{"title":"关于 \"V2G-Auth:利用物理上不可克隆的功能实现 V2G 环境的轻量级认证和密钥协议\"","authors":"Tsu-Yang Wu;Haozhi Wu;Fangfang Kong;Saru Kumari;Muhammad Khurram Khan;Chien-Ming Chen","doi":"10.1109/TICPS.2024.3376304","DOIUrl":null,"url":null,"abstract":"Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses hash functions and multiple physical unclonable functions. However, we find that Reddy et al.’s protocol cannot resist known session-specific temporary information (KSSTI) attacks. To address these limitations, we discuss an improvement that addresses the above issues.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"69-70"},"PeriodicalIF":0.0000,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions”\",\"authors\":\"Tsu-Yang Wu;Haozhi Wu;Fangfang Kong;Saru Kumari;Muhammad Khurram Khan;Chien-Ming Chen\",\"doi\":\"10.1109/TICPS.2024.3376304\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses hash functions and multiple physical unclonable functions. However, we find that Reddy et al.’s protocol cannot resist known session-specific temporary information (KSSTI) attacks. To address these limitations, we discuss an improvement that addresses the above issues.\",\"PeriodicalId\":100640,\"journal\":{\"name\":\"IEEE Transactions on Industrial Cyber-Physical Systems\",\"volume\":\"2 \",\"pages\":\"69-70\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-03-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Industrial Cyber-Physical Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10470407/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10470407/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions”
Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses hash functions and multiple physical unclonable functions. However, we find that Reddy et al.’s protocol cannot resist known session-specific temporary information (KSSTI) attacks. To address these limitations, we discuss an improvement that addresses the above issues.