{"id":"https://openalex.org/W4292973173","doi":"https://doi.org/10.1109/tsg.2022.3200405","title":"An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid Communications Under Key Leakage and Dishonest Insiders","display_name":"An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid Communications Under Key Leakage and Dishonest Insiders","publication_year":2022,"publication_date":"2022-08-22","ids":{"openalex":"https://openalex.org/W4292973173","doi":"https://doi.org/10.1109/tsg.2022.3200405"},"language":"en","primary_location":{"id":"doi:10.1109/tsg.2022.3200405","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2022.3200405","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013329233","display_name":"Jingyu Wang","orcid":"https://orcid.org/0000-0003-1930-9414"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingyu Wang","raw_affiliation_strings":["State Key Laboratory of Advanced Electromagnetic Engineering and Technology, School of Electrical and Electronic Engineering, and the School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Advanced Electromagnetic Engineering and Technology, School of Electrical and Electronic Engineering, and the School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076352152","display_name":"Jennifer Appiah\u2010Kubi","orcid":"https://orcid.org/0000-0001-5109-9707"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jennifer Appiah-Kubi","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074576139","display_name":"Lung\u2010An Lee","orcid":"https://orcid.org/0000-0003-3010-6482"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lung-An Lee","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035317975","display_name":"Dongyuan Shi","orcid":"https://orcid.org/0000-0002-8832-6595"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongyuan Shi","raw_affiliation_strings":["State Key Laboratory of Advanced Electromagnetic Engineering and Technology and the School of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Advanced Electromagnetic Engineering and Technology and the School of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002375301","display_name":"Chen\u2010Ching Liu","orcid":"https://orcid.org/0000-0002-8941-7958"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chen-Ching Liu","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5013329233"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.9638,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.73899494,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"14","issue":"2","first_page":"1210","last_page":"1222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/microgrid","display_name":"Microgrid","score":0.784906804561615},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.712252140045166},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6971210241317749},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6722636222839355},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5930432081222534},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5230020880699158},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.49424436688423157},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4886236786842346},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44794464111328125},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.44692888855934143},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.44638511538505554},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43457120656967163},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4280911982059479},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4166603684425354},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38513505458831787},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3813120424747467},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.1191524863243103},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06514275074005127}],"concepts":[{"id":"https://openalex.org/C2776784348","wikidata":"https://www.wikidata.org/wiki/Q5762595","display_name":"Microgrid","level":3,"score":0.784906804561615},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.712252140045166},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6971210241317749},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6722636222839355},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5930432081222534},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5230020880699158},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.49424436688423157},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4886236786842346},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44794464111328125},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.44692888855934143},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.44638511538505554},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43457120656967163},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4280911982059479},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4166603684425354},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38513505458831787},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3813120424747467},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.1191524863243103},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06514275074005127},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsg.2022.3200405","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2022.3200405","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4923526803","display_name":null,"funder_award_id":"2021M701294","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8997290003","display_name":null,"funder_award_id":"51777081","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1552038849","https://openalex.org/W1558426510","https://openalex.org/W1560881416","https://openalex.org/W1653866131","https://openalex.org/W1974303722","https://openalex.org/W1980187301","https://openalex.org/W1992927481","https://openalex.org/W2010507480","https://openalex.org/W2029029052","https://openalex.org/W2055037596","https://openalex.org/W2066175361","https://openalex.org/W2069836575","https://openalex.org/W2087760019","https://openalex.org/W2113446256","https://openalex.org/W2119335833","https://openalex.org/W2122941544","https://openalex.org/W2127892706","https://openalex.org/W2129876196","https://openalex.org/W2130459259","https://openalex.org/W2131489800","https://openalex.org/W2161152118","https://openalex.org/W2165214731","https://openalex.org/W2279729589","https://openalex.org/W2515197007","https://openalex.org/W2532718707","https://openalex.org/W2535431598","https://openalex.org/W2578689470","https://openalex.org/W2620314617","https://openalex.org/W2691014653","https://openalex.org/W2752328771","https://openalex.org/W2789711809","https://openalex.org/W2974462870","https://openalex.org/W3044942648","https://openalex.org/W3086787090","https://openalex.org/W3095655378","https://openalex.org/W3108781197","https://openalex.org/W3162915151","https://openalex.org/W3163052994","https://openalex.org/W3203430682","https://openalex.org/W4226133732","https://openalex.org/W4226194693","https://openalex.org/W4249844008"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W4308361275","https://openalex.org/W3034338022","https://openalex.org/W1578158220"],"abstract_inverted_index":{"Cryptographic":[0],"schemes":[1,14],"are":[2,137],"often":[3],"deployed":[4],"in":[5,17,99,113],"microgrids":[6,18],"to":[7,69],"protect":[8],"communication":[9,48],"security.":[10],"However,":[11],"most":[12],"existing":[13,33],"widely":[15],"used":[16],"cannot":[19],"ensure":[20],"forward":[21,78],"secrecy":[22,79],"and":[23,28,74,80,91,131],"non-repudiation":[24,81],"under":[25],"key":[26],"leakage":[27],"dishonest":[29],"insiders.":[30],"Although":[31],"some":[32],"cryptographic":[34,65,126],"techniques":[35],"can":[36,96],"theoretically":[37],"overcome":[38],"these":[39],"vulnerabilities,":[40],"their":[41],"computational":[42,104],"complexity":[43],"may":[44],"significantly":[45],"extend":[46],"the":[47,55,94,109,114,129,134],"latency,":[49],"making":[50],"them":[51],"less":[52],"suitable":[53],"for":[54],"time-sensitive":[56],"microgrid":[57,83,141],"control":[58,84],"scenario.":[59],"In":[60],"this":[61],"paper,":[62,115],"a":[63,117,140],"novel":[64],"scheme":[66,95,110,136],"is":[67,111],"proposed":[68,135],"guarantee":[70],"not":[71],"only":[72],"confidentiality":[73],"integrity":[75],"but":[76],"also":[77],"of":[82,108,124,133],"communications.":[85],"Built":[86],"from":[87],"key-evolving":[88],"symmetric":[89],"encryption":[90],"online/offline":[92],"signature,":[93],"efficiently":[97],"run":[98],"embedded":[100],"controllers":[101],"with":[102,116],"limited":[103],"resources.":[105],"The":[106],"security":[107],"analyzed":[112],"recommended":[118],"instantiation":[119],"given":[120],"through":[121,143],"comprehensive":[122],"comparisons":[123],"candidate":[125],"algorithms.":[127],"Besides,":[128],"effectiveness":[130],"efficiency":[132],"tested":[138],"on":[139],"model":[142],"cyber-physical":[144],"co-simulation.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
