{"id":"https://openalex.org/W3163909197","doi":"https://doi.org/10.1109/jiot.2021.3078175","title":"An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments","display_name":"An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments","publication_year":2021,"publication_date":"2021-05-08","ids":{"openalex":"https://openalex.org/W3163909197","doi":"https://doi.org/10.1109/jiot.2021.3078175","mag":"3163909197"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3078175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3078175","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100426768","display_name":"Liping Zhang","orcid":"https://orcid.org/0000-0003-3558-917X"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liping Zhang","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0003-3558-917X","affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056016616","display_name":"Yue Zhu","orcid":"https://orcid.org/0000-0001-9324-9283"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Zhu","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0001-9324-9283","affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034031357","display_name":"Wei Ren","orcid":"https://orcid.org/0000-0001-8590-1737"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Ren","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Computer Science, China University of Geosciences, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0001-8590-1737","affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101636709","display_name":"Yinghan Wang","orcid":"https://orcid.org/0000-0002-0071-4412"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinghan Wang","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0002-0071-4412","affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]},{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["AU","US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, Department of Electrical and Computer Engineering, and Department of Computer Science, The University of Texas at San Antonio (UTSA), San Antonio, TX, USA","UniSA STEM, University of South Australia, Adelaide, SA, Australia"],"raw_orcid":"https://orcid.org/0000-0001-9208-5336","affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, Department of Electrical and Computer Engineering, and Department of Computer Science, The University of Texas at San Antonio (UTSA), San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"UniSA STEM, University of South Australia, Adelaide, SA, Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103216531","display_name":"Naixue Xiong","orcid":"https://orcid.org/0000-0002-0394-4635"},"institutions":[{"id":"https://openalex.org/I192664086","display_name":"Northeastern State University","ror":"https://ror.org/01z7kzb45","country_code":"US","type":"education","lineage":["https://openalex.org/I192664086"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neal N. Xiong","raw_affiliation_strings":["Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK, USA"],"raw_orcid":"https://orcid.org/0000-0002-0394-4635","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK, USA","institution_ids":["https://openalex.org/I192664086"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100426768"],"corresponding_institution_ids":["https://openalex.org/I3124059619"],"apc_list":null,"apc_paid":null,"fwci":4.8976,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.95852035,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"23","first_page":"17120","last_page":"17130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8219854831695557},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6131189465522766},{"id":"https://openalex.org/keywords/chebyshev-polynomials","display_name":"Chebyshev polynomials","score":0.6004608869552612},{"id":"https://openalex.org/keywords/chebyshev-filter","display_name":"Chebyshev filter","score":0.48902639746665955},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.4251968264579773},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4216832220554352},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34856978058815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1550830900669098},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12514814734458923}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8219854831695557},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6131189465522766},{"id":"https://openalex.org/C129785596","wikidata":"https://www.wikidata.org/wiki/Q619511","display_name":"Chebyshev polynomials","level":2,"score":0.6004608869552612},{"id":"https://openalex.org/C21424316","wikidata":"https://www.wikidata.org/wiki/Q718621","display_name":"Chebyshev filter","level":2,"score":0.48902639746665955},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4251968264579773},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4216832220554352},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34856978058815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1550830900669098},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12514814734458923},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3078175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3078175","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8799999952316284}],"awards":[{"id":"https://openalex.org/G1339902361","display_name":null,"funder_award_id":"61972366","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3236286560","display_name":null,"funder_award_id":"61303237","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G665366804","display_name":null,"funder_award_id":"KFKT2019-003","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1849280677","https://openalex.org/W1982179579","https://openalex.org/W2014538398","https://openalex.org/W2020237187","https://openalex.org/W2025266594","https://openalex.org/W2065456268","https://openalex.org/W2066175361","https://openalex.org/W2079777023","https://openalex.org/W2084587681","https://openalex.org/W2086853779","https://openalex.org/W2090396608","https://openalex.org/W2094544665","https://openalex.org/W2104093457","https://openalex.org/W2105709923","https://openalex.org/W2122941544","https://openalex.org/W2135797872","https://openalex.org/W2143426739","https://openalex.org/W2279729589","https://openalex.org/W2395574854","https://openalex.org/W2426209670","https://openalex.org/W2517336287","https://openalex.org/W2524028925","https://openalex.org/W2531017060","https://openalex.org/W2593086630","https://openalex.org/W2613554997","https://openalex.org/W2739692078","https://openalex.org/W2789827290","https://openalex.org/W2790635691","https://openalex.org/W2884789028","https://openalex.org/W2898774400","https://openalex.org/W2931084620","https://openalex.org/W2969462307","https://openalex.org/W2981585806","https://openalex.org/W2997932364","https://openalex.org/W2999722313","https://openalex.org/W3006891966","https://openalex.org/W3015003218","https://openalex.org/W3028540083","https://openalex.org/W6681642217","https://openalex.org/W6711956328","https://openalex.org/W6772276697","https://openalex.org/W6777693241"],"related_works":["https://openalex.org/W2390710574","https://openalex.org/W2010728213","https://openalex.org/W3149552330","https://openalex.org/W3153890349","https://openalex.org/W2751256511","https://openalex.org/W2382532955","https://openalex.org/W2106962382","https://openalex.org/W2541927208","https://openalex.org/W4213342932","https://openalex.org/W2056379897"],"abstract_inverted_index":{"Electric":[0],"vehicle":[1,19],"charging":[2,64],"is":[3,196],"becoming":[4],"more":[5],"commonplace,":[6],"but":[7],"a":[8,46,141],"number":[9,47],"of":[10,40,48,59,95,101,113,122,202,221],"challenges":[11,118],"remain.":[12],"For":[13],"example,":[14],"the":[15,93,99,110,120,166,172,193,200,211],"wireless":[16],"communications":[17],"between":[18],"users":[20],"and":[21,28,55,61,150,161,188,223],"aggregators":[22],"can":[23],"be":[24],"subject":[25],"to":[26,36,87,119,147,198],"exploitation":[27],"hence,":[29],"several":[30],"authentication":[31,53,96,126,160,183,205],"schemes":[32,218],"have":[33,84],"been":[34,85],"designed":[35],"support":[37],"varying":[38],"levels":[39],"privacy":[41,228],"protection.":[42],"However,":[43,109],"there":[44,83],"are":[45],"limitations":[49],"observed":[50],"in":[51,66,77,92,219],"existing":[52],"schemes,":[54,180],"examples":[56],"include":[57],"lack":[58],"anonymity":[60],"not":[62,71],"considering":[63],"peak":[65],"their":[67],"design":[68,94],"(and":[69],"consequently,":[70],"meeting":[72],"low":[73],"energy":[74],"consumption":[75],"requirement":[76],"smart":[78,167],"grid":[79,168],"environments).":[80],"More":[81],"recently,":[82],"attempts":[86],"utilize":[88],"Chevyshev":[89],"chaotic":[90,124],"map":[91],"mechanism,":[97],"with":[98,176],"aims":[100],"reducing":[102],"computational":[103,187],"costs":[104],"yet":[105],"achieving":[106,227],"high":[107],"security.":[108],"security":[111,201],"requirements":[112],"Chebyshev":[114,123,136,152],"polynomials":[115,137],"pose":[116],"new":[117],"construction":[121],"maps-based":[125],"schemes.":[127],"To":[128],"solve":[129],"these":[130,215],"limitations,":[131],"we":[132],"propose":[133],"an":[134,158],"efficient":[135,151],"algorithm":[138,146],"by":[139],"adopting":[140],"square":[142],"matrix-based":[143],"binary":[144],"exponentiation":[145],"provide":[148],"secure":[149],"polynomial":[153],"computation.":[154],"We":[155],"further":[156],"construct":[157],"energy-efficient":[159],"key":[162],"negotiation":[163],"scheme":[164,184,213],"for":[165],"environments":[169],"based":[170],"on":[171],"proposed":[173,182,204,212],"algorithm.":[174],"Compared":[175],"five":[177,216],"other":[178,217],"competing":[179],"our":[181,203],"achieves":[185],"reduced":[186],"communication":[189,224],"costs.":[190],"In":[191],"addition,":[192],"ProVerif":[194],"tool":[195],"used":[197],"analyze":[199],"scheme.":[206],"The":[207],"results":[208],"show":[209],"that":[210],"outperforms":[214],"terms":[220],"computation":[222],"overheads":[225],"while":[226],"preserving.":[229]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":1}],"updated_date":"2026-05-11T08:15:01.531666","created_date":"2025-10-10T00:00:00"}
