Abstract:
In this paper, we show that the cryptographic key generation and distribution scheme for the smart gird proposed by Xia and Wang is vulnerable to the impersonation attack...Show MoreMetadata
Abstract:
In this paper, we show that the cryptographic key generation and distribution scheme for the smart gird proposed by Xia and Wang is vulnerable to the impersonation attack by which the adversary is able to impersonate the responder to the initiator. Furthermore, on the basis of this vulnerability, we point out that Xia and Wang's argument for resistance against the unknown key share (UKS) attack is incorrect.
Published in: IEEE Transactions on Smart Grid ( Volume: 4, Issue: 3, September 2013)