Acknowledgement
이 논문은 2023년도 중소벤처기업부의 기술개발사업 지원에 의한 연구임 [RS-2023-00255607].
References
- Alsuwian, T., Butt, A. S. and Amin, A. A. (2022) Smart Grid Cyber Security Enhancement: Challenges and Solutions-A Review, Sustainability, 14(21), 14226.
- Barai, G. R., Krishnan, S. and Venkatesh., B. (2015) Smart Metering and Functionalities of Smart Meters in Smart Grid - A Review, 2015 IEEE Electrical Power and Energy Conference (EPEC), Oct. 26-28, London, ON, Canada.
- Burnett, A., Byrne, F., Dowling, T. and Duffy, A. (2007) A Biometric Identity based Signature Scheme, International Journal of Network Security, 5(3), 317-326.
- Cho, Y., Oh, J., Kwon, D., Son, S., Lee, J. and Park, Y. (2022) A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF, IEEE Access, 10, 101330-101346. https://doi.org/10.1109/ACCESS.2022.3208347
- Cui, J., Wang, F., Zhang, Q., Xu, Y. and Zhong, H. (2021) Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT, IEEE Transactions on Industrial Electronics, 68(12), 12921-12929. https://doi.org/10.1109/TIE.2020.3039227
- Cui, J., Wang, F., Zhang, Q., Gu, C. and Zhoong, H. (2023) Efficient Batch Authentication Scheme Based on Edge Computing in IIoT, IEEE Transactions on Network and Service Management, 20(1), 357-368. https://doi.org/10.1109/TNSM.2022.3206378
- Dolev, D. and Yao, A. C. (1983) On the Security of Public Key Protocols, IEEE Transactions on Information Theory, 29(2), 198-208. https://doi.org/10.1109/TIT.1983.1056650
- Gao, Y., Sarawi, S. F. AI. and Abbott, D. (2020) Physical Unclonable Functions, Nature Electronics, 3, 81-91. https://doi.org/10.1038/s41928-020-0372-5
- Islam, S. N., Baig, Z. and Zeadally, S. (2019) Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures, IEEE Transactions on Industrial Informatics, 15(12), 6522-6530. https://doi.org/10.1109/TII.2019.2931436
- Jangirala, S., Das, A. K. and Vasilakos, A. V. (2020)Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment, IEEE Transactions on Industrial Informatics, 16(11), 7081-7093. https://doi.org/10.1109/TII.2019.2942389
- Kim, M., Lee, J., Park, K., Park, Y., Park, K. and Park, Y. (2021) Design of Secure Decentralized Car-Sharing System Using Blockchain, IEEE Access, 9, 54796-54810. https://doi.org/10.1109/ACCESS.2021.3071499
- Lee, J., Yu, S., Park, K., Park, Y. and Park, Y. (2019) Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments, Sensors, 19(10), 2358.
- Lee, S. and Kim, K. (2016) Device Authentication in Smart Grid System using Blockchain, Conference on lnformation Security and Cryptography-Winter 2016, Dec. 03, Seoul, Korea.
- Mandal, S., Bera, B., Sutrala, A. K., Das, A. K. Choo, K. K. R., Park, Y. (2020) Certificateless-Signcryption-BasedThree-Factor User Access Control Scheme for IoT Environment, IEEE Internet of Things Journal, 7(4), 3184-3197. https://doi.org/10.1109/JIOT.2020.2966242
- Mirzaee, P. H., Shojafar, M., Cruickshank, H. and Tafazolli, R. (2022) Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures), IEEE access, 10, 52922-52954. https://doi.org/10.1109/ACCESS.2022.3174259
- Odelu, V., Das, A. K., Wazid, M. and Conti, M. (2018) Provably Secure Authenticated Key Agreement Scheme for Smart Grid, IEEE Transactions on Smart Grid, 9(3), 1900-1910.
- Park, K., Park, Y., Das, A. K., Yu, S., Lee, J. and Park, Y. (2019) A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things, IEEE Access, 7, 76812-76832. https://doi.org/10.1109/ACCESS.2019.2921399
- Park, Y. H., Park, Y. H. and Moon, S. J. (2011) Security Improvement of ID-based Multiple Key Management Scheme for Scalable Ad Hoc Networks, Journal of the Korea Industrial Information Systems Research, 16(2), 13-18. https://doi.org/10.9723/jksiis.2011.16.2.013
- Park, Y. H. and Park, Y. H. (2015) Secure and Scalable Key Aggregation Scheme for Cloud Storage, Journal of the Korea Industrial Information Systems Research, 20(2), 11-18. https://doi.org/10.9723/jksiis.2015.20.2.011
- Paul, S., Rabbani, M. S., Kundu, R. K. and Zama, S. M. R. (2014) A Review of Smart Technology (Smart Grid) and Its Features, 2014 1st International Conference on Non Conventional Energy (ICONCE 2014), Jan. 16-17, Kalyani, India, pp. 200-203.
- Sureshkumar, V., Anandhi, S., Amin, R. and Madhumathi, R. (2021) Design of Robust Mutual Authentication and Key Establishment Security Protocol for Cloud-Enabled Smart Grid Communication, IEEE Systems Journal 15(3), 3565-3572. https://doi.org/10.1109/JSYST.2020.3039402
- Yu, S., Park, K., Lee, J., Park, Y., Park, Y., Lee, S. and Chung, B. (2020) Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment, Applied Sciences, 10(5), 1758.
- Xiong, H., Wu, Y. Su, C. and Yeh, K. H. (2020) A Secure and Efficient Certificateless Batch Verification Scheme with Invalid Signature Identification for The Internet of Things, Journal of Information Security and Applications, 53, 102507.
- World Wide Web Consortium (W3C) (2022) Decentralized Identifiers (DIDs) v1.0 Core Architecture, Data Model, and Representations, https://www.w3.org/TR/did-core/(Accessed on Sep. 1st, 2023)
- Zhang, H., Wang, J. and Ding, Y. (2019) Blockchain-based Decentralized and Secure Keyless Signature Scheme for Smart Grid, Energy, 180, 955-967. https://doi.org/10.1016/j.energy.2019.05.127