{"id":"https://openalex.org/W4396804044","doi":"https://doi.org/10.3390/cryptography8020020","title":"A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids","display_name":"A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids","publication_year":2024,"publication_date":"2024-05-09","ids":{"openalex":"https://openalex.org/W4396804044","doi":"https://doi.org/10.3390/cryptography8020020"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8020020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8020020","pdf_url":"https://www.mdpi.com/2410-387X/8/2/20/pdf?version=1715268797","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/8/2/20/pdf?version=1715268797","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113203915","display_name":"Zahraa Abdullah Ali","orcid":"https://orcid.org/0009-0007-4065-7233"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Zahraa Abdullah Ali","raw_affiliation_strings":["Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055300515","display_name":"Zaid Ameen Abduljabbar","orcid":null},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Zaid Ameen Abduljabbar","raw_affiliation_strings":["Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078856844","display_name":"Hamid Alasadi","orcid":"https://orcid.org/0000-0001-5801-2221"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Hamid Ali Abed AL-Asadi","raw_affiliation_strings":["Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039127314","display_name":"Vincent Omollo Nyangaresi","orcid":null},"institutions":[{"id":"https://openalex.org/I315205436","display_name":"Jaramogi Oginga Odinga University of Science and Technology","ror":"https://ror.org/03ffvb852","country_code":"KE","type":"education","lineage":["https://openalex.org/I315205436"]},{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN","KE"],"is_corresponding":false,"raw_author_name":"Vincent Omollo Nyangaresi","raw_affiliation_strings":["Department of Applied Electronics, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai 600124, India","Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science and Technology, Bondo 40601, Kenya","Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science and Technology, Bando 40601, Kenya"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Applied Electronics, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai 600124, India","institution_ids":["https://openalex.org/I85461943"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science and Technology, Bondo 40601, Kenya","institution_ids":["https://openalex.org/I315205436"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science and Technology, Bando 40601, Kenya","institution_ids":["https://openalex.org/I315205436"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040319444","display_name":"Iman Qays Abduljaleel","orcid":"https://orcid.org/0000-0002-8068-5710"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Iman Qays Abduljaleel","raw_affiliation_strings":["Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"],"raw_orcid":"https://orcid.org/0000-0002-8068-5710","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049347649","display_name":"Abdulla J. Y. Aldarwish","orcid":"https://orcid.org/0000-0002-1039-6462"},"institutions":[{"id":"https://openalex.org/I114173286","display_name":"Gujarat University","ror":"https://ror.org/017f2w007","country_code":"IN","type":"education","lineage":["https://openalex.org/I114173286"]},{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IN","IQ"],"is_corresponding":false,"raw_author_name":"Abdulla J. Y. Aldarwish","raw_affiliation_strings":["Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq","Department of Computer Science, Gujarat University, Ahmedabad 380009, India","Department of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq"],"raw_orcid":"https://orcid.org/0000-0002-1039-6462","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]},{"raw_affiliation_string":"Department of Computer Science, Gujarat University, Ahmedabad 380009, India","institution_ids":["https://openalex.org/I114173286"]},{"raw_affiliation_string":"Department of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5055300515"],"corresponding_institution_ids":["https://openalex.org/I126633494"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":3.1552,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.91756947,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"8","issue":"2","first_page":"20","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7693113088607788},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6897733211517334},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6289394497871399},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.549531102180481},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5205962657928467},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4765337407588959},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4661012887954712},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4639652967453003},{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.4598143994808197},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.4371185004711151},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.4322810471057892},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4260771870613098},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42365944385528564},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09082040190696716}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7693113088607788},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6897733211517334},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6289394497871399},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.549531102180481},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5205962657928467},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4765337407588959},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4661012887954712},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4639652967453003},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.4598143994808197},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4371185004711151},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.4322810471057892},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4260771870613098},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42365944385528564},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09082040190696716},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography8020020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8020020","pdf_url":"https://www.mdpi.com/2410-387X/8/2/20/pdf?version=1715268797","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cf3f1911089b44b289f714cca89f4b2c","is_oa":true,"landing_page_url":"https://doaj.org/article/cf3f1911089b44b289f714cca89f4b2c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 2, p 20 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8020020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8020020","pdf_url":"https://www.mdpi.com/2410-387X/8/2/20/pdf?version=1715268797","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.7400000095367432,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396804044.pdf"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W2117593045","https://openalex.org/W2279729589","https://openalex.org/W2517336287","https://openalex.org/W2535431598","https://openalex.org/W2613554997","https://openalex.org/W2744532080","https://openalex.org/W2770141764","https://openalex.org/W2781662152","https://openalex.org/W2789827290","https://openalex.org/W2797008633","https://openalex.org/W2802666034","https://openalex.org/W2805592916","https://openalex.org/W2911981000","https://openalex.org/W2941491026","https://openalex.org/W2944326485","https://openalex.org/W2947523868","https://openalex.org/W2949494275","https://openalex.org/W3008852650","https://openalex.org/W3011575542","https://openalex.org/W3024683468","https://openalex.org/W3031244200","https://openalex.org/W3044766511","https://openalex.org/W3044930678","https://openalex.org/W3081671623","https://openalex.org/W3087958975","https://openalex.org/W3092188219","https://openalex.org/W3120109452","https://openalex.org/W3163909197","https://openalex.org/W3195498038","https://openalex.org/W3196263195","https://openalex.org/W4213199601","https://openalex.org/W4220988826","https://openalex.org/W4225654141","https://openalex.org/W4240705788","https://openalex.org/W4285319382","https://openalex.org/W4286359159","https://openalex.org/W4286655454","https://openalex.org/W4286664759","https://openalex.org/W4307061087","https://openalex.org/W4321375484","https://openalex.org/W4323659734","https://openalex.org/W4365509778","https://openalex.org/W4380986181","https://openalex.org/W4382599656","https://openalex.org/W4386165107","https://openalex.org/W4387005644","https://openalex.org/W4390569091","https://openalex.org/W4391965996","https://openalex.org/W6694919358","https://openalex.org/W6726715279","https://openalex.org/W6845851708"],"related_works":["https://openalex.org/W2368411741","https://openalex.org/W1629777635","https://openalex.org/W2100678814","https://openalex.org/W2001671835","https://openalex.org/W37362883","https://openalex.org/W2129277957","https://openalex.org/W1527700023","https://openalex.org/W2388868631","https://openalex.org/W2394384873","https://openalex.org/W2068394892"],"abstract_inverted_index":{"Smart":[0],"grids":[1],"integrate":[2],"information":[3],"technology,":[4],"decision":[5],"support":[6],"systems,":[7],"communication":[8,160],"networks,":[9],"and":[10,73,94,144,157],"sensing":[11],"technologies.":[12],"All":[13],"these":[14,44,61],"components":[15],"cooperate":[16],"to":[17,46,128],"facilitate":[18],"dynamic":[19],"power":[20],"adjustments":[21],"based":[22],"on":[23],"received":[24],"client":[25],"consumption":[26],"reports.":[27],"Although":[28],"this":[29,50,85,126],"brings":[30],"forth":[31],"energy":[32],"efficiency,":[33],"the":[34,40,104,111,151],"transmission":[35],"of":[36,60,125,154],"sensitive":[37],"data":[38],"over":[39],"public":[41,69],"internet":[42],"exposes":[43],"networks":[45],"numerous":[47,52],"attacks.":[48],"To":[49],"end,":[51],"security":[53,82,98,123],"solutions":[54],"have":[55,78],"been":[56],"presented":[57],"recently.":[58],"Most":[59],"techniques":[62],"deploy":[63],"conventional":[64],"cryptographic":[65],"systems":[66],"such":[67,138],"as":[68,139,162,164],"key":[70,113],"infrastructure,":[71],"blockchains,":[72],"physically":[74],"unclonable":[75],"functions":[76],"that":[77,110,130],"either":[79],"performance":[80],"or":[81],"issues.":[83],"In":[84],"paper,":[86],"a":[87,121],"fairly":[88],"efficient":[89],"authentication":[90],"scheme":[91],"is":[92,100,115],"developed":[93],"analyzed.":[95],"Its":[96],"formal":[97],"analysis":[99,124],"carried":[101],"out":[102],"using":[103],"Burrows\u2013Abadi\u2013Needham":[105],"(BAN)":[106],"logic,":[107],"which":[108],"shows":[109],"session":[112],"negotiated":[114],"provably":[116],"secure.":[117],"We":[118],"also":[119],"execute":[120],"semantic":[122],"protocol":[127],"demonstrate":[129],"it":[131,149],"can":[132],"resist":[133],"typical":[134],"smart":[135],"grid":[136],"attacks":[137],"privileged":[140],"insider,":[141],"guessing,":[142],"eavesdropping,":[143],"ephemeral":[145],"secret":[146],"leakages.":[147],"Moreover,":[148],"has":[150],"lowest":[152],"amount":[153],"computation":[155],"costs":[156],"relatively":[158],"lower":[159],"overheads":[161],"well":[163],"storage":[165],"costs.":[166]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
