Comments on 'V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions'

被引:1
作者
Wu, Tsu-Yang [1 ,2 ]
Wu, Haozhi [1 ]
Kong, Fangfang [1 ]
Kumari, Saru [3 ]
Khan, Muhammad Khurram [4 ]
Chen, Chien-Ming [2 ]
机构
[1] Shandong University of Science and Technology, College of Computer Science and Engineering, Qingdao,266590, China
[2] Nanjing University of Information Science and Technology, School of Artificial Intelligence, School of Future Technology, Nanjing,210044, China
[3] Chaudhary Charan Singh University, Department of Mathematics, Meerut,250004, India
[4] King Saud University, Center of Excellence in Information Assurance (CoEIA), Riyadh,11495, Saudi Arabia
来源
IEEE Transactions on Industrial Cyber-Physical Systems | 2024年 / 2卷
关键词
Authentication - Cyber Physical System - Cybersecurity - Embedded systems - Hash functions - Vehicle-to-grid;
D O I
10.1109/TICPS.2024.3376304
中图分类号
学科分类号
摘要
Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses hash functions and multiple physical unclonable functions. However, we find that Reddy et al.'s protocol cannot resist known session-specific temporary information (KSSTI) attacks. To address these limitations, we discuss an improvement that addresses the above issues. © 2023 IEEE.
引用
收藏
页码:69 / 70
相关论文
empty
未找到相关数据