چکیده
|
in recent years, the development of smart networks as the next generation electrical network with stream optimization
And the high quality of electricity has made it possible. Smart network technologies in the last few years
Attention has been paid to various industries, research institutes and universities. However, establish a balance between
Security and productivity remain a challenge in the practical implementation of the smart grid
Is. In this paper, various authentication schemes in terms of defects and advantages were examined.
Reducing computing costs and security in messaging are especially important in all of these projects
has taken. However, many of these schemes have been shown to counter major attacks such as attack
Counterfeiting, Tracking Attacks and Service Banding Attacks are not very effective and need to be upgraded.
They are more resilient to such attacks. Recently, Li and his colleagues launched a message authentication scheme
The style suggests that the user may remain anonymous and show that the design is significant
In bilateral authentication and reduction of some common attacks (eg, forgery of identity, attack)
Service clause (successful in smart network environment, so this plan in detail in this article It has been further analyzed.
|