Research Article
Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure
Table 4
Comparison with existing scheme and proposed scheme.
| | [10]’s scheme | [11]’s scheme | Proposed scheme |
| Methodology |
Diffie-Hellman based group key distribution |
Trust third party based group key distribution |
Key table-based group key distribution | Integrity of group key | X | Vulnerable of man-in-the-middle attack | O | Trust third party verify security key | O | Each smart meter can verify Integrity of group key | Confidentiality of group key | O | Hash function and Exponentiation | X | Session key can be calculated by user information | O | The group key and group key generation element do not send over the network. |
|
|