SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    NIST Smart Grid, CSWG, Introduction to NISTIR 7628 guidelines for smart grid cyber security, www.nist.gov/smartgrid, September 2010.
  • 2
    Wang J, Biviji MA, Wang WM. Lessons learned from smart grid enabled pricing programs, in Proc. IEEE PECI, Urbana, IL, February 2011.
  • 3
    Vale ZA, Morais H, Khodr H. Intelligent multi-player smart grid management considering distributed energy resources and demand response, in Proc. PES General Meeting, Minneapolis, MN, July 2010.
  • 4
    Heiskanen E, Matschoss K. Exploring emerging customer needs for smart grid applications, in Proc. Second ISGT Europe, Manchester, United Kingdom, December 2011.
  • 5
    Rusitschka S, Eger K, Gerdes C. Smart grid data cloud: a model for utilizing cloud computing in the smart grid domain, in Proc. SmartGridComm, Gaithersburg, MD, October 2010.
  • 6
    Kim H, Kim Y, Yang K, Thottan M. Cloud-based demand response for smart grid: architecture and distributed algorithms, in Proc. Second SmartGridComm, Brussels, Belgium, October 2011.
  • 7
    Diffie W, Hellman ME. New direction in cryptography, IEEE Trans. on Information Theory, pp 644–654, Vol IT-11, November 1976.
  • 8
    Seo DH, Sweeney P. Simple authenticated key agreement algorithm, an Electronic Letter, pp 1073–1074, Vol. 35, Issue 13, June 1999.
  • 9
    Xiao-fei D, Chuan-gui M, Qing-feng C. Password authenticated key exchange protocol with stronger security, in Proc. ETCS Workshop, Wuhan, Hubei China, March 2009.
  • 10
    Zhang Z, Zhang Q. Verifier-based password authenticated key exchange protocol via elliptic curve, in Proc. ICISIT Conference, Beijing, China, December 2010.
  • 11
    ITU-T Rec. X.1035 (02/2007), Password-authenticated key exchange (PAK) protocol, Series X, Telecommunication Security, Telecommunication Standardization Sector of ITU, www.itu.int/ITU-T/, 2007
  • 12
    IEEE Std 1363.2-2008 IEEE standard specifications for password-based public-key cryptographic techniques, http://standards.ieee.org, January 2009.
  • 13
    Burmester M, Desmedt Y. A secure and efficient conference key distribution systems, in Proc. Advances in Cryptology, pp 275–286, LNCS Vol. 950, 1994.
  • 14
    Sun YL, Liu KJR. Analysis and protection of dynamic membership information for group key distribution schemes, IEEE Trans. on Information Forensics and Security, pp 213–226, Vol. 2, No. 2, June 2007.
  • 15
    Choi D, Kim H, Won D, Kim S. Advanced key-management architecture for secure SCADA communications, IEEE Trans. on Power Delivery, pp 1154–1163, Vol. 24, No. 3, July 2009.
  • 16
    Yao G, Wang H, Feng D. A group PAKE protocol using different passwords, in Proc. NSWCTC Conference, Wuhan, Hubei China, April 2009.
  • 17
    Jarecki S, Kim J, Tsudik G. Flexible robust group key agreement, IEEE Trans. on Parallel and Distributed Systems, pp 879–886, Vol. 22, No. 5, May 2011.
  • 18
    Lin Y, Studer A, Chen Y, Hsiao H, Kuo L, Lee J, McCune JM, Wang K, Krohn M, Lin P, Perrig A, Sun H, Yang B. SPATE: small-group PKI-less authenticated trust establishment, IEEE Trans. on Mobile Computing, pp 1666–1681, Vol. 9, No. 12, December 2010.
  • 19
    Wang M, Pan J, Wang J. Password-based group authenticated key exchange protocol: from 3-party to group, in Proc. IEEE NCIS, Guilin, China, May 2011.
  • 20
    Chen Y, Yang G. Efficient and secure group key management based on EBS and attribute encryption, in Proc. IEEE CSAE, Nanjing, China, June 2011.
  • 21
    Mailloux N, Miri A, Nevins M. Forward secure identity-based key agreement for dynamic groups, in Proc. 9th PST, Montreal, QC, July 2011.
  • 22
    Teng J, Wu C. A provable authenticated certificateless group key agreement with constant rounds, Journal of Communications and Networks, pp 104110, Vol. 14, No. 1, February 2012.
  • 23
    Konstantinou E, Klaoudatou E, Kamparmpakis P. Performance evaluation of ID-based group key agreement protocols, in Proc. 6th ARES, Vienna, Austria, August 2011.
  • 24
    Sakarindr P, Ansari N. Survey of security services on group communications, IET Information Security, pp 258272, Vol. 4, No. 4, 2010.
  • 25
    Klaoudatou E, Klaoudatou E, Kambourakis G, Gritzalis S. A survey on cluster-based group key agreement protocols for WSNs, IEEE Communication Surveys & Tutorials, pp 429442, Vol. 13, No. 3, 2011.
  • 26
    Sun Z, Ma J. Efficient key management for advanced distribution automation system, in Proc. IEEE IC-NIDC, Beijing, China, September 2010.
  • 27
    Kamto J, Qian L, Fuller J, Attia J. Light-weight key distribution and management for advanced metering infrastructure, in Proc. IEEE SG-COMNETS, Houston, TX, December 2011.
  • 28
    Jung-Yoon K, Hyoung-Kee C. An efficient and versatile key management protocol for secure smart grid communications, in Proc. IEEE WCNC, Paris, France, April 2012.
  • 29
    Nicanfar H, Leung VCM. Multilayer consensus ECC-based password authenticated key-exchange (MCEPAK) protocol for smart grid system, accepted for publication in IEEE Trans. on Smart Grid, Oct. 2012.
  • 30
    Dolev D, Yao A. On the security of public-key protocols, IEEE Trans. on Information Theory, Vol. 29, pages 198208, 1983.
  • 31
    AVISPA-automated validation of internet security protocols, http://www.avispa-project.org