Proposed Scheme. The proposed scheme involves mainly two entities (the smart meter (SM) and the NAN gateway). Before describing TABLE I Symbols and descriptions current time stamp of SM. In order to provide the message integrity, the SM computes Y 1 = MACL1[SMIDj , T 1, ASMj ]. It generates a pseudo number (φ) and computes α = H(NID φ) idSTj T 1, and finally, sends a message, start α, Q1, ASMj , Y 1, φ, T 1 to the NAN. { } || ⊕ || Symbols Descriptions NID Neighborhood Area Network (NAN) identity XXXX Smart meter identity ST , idST Secret token and its identity EK [ms] Encrypt ms using key (K) DK [ms] Decrypt ms using key (K) p, n Large prime numbers Fq A finite field E Elliptic curve defined on finite field Fq with prime order n G Group of elliptic curve points on E P A point on elliptic curve E with order n H(.) One-way hash function (e.g., SHA-1, SHA-2, MD5, etc.) MAC, || Message authentication code, and concatenation operation φ, φN SM’s and XXX’s pseudo random numbers, respectively
Appears in 3 contracts
Samples: Authentication and Key Agreement, Authentication and Key Agreement, cronfa.swan.ac.uk
Proposed Scheme. The proposed scheme involves mainly two entities (the smart meter (SM) and the NAN gateway). Before describing TABLE I Symbols and descriptions SYMBOLS AND DESCRIPTIONS current time stamp of SM. In order to provide the message integrity, the SM computes Y 1 = MACL1[SMIDj , T 1, ASMj ]. It generates a pseudo number (φ) and computes α = H(NID φ) idSTj T 1, and finally, sends a message, start α, Q1, ASMj , Y 1, φ, T 1 to the NAN. { } || ⊕ || Symbols Descriptions NID Neighborhood Area Network (NAN) identity XXXX Smart meter identity ST , idST Secret token and its identity EK [ms] Encrypt ms using key (K) DK [ms] Decrypt ms using key (K) p, n Large prime numbers Fq A finite field E Elliptic curve defined on finite field Fq with prime order n G Group of elliptic curve points on E P A point on elliptic curve E with order n H(.) One-way hash function (e.g., SHA-1, SHA-2, MD5, etc.) MAC, || Message authentication code, and concatenation operation φ, φN SM’s and XXX’s pseudo random numbers, respectively
Appears in 2 contracts
Samples: Authentication and Key Agreement, Authentication and Key Agreement