  A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.

[18]  Kevin I.-J. Ho,et al.  An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[19]  Gary McGraw,et al.  Static Analysis for Security , 2004, IEEE Secur. Priv..

[20]  Swapnoneel Roy,et al.  Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols , 2014, IACR Cryptol. ePrint Arch..

[21]  H. C. Tsai,et al.  Stolen-Verifier Attack on an Efficient Smartcard-Based One-Time Password Authentication Scheme , 2004 .

[22]  Yacine Challal,et al.  eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid , 2015, TrustCom 2015.

[23]  Alejandro Russo,et al.  Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.