{"id":"https://openalex.org/W2578689470","doi":"https://doi.org/10.1109/tsg.2017.2655014","title":"Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid","display_name":"Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2578689470","doi":"https://doi.org/10.1109/tsg.2017.2655014","mag":"2578689470"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2017.2655014","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprints.bournemouth.ac.uk/26839/1/TSG.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011086368","display_name":"Neetesh Saxena","orcid":"https://orcid.org/0000-0002-6437-0807"},"institutions":[{"id":"https://openalex.org/I9300472","display_name":"Bournemouth University","ror":"https://ror.org/05wwcw481","country_code":"GB","type":"education","lineage":["https://openalex.org/I9300472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Neetesh Saxena","raw_affiliation_string":"[Department of Computing and Informatics, Bournemouth University, Poole, U.K.]","raw_affiliation_strings":["[Department of Computing and Informatics, Bournemouth University, Poole, U.K.]"]},{"author_position":"last","author":{"id":"https://openalex.org/A5074866066","display_name":"Santiago Grijalva","orcid":"https://orcid.org/0000-0001-8601-4662"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I1289702989","https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Santiago Grijalva","raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"]}],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":23,"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"9","issue":"5","first_page":"4323","last_page":"4334"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Security Challenges in Smart Grid Systems","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Security Challenges in Smart Grid Systems","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"authentic control commands","score":0.6304},{"keyword":"smart grid","score":0.4896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.68642443},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6391742},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.60715556},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5531534},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.54230183},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.53622204},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.52762645},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.48535553},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4752778},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4125001},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35089415},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20685211},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2017.2655014","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://eprints.bournemouth.ac.uk/26839/1/TSG.pdf","pdf_url":"http://eprints.bournemouth.ac.uk/26839/1/TSG.pdf","source":{"id":"https://openalex.org/S4306400187","display_name":"Bournemouth University Research Online (Bournemouth University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"host_organization":"https://openalex.org/I9300472","host_organization_name":"Bournemouth University","host_organization_lineage":["https://openalex.org/I9300472"],"host_organization_lineage_names":["Bournemouth University"],"type":"repository"},"license":null,"version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://eprints.bournemouth.ac.uk/26839/1/TSG.pdf","pdf_url":"http://eprints.bournemouth.ac.uk/26839/1/TSG.pdf","source":{"id":"https://openalex.org/S4306400187","display_name":"Bournemouth University Research Online (Bournemouth University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"host_organization":"https://openalex.org/I9300472","host_organization_name":"Bournemouth University","host_organization_lineage":["https://openalex.org/I9300472"],"host_organization_lineage_names":["Bournemouth University"],"type":"repository"},"license":null,"version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.47,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1972241647","https://openalex.org/W1974303722","https://openalex.org/W1985653499","https://openalex.org/W2015880590","https://openalex.org/W2019020869","https://openalex.org/W2020963006","https://openalex.org/W2025434161","https://openalex.org/W2052207834","https://openalex.org/W2074329442","https://openalex.org/W2074594718","https://openalex.org/W2123733299","https://openalex.org/W2127892706","https://openalex.org/W2130155141","https://openalex.org/W2131489800","https://openalex.org/W2134751726","https://openalex.org/W2162998067","https://openalex.org/W2168124299","https://openalex.org/W2523578283"],"related_works":["https://openalex.org/W2993833576","https://openalex.org/W2776877297","https://openalex.org/W3125718803","https://openalex.org/W2127920220","https://openalex.org/W3119288169","https://openalex.org/W2945097178","https://openalex.org/W4388741024","https://openalex.org/W4320855289","https://openalex.org/W3122953031","https://openalex.org/W3123743600"],"ngrams_url":"https://api.openalex.org/works/W2578689470/ngrams","abstract_inverted_index":{"Enabling":[0],"secure":[1,142],"delivery":[2,75],"of":[3,11,15,76],"control":[4],"commands":[5,31,51,79,98,127],"and":[6,44,57,125,146,152,163,167],"alert":[7],"messages":[8],"is":[9,141,165],"one":[10],"the":[12,33,39,74,81,94,104,113,116,120,139,174,177],"critical":[13],"requirements":[14],"smart":[16],"grid":[17],"communications.":[18],"If":[19],"adversaries":[20],"were":[21],"to":[22,38,60,176],"gain":[23],"access,":[24],"they":[25],"could":[26,52],"alter":[27],"or":[28],"send":[29],"malicious":[30,50,126],"from":[32,173],"Control":[34],"Center":[35],"(CC),":[36],"intended":[37],"Remote":[40],"Terminal":[41],"Units":[42],"(RTUs)":[43],"Intelligent":[45],"Electronic":[46],"Devices":[47],"(IEDs).":[48],"These":[49],"disrupt":[53],"power":[54,61],"system":[55],"operations":[56],"cause":[58],"damage":[59],"devices.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66],"propose":[67,85],"an":[68,130],"efficient":[69,86],"signature":[70,158],"scheme":[71,140,159],"for":[72,99,171],"ensuring":[73],"only":[77],"legitimate":[78],"over":[80,103],"communication":[82],"network.":[83],"We":[84],"signatures":[87,114],"using":[88,119,160],"hash":[89],"that":[90,138,156],"are":[91,132],"sent":[92,128],"by":[93,111,129],"CC":[95,175],"along":[96],"with":[97],"protecting":[100],"command":[101],"alteration":[102],"network,":[105],"which":[106],"also":[107],"provide":[108],"sender":[109],"authenticity":[110],"verifying":[112],"at":[115],"RTU/IED.":[117],"By":[118],"proposed":[121],"scheme,":[122],"both":[123],"random":[124],"adversary":[131],"discarded.":[133],"The":[134,149],"security":[135],"analysis":[136],"shows":[137],"against":[143],"replay,":[144],"repudiation":[145],"impersonation":[147],"attacks.":[148],"performance":[150],"evaluation":[151],"prototype":[153],"simulation":[154],"show":[155],"our":[157],"SHA1,":[161],"SHA256":[162],"SHA384":[164],"feasible,":[166],"can":[168],"be":[169],"used":[170],"communications":[172],"field.":[178]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2578689470","counts_by_year":[{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2024-03-06T06:26:43.638426","created_date":"2017-01-26"}