T
E
L
KO
M
N
I
KA
T
e
lec
om
m
u
n
icat
ion
,
Com
p
u
t
i
n
g,
E
lec
t
r
on
ics
an
d
Cont
r
ol
Vol.
18
,
No.
1
,
F
e
br
ua
r
y
2020
,
pp.
228
~
23
3
I
S
S
N:
1693
-
6930,
a
c
c
r
e
dit
e
d
F
ir
s
t
G
r
a
de
by
Ke
me
nr
is
tekdikti
,
De
c
r
e
e
No:
21/E
/KP
T
/2018
DO
I
:
10.
12928/
T
E
L
KO
M
NI
KA
.
v18i1.
14798
228
Jou
r
n
al
h
omepage
:
ht
tp:
//
jour
nal.
uad
.
ac
.
id/
index
.
php/T
E
L
K
OM
N
I
K
A
S
al
sa20 b
ase
d
l
ig
h
t
w
e
ig
h
t
s
e
c
u
r
ity
s
c
h
e
m
e
f
or
s
m
a
r
t
m
e
t
e
r
c
om
m
u
n
i
c
at
i
on
i
n
s
m
a
r
t
g
r
i
d
S
.
M
.
S
ali
m
Re
z
a
1
,
M
d
M
u
r
s
h
e
d
u
l
Ar
i
f
e
e
n
2
,
S
ie
h
Ki
on
g
T
ion
g
3
,
M
d
Akh
t
e
r
u
z
z
am
an
4
,
Now
s
h
ad
Am
in
5
,
M
oh
am
m
ad
S
h
ak
e
r
i
6
,
Af
id
a
A
yob
7
,
Ain
i
Hu
s
s
ain
8
1
,4
Facu
l
t
y
o
f
E
n
g
i
n
eer
i
n
g
an
d
B
u
i
l
t
E
n
v
i
ro
n
men
t
,
T
h
e
N
at
i
o
n
a
l
U
n
i
v
er
s
i
t
y
o
f
Mal
ay
s
i
a,
Mal
a
y
s
i
a
1,
3,
5,
6
In
s
t
i
t
u
t
e
o
f
S
u
s
t
ai
n
ab
l
e
E
n
er
g
y
,
U
n
i
v
e
rs
i
t
i
T
e
n
a
g
a
N
as
i
o
n
al
,
Mal
a
y
s
i
a
1,
2
D
e
p
art
me
n
t
o
f
I
n
fo
rma
t
i
o
n
an
d
Co
mm
u
n
i
cat
i
o
n
T
ec
h
n
o
l
o
g
y
,
Ban
g
l
a
d
es
h
U
n
i
v
er
s
i
t
y
o
f
Pro
fes
s
i
o
n
a
l
s
,
Ban
g
l
a
d
es
h
7,
8
D
e
p
art
me
n
t
o
f
E
l
ec
t
ri
ca
l
,
E
l
ec
t
ro
n
i
c
&
Sy
s
t
em
s
E
n
g
i
n
eeri
n
g
,
T
h
e
N
a
t
i
o
n
a
l
U
n
i
v
ers
i
t
y
o
f
Mal
a
y
s
i
a,
Mal
ay
s
i
a
Ar
t
icle
I
n
f
o
AB
S
T
RA
CT
A
r
ti
c
le
h
is
tor
y
:
R
e
c
e
ived
Aug
30
,
2019
R
e
vis
e
d
Nov
30
,
20
19
Ac
c
e
pted
De
c
25
,
20
19
T
h
e
t
ra
d
i
t
i
o
n
a
l
p
o
w
er
g
i
rd
i
s
al
t
eri
n
g
d
ramat
i
cal
l
y
t
o
a
s
mart
p
o
w
er
g
r
i
d
w
i
t
h
t
h
e
es
ca
l
at
i
n
g
d
ev
e
l
o
p
men
t
o
f
i
n
fo
rmat
i
o
n
an
d
co
mm
u
n
i
cat
i
o
n
t
ech
n
o
l
o
g
y
(ICT
).
A
mo
n
g
t
h
o
u
s
an
d
s
o
f
el
ec
t
ro
n
i
c
d
e
v
i
ce
s
co
n
n
ect
e
d
t
o
t
h
e
g
r
i
d
t
h
ro
u
g
h
co
mmu
n
i
ca
t
i
o
n
n
e
t
w
o
rk
,
s
mart
met
er
(SM)
i
s
t
h
e
co
r
e
n
et
w
o
rk
i
n
g
d
ev
i
ce.
T
h
e
co
n
s
o
l
i
d
a
t
i
o
n
o
f
ICT
t
o
t
h
e
el
ect
r
o
n
i
c
d
ev
i
ces
c
en
t
ere
d
o
n
SM
o
p
e
n
l
o
o
p
h
o
l
e
fo
r
t
h
e
a
d
v
er
s
ari
e
s
t
o
l
au
n
ch
c
y
b
er
-
a
t
t
ac
k
.
T
h
e
refo
re,
fo
r
p
ro
t
ect
i
n
g
t
h
e
n
e
t
w
o
rk
fro
m
t
h
e
ad
v
er
s
ar
i
es
i
t
i
s
req
u
i
red
t
o
d
e
s
i
g
n
l
i
g
h
t
w
e
i
g
h
t
s
ec
u
ri
t
y
mech
an
i
s
m
fo
r
SM,
as
co
n
v
en
t
i
o
n
a
l
cry
p
t
o
g
rap
h
y
s
c
h
e
mes
p
o
s
e
s
ex
t
e
n
s
i
v
e
co
mp
u
t
a
t
i
o
n
a
l
co
s
t
,
p
ro
ces
s
i
n
g
d
e
l
ay
an
d
o
v
er
h
ead
w
h
i
ch
i
s
n
o
t
s
u
i
t
ab
l
e
t
o
b
e
u
s
e
d
i
n
SM.
In
t
h
i
s
p
a
p
er,
w
e
h
av
e
p
ro
p
o
s
ed
a
s
ecu
ri
t
y
mec
h
an
i
s
m
co
n
s
o
l
i
d
at
i
n
g
el
l
i
p
t
i
c
c
u
rv
e
cr
y
p
t
o
g
rap
h
y
(
E
CC)
an
d
S
al
s
a
2
0
s
t
ream
ci
p
h
er
al
g
o
ri
t
h
m
t
o
en
s
u
re
s
ec
u
ri
t
y
o
f
t
h
e
n
et
w
o
r
k
as
w
el
l
as
ad
d
res
s
i
n
g
t
h
e
p
r
o
b
l
em
o
f
en
erg
y
effi
c
i
en
c
y
an
d
l
i
g
h
t
w
e
i
g
h
t
s
ecu
r
i
t
y
s
o
l
u
t
i
o
n
.
W
e
h
av
e
n
u
mer
i
cal
l
y
an
al
y
zed
t
h
e
p
erf
o
rman
ce
o
f
o
u
r
p
r
o
p
o
s
e
d
s
ch
eme
i
n
cas
e
o
f
en
erg
y
effi
ci
e
n
cy
an
d
p
ro
ce
s
s
i
n
g
t
i
me
w
h
i
c
h
rev
eal
s
t
h
a
t
t
h
e
s
u
g
g
es
t
ed
mech
a
n
i
s
m
i
s
s
u
i
t
ab
l
e
t
o
b
e
u
s
ed
i
n
SM
as
i
t
co
n
s
u
mes
l
es
s
p
o
w
er
an
d
req
u
i
re
s
l
es
s
p
ro
ce
s
s
i
n
g
t
i
me
t
o
en
cr
y
p
t
o
r
d
ecr
y
p
t
.
K
e
y
w
o
r
d
s
:
E
ll
ipt
ic
c
ur
ve
c
r
yptogr
a
phy
S
a
ls
a
20
S
e
c
ur
it
y
S
mar
t
g
r
id
S
mar
t
m
e
ter
Th
i
s
i
s
a
n
o
p
en
a
c
ces
s
a
r
t
i
c
l
e
u
n
d
e
r
t
h
e
CC
B
Y
-
SA
l
i
ce
n
s
e
.
C
or
r
e
s
pon
din
g
A
u
th
or
:
S
.
M
.
S
a
li
m
R
e
z
a
,
F
a
c
ult
y
of
E
nginee
r
ing
a
nd
B
uil
t
E
nvir
onment
,
T
he
Na
ti
ona
l
Unive
r
s
it
y
of
M
a
lays
ia,
S
e
langor
,
M
a
lays
ia
.
E
mail:
s
a
li
m4419@gm
a
il
.
c
om
1.
I
NT
RODU
C
T
I
ON
S
mar
t
g
r
id
(
S
G)
is
r
e
volut
ioni
z
ing
the
c
onve
nti
ona
l
powe
r
inf
r
a
s
tr
uc
tur
e
by
e
nha
nc
ing
r
e
li
a
bil
it
y
,
e
f
f
icie
nc
y
a
nd
s
us
taina
bil
it
y
a
s
we
ll
a
s
o
f
f
e
r
s
r
e
a
l
ti
me
e
ne
r
gy
c
ons
umpt
ion
,
e
ns
ur
e
s
powe
r
f
low
,
r
e
duc
e
s
gr
e
e
nhous
e
ga
s
e
mi
s
s
ion
s
[
1,
2]
.
I
t
is
e
nvis
ion
e
d
a
s
the
ne
xt
ge
ne
r
a
ti
on
powe
r
s
ys
tem
that
i
ntegr
a
tes
inf
or
mation
a
nd
c
omm
unica
ti
on
ne
twor
k
with
the
tr
a
dit
ional
powe
r
inf
r
a
s
tr
uc
tur
e
.
T
his
ne
twor
king
f
a
c
il
it
y
e
na
bles
the
uti
li
ty
p
r
ovider
s
to
de
li
ve
r
a
nd
dis
tr
ibut
e
the
powe
r
to
the
c
ons
um
e
r
s
a
c
c
or
ding
to
their
r
e
quir
e
ments
.
T
he
y
c
a
n
moni
to
r
a
nd
c
ontr
ol
th
e
powe
r
c
ons
umpt
ion,
us
a
ge
a
nd
e
lec
tr
icity
bil
l
thr
ough
a
dva
nc
e
d
m
e
ter
ing
i
nf
r
a
s
tr
uc
tur
e
(
AM
I
)
whic
h
is
the
c
e
ntr
a
l
ne
twor
king
inf
r
a
s
tr
uc
tur
e
of
S
G
.
S
m
a
r
t
mete
r
(
S
M
)
is
the
c
or
e
ne
two
r
king
de
vice
of
AM
I
w
hich
e
s
tablis
h
es
f
ull
duplex
c
omm
unica
ti
on
li
nk
a
mong
the
c
ons
umer
s
a
nd
the
s
e
r
vice
pr
ovider
s
.
T
hr
ough
thi
s
duplex
li
nk
the
S
M
s
e
nds
e
ne
r
gy
c
ons
umpt
io
n
r
e
por
t
to
the
uti
li
ty
pr
ovider
s
f
r
om
the
s
mar
t
e
lec
tr
ica
l
a
ppli
a
nc
e
s
a
nd
r
e
tr
ieve
s
e
le
c
tr
icity
bil
l
f
or
the
c
ons
umer
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Sals
a20
bas
e
d
li
ghtw
e
ight
s
e
c
ur
it
y
s
c
he
me
for
s
ma
r
t
me
ter
c
omm
unication
in
s
mar
t
gr
id
(
S.
M
.
Sali
m
R
e
z
a)
229
T
his
he
a
vy
de
pe
nda
bil
it
y
on
c
omm
unica
ti
on
ne
t
wor
k
make
s
the
powe
r
gr
id
vulner
a
ble
to
the
a
d
ve
r
s
a
r
ies
.
T
he
a
dve
r
s
a
r
y
c
a
n
int
r
ude
the
ne
twor
k
a
nd
launc
h
va
r
ious
c
ybe
r
a
tt
a
c
ks
to
dis
r
upt
the
nor
mal
ope
r
a
ti
on
o
f
the
powe
r
gr
id
th
r
ough
S
M
a
s
S
M
is
the
c
e
ntr
a
l
ne
twor
king
de
vice
be
twe
e
n
the
home
a
r
e
a
ne
twor
k
(
HA
N)
a
nd
ne
ighbor
hood
a
r
e
a
ne
two
r
k
(
NA
N)
.
C
ybe
r
a
tt
a
c
ks
c
a
n
be
c
las
s
if
ied
a
s
ins
ider
a
tt
a
c
k
a
nd
outs
ider
a
tt
a
c
k
[
3]
.
I
n
outs
ider
a
tt
a
c
k,
a
n
a
dve
r
s
a
r
y
c
a
n
a
tt
a
c
k
the
ne
twor
k
wi
thout
not
i
f
ying
the
ne
twor
k
a
dmi
n
is
tr
a
tor
.
T
he
a
dve
r
s
a
r
y
c
a
n
a
lt
e
r
the
da
ta
s
e
nt
by
the
s
mar
t
mete
r
o
r
manipulate
the
e
ne
r
gy
r
e
late
d
da
ta.
Als
o,
powe
r
outage
c
a
n
oc
c
ur
due
to
c
ybe
r
a
tt
a
c
ks
whic
h
c
a
n
lea
d
to
ha
z
a
r
dous
s
it
ua
ti
on
in
the
ne
twor
k.
T
he
r
e
f
or
e
,
f
or
pr
o
tec
ti
ng
the
ne
twor
k
f
r
om
a
tt
a
c
ke
r
s
a
nd
e
ns
ur
ing
pr
ivac
y
of
the
us
e
r
s
,
it
is
im
por
tant
to
de
s
ign
s
e
c
ur
it
y
mec
ha
nis
ms
that
a
r
e
c
ompatibl
e
with
the
powe
r
inf
r
a
s
tr
uc
tur
e
.
T
he
c
r
it
ica
l
inf
r
a
s
tr
uc
tur
e
of
powe
r
gr
id
im
pos
e
s
c
ha
ll
e
nge
s
to
de
s
ign
a
nd
im
pleme
nt
s
e
c
ur
it
y
mec
ha
nis
m
to
p
r
e
ve
nt
a
ny
kind
of
c
ybe
r
a
tt
a
c
ks
a
nd
us
e
r
pr
iva
c
y
f
r
om
the
a
tt
a
c
ke
r
s
.
T
he
S
M
is
a
r
e
s
our
c
e
c
ons
tr
a
int
e
lec
tr
onic
de
vice
that
r
e
quir
e
s
li
ght
we
ight
a
nd
r
e
s
our
c
e
e
f
f
icie
nt
s
e
c
ur
it
y
mec
ha
nis
m
to
s
e
c
ur
e
the
c
omm
unica
ti
on
a
mong
va
r
ious
de
vice
s
.
How
e
ve
r
,
the
c
onve
nti
ona
l
c
r
yptog
r
a
phy
mec
ha
nis
ms
a
r
e
n
ot
r
e
s
our
c
e
e
f
f
icie
nt
a
nd
s
uit
a
ble
to
us
e
in
S
M
s
e
c
ur
it
y
a
s
thes
e
mec
ha
nis
m
c
on
s
umes
e
xtr
a
powe
r
,
r
e
quir
e
s
high
pr
oc
e
s
s
ing
ti
me
a
nd
int
r
oduc
e
s
o
ve
r
he
a
d
.
R
e
c
e
ntl
y,
va
r
ious
types
of
s
c
he
mes
ha
ve
be
e
n
pr
opos
e
d
in
th
e
li
ter
a
tur
e
f
oc
us
ing
r
e
s
our
c
e
e
f
f
icie
nc
y
o
f
the
S
M
.
A
li
ghtwe
ight
a
uthentica
ti
on
mec
ha
nis
m
ha
s
be
e
n
pr
opos
e
d
in
[
4]
na
med
L
iS
A
whic
h
incor
por
a
tes
e
ll
ipt
ic
c
ur
ve
c
r
yptogr
a
phy
(
E
C
C
)
a
nd
e
ns
ur
e
s
mu
tual
a
uthentica
ti
on
,
a
nonymi
ty,
r
e
ply
a
tt
a
c
k
pr
e
ve
n
ti
on
a
nd
it
take
s
les
s
e
xe
c
uti
on
ti
me.
I
n
[
5]
the
a
uthor
s
ha
ve
mentioned
that
a
s
a
r
e
s
our
c
e
c
ons
tr
a
ine
d
de
vice
the
s
mar
t
mete
r
ne
e
ds
li
ghtwe
ight
c
r
yptogr
a
phy
mec
ha
nis
m
f
or
s
e
c
ur
ing
the
ne
twor
k.
T
he
a
uth
or
s
ha
ve
pr
opos
e
d
phys
ica
ll
y
unc
lonable
f
unc
ti
on
(
P
UF
)
b
a
s
e
d
li
ghtwe
ight
s
e
c
ur
it
y
s
olut
ion.
I
n
[
6]
a
n
a
u
thentica
ti
on
s
c
he
me
ha
s
be
e
n
pr
opos
e
d
ba
s
e
d
on
one
-
ti
me
pa
s
s
wor
d
s
c
he
me
to
e
ns
ur
e
mut
ua
l
a
uthentica
ti
on
be
twe
e
n
S
M
a
nd
the
s
e
r
ve
r
s
of
the
S
G
.
T
he
a
uthor
s
in
[
7]
ha
v
e
pr
opos
e
d
a
s
ign
-
c
r
ypti
on
mec
ha
nis
m
f
or
the
s
e
c
ur
it
y
o
f
S
M
whic
h
r
e
duc
e
s
maintena
nc
e
c
os
t
of
t
r
a
dit
ional
ke
y
mana
ge
ment
inf
r
a
s
tr
uc
tur
e
.
P
K
I
ba
s
e
d
p
hys
i
c
a
l
l
a
ye
r
a
s
s
is
t
m
utual
a
uthent
ica
ti
on
(
P
L
A
M
A)
mec
ha
nis
m
ha
s
be
e
n
pr
opos
e
d
in
[
8]
f
or
two
-
wa
y
c
omm
unica
ti
on
in
s
mar
t
mete
r
whic
h
is
li
ghtwe
ight
a
nd
p
r
ovides
f
a
s
t
e
r
a
uthentica
ti
on
pr
oc
e
s
s
.
T
he
a
uthor
s
in
[
9]
ha
ve
pr
opos
e
d
a
n
e
f
f
icie
nt
mes
s
a
ge
a
uthe
nti
c
a
ti
on
s
c
he
me
with
non
-
r
e
pudiation
s
e
r
vice
whic
h
a
ls
o
e
ns
ur
e
s
lo
w
powe
r
c
ons
umpt
ion,
but
they
did
no
t
pr
ove
powe
r
c
ons
umpt
ion
is
s
ue
c
lea
r
ly.
I
n
[
10]
the
a
uthor
s
ha
ve
p
r
opos
e
d
a
nove
l
a
uthentica
ti
on
s
c
he
me
ba
s
e
d
on
r
ing
os
c
il
lator
phys
ica
ll
y
unc
lonable
f
unc
ti
ons
f
or
AM
I
ne
twor
k.
T
he
a
uthentica
ti
on
mec
ha
nis
m
e
ns
ur
e
s
s
e
c
ur
it
y
f
or
the
c
om
muni
c
a
ti
on
be
twe
e
n
S
M
a
nd
uti
li
ty
c
omp
a
ny.
I
t
is
s
e
c
ur
e
d,
s
tor
a
ge
e
f
f
icie
nt
a
nd
low
late
nc
y.
P
UF
a
nd
C
S
I
ba
s
e
d
e
nc
r
ypti
on
mec
ha
nis
m
ha
s
be
e
n
pr
opos
e
d
in
[
11]
to
e
ns
ur
e
a
uthentica
ti
on
a
nd
int
e
gr
i
ty
o
f
the
ne
twor
k
.
E
lec
tr
icity
f
o
r
e
c
a
s
ti
ng
ba
s
e
d
s
e
c
u
r
it
y
a
nd
pr
ivac
y
s
c
he
me
ha
s
be
e
n
pr
opos
e
d
in
[
12]
whic
h
de
c
li
ne
s
the
ove
r
he
a
d
int
r
oduc
e
d
by
c
omm
unica
ti
on
a
nd
c
omput
a
ti
on.
T
he
a
uthor
s
in
[
13]
ha
s
p
r
opos
e
d
a
l
ow
ove
r
he
a
d
a
uthentica
ti
on
mec
ha
nis
m
to
e
ns
ur
e
s
e
c
ur
it
y
be
twe
e
n
S
M
a
nd
uti
li
ty
c
ompany
.
A
f
r
a
mew
or
k
ba
s
e
d
on
a
nonymi
z
a
ti
on
ha
s
be
e
n
p
r
opos
e
d
in
[
14]
to
e
nha
nc
e
the
s
e
c
ur
it
y
of
the
S
G.
P
u
bl
ic
ke
y
-
ba
s
e
d
a
ppr
oa
c
h
ha
s
be
e
n
de
mons
tr
a
ted
in
[
15]
whic
h
e
ns
ur
e
s
a
ut
he
nti
c
a
ti
on,
int
e
gr
it
y,
c
onf
identialit
y
a
nd
non
-
r
e
pudiation
but
publi
c
ke
y
ba
s
e
d
s
c
he
mes
a
r
e
no
t
e
ne
r
gy
e
f
f
icie
nt.
T
o
e
s
tablis
h
s
e
c
ur
e
c
omm
unica
ti
on
b
e
twe
e
n
c
ons
umer
s
a
nd
s
ubs
tation
s
,
the
a
uthor
s
in
[
16
]
pr
opos
e
d
a
n
E
C
C
ba
s
e
d
a
uthentica
ti
on
s
c
he
me
bu
t
it
is
una
ble
t
o
e
ns
ur
e
f
o
r
wa
r
d
s
e
c
r
e
c
y
[
17]
.
S
ha
r
e
d
s
e
c
r
e
t
ke
y
a
nd
r
a
ndom
number
ba
s
e
d
li
ghtwe
ight
c
r
yptogr
a
phy
mec
ha
nis
m
ha
s
be
e
n
pr
opos
e
d
in
[
18]
f
o
r
c
omm
u
nica
ti
on
be
twe
e
n
s
upe
r
vis
or
y
node
a
nd
c
ontr
ol
node
.
P
UF
a
nd
one
wa
y
ha
s
h
f
unc
ti
on
ba
s
e
d
c
r
yptogr
a
phy
ha
s
be
e
n
int
r
oduc
e
d
to
e
s
tablis
h
s
e
c
ur
it
y
a
mong
S
M
a
nd
s
e
r
vice
pr
ovide
r
[
19
]
.
I
n
thi
s
pa
pe
r
,
we
p
r
opos
e
to
us
e
a
li
ghtwe
igh
t
e
ne
r
gy
e
f
f
icie
nt
c
r
yptog
r
a
phy
s
c
he
me
na
med
S
a
ls
a
20
[
20]
f
or
s
e
c
ur
ing
the
S
M
ne
twor
k
.
S
a
ls
a
20
is
ba
s
e
d
on
AR
X
(
a
ddit
ion,
r
otation
a
nd
X
OR
)
.
I
n
c
onjunction
with
S
a
ls
a
20,
we
s
ugge
s
t
to
us
e
e
ll
ipt
ic
c
ur
ve
ba
s
e
d
a
uthentica
ti
on
s
c
he
me
be
f
o
r
e
a
ny
da
ta
e
xc
ha
nge
take
s
plac
e
us
ing
S
a
ls
a
20.
S
e
c
ti
on
2
dis
c
us
s
e
s
the
S
M
ne
twor
k.
I
n
s
e
c
ti
on
2
we
dis
c
us
s
our
pr
opos
e
d
s
olut
ion
.
I
n
s
e
c
ti
on
4
we
a
na
lyze
the
pr
opos
e
d
s
c
he
me
numer
ica
ll
y
a
nd
s
e
c
ti
on
5
c
onc
ludes
the
pa
pe
r
.
2.
S
M
AR
T
M
E
T
E
R
NE
T
WORK
S
mar
t
mete
r
ne
twor
k
c
ove
r
s
HA
N,
buil
d
ing
a
r
e
a
ne
twor
k
(
B
AN
)
a
nd
NA
N
,
t
r
a
ns
mi
s
s
ion,
dis
tr
ibut
ion,
s
e
r
vice
pr
ov
ider
,
mar
ke
t
a
nd
ope
r
a
ti
on
mana
ge
ment
a
c
c
or
ding
to
the
NI
S
T
[
21
-
23]
.
F
igur
e
1
de
mons
tr
a
tes
the
HA
N
ne
twor
k
.
HA
N
is
a
ne
two
r
k
ins
ide
the
home
uti
li
z
e
d
to
moni
tor
,
r
e
c
or
d
a
n
d
c
oll
e
c
t
e
ne
r
gy
us
a
ge
da
ta
f
r
om
the
e
lec
tr
ica
l
a
ppli
a
nc
e
s
c
onne
c
ted
to
the
ne
twor
k.
T
he
s
mar
t
e
ne
r
gy
de
vice
s
c
onne
c
ted
wir
e
les
s
ly
with
the
S
M
s
e
nds
e
ne
r
gy
c
ons
ump
ti
on
da
ta
of
the
e
lec
tr
ica
l
a
ppli
a
nc
e
s
.
T
he
uti
li
ty
c
ompany
c
a
n
c
oll
e
c
t
the
e
ne
r
gy
c
ons
umpt
ion
da
ta
thr
ough
the
S
M
us
ing
thes
e
e
ne
r
gy
de
vice
s
a
s
we
ll
a
s
the
home
owne
r
s
c
a
n
a
ls
o
moni
tor
their
e
ne
r
g
y
c
ons
umpt
ion
da
ta
a
t
the
S
M
.
How
e
ve
r
,
the
wir
e
les
s
c
onne
c
ti
vit
y
is
vulner
a
ble
to
c
ybe
r
a
tt
a
c
ks
that
c
a
n
c
a
us
e
major
da
mage
to
the
ne
twor
k.
T
he
r
e
f
o
r
e
,
it
is
a
vit
a
l
r
e
quir
e
ment
to
s
e
c
ur
e
thi
s
ne
twor
k
to
pr
otec
t
the
p
owe
r
gr
id
f
or
m
the
a
dve
r
s
a
r
ies
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
228
-
233
230
F
igur
e
1.
Ar
c
hit
e
c
tur
e
of
s
mar
t
m
e
ter
n
e
twor
k
3.
P
ROP
OS
E
D
M
E
T
HO
D
3.
1.
I
n
it
ial
izat
ion
p
h
as
e
S
M
a
nd
a
nother
c
onne
c
ted
de
vice
wi
th
S
M
will
pe
r
f
or
m
ini
ti
a
l
a
uthentica
ti
on
us
ing
e
ll
ipt
ic
c
ur
ve
c
r
yptogr
a
p
hy
[
24]
.
F
or
e
nc
r
ypti
on
a
nd
de
c
r
ypti
on
ba
s
e
d
on
e
ll
ipt
ic
c
ur
ve
,
e
a
c
h
e
lec
tr
ica
l
de
vi
c
e
s
a
y
,
c
hoos
e
s
a
ge
ne
r
a
tor
point
i
n
(
,
)
,
a
pr
ivate
ke
y
s
uc
h
that
<
whe
r
e
is
the
s
malles
t
pos
it
ive
int
e
ge
r
number
f
o
r
whic
h
×
=
⨷
.
T
he
n
the
c
hos
e
n
ge
ne
r
a
tor
point
with
the
e
ll
ipt
ic
c
ur
ve
(
,
)
a
r
e
made
publi
c
ly
a
va
il
a
ble
by
the
e
lec
tr
ica
l
node
.
A
f
ter
that
the
e
lec
tr
ica
l
de
vice
c
omput
e
s
it
s
publi
c
ke
y
a
s
=
×
a
nd
then
s
ha
r
e
s
with
the
S
M
.
T
o
e
nc
r
ypt
a
mes
s
a
ge
f
or
S
M
s
a
y
,
de
vice
c
omput
e
s
c
ipher
text
pa
ir
by
c
hoos
ing
a
r
a
ndom
numbe
r
lets
s
a
y
a
s
,
C
M
=
(
kg
,
P
M
+
k
P
j
)
whe
r
e
,
is
the
poin
t
in
wh
ich
the
mes
s
a
ge
ha
s
be
e
n
e
nc
ode
d
f
ol
lowing
a
s
uit
a
ble
e
nc
oding
pr
oc
e
s
s
.
T
o
de
c
r
ypt
the
mes
s
a
ge
s
e
ns
or
node
pe
r
f
o
r
ms
f
oll
owi
ng
ope
r
a
ti
on:
P
M
+
k
P
j
−
n
j
(
kg
)
=
P
M
+
k
(
n
j
g
)
−
n
j
(
kg
)
=
T
ha
t
is
node
f
i
r
s
t
mul
ti
pli
e
s
the
f
ir
s
t
po
int
o
f
the
c
ipher
text
with
it
s
pr
ivate
ke
y
a
nd
s
ubtr
a
c
ts
f
r
om
the
s
e
c
ond
point
.
A
malicious
node
ne
e
ds
to
know
the
r
a
ndom
numbe
r
f
or
de
c
r
yp
ti
ng
the
mes
s
a
ge
a
nd
it
is
dif
f
icult
to
c
omput
e
given
.
Util
izing
e
ll
ipt
ic
c
ur
ve
c
r
yptogr
a
phy
,
the
S
M
a
nd
the
o
ther
s
mar
t
de
v
ice
s
will
s
ha
r
e
their
identit
y
f
or
a
uthentica
ti
on
pu
r
pos
e
.
Af
ter
c
ompl
e
ti
ng
a
uthentica
ti
on,
the
S
M
will
e
xc
ha
nge
da
ta
with
other
de
vice
s
us
ing
low
powe
r
e
d
c
r
yptog
r
a
phy
c
a
ll
e
d
S
a
ls
a
20.
3.
2.
Dat
a
e
xc
h
an
ge
p
h
as
e
In
thi
s
s
e
c
ti
on
we
dis
c
us
s
the
da
ta
e
xc
ha
ng
e
be
t
we
e
n
S
M
a
nd
the
c
onne
c
ted
a
ppli
a
nc
e
s
.
W
e
ha
v
e
s
ugge
s
ted
to
us
e
S
a
ls
a
20
[
20]
s
tr
e
a
m
c
ipher
a
s
the
e
nc
r
ypti
on
mec
ha
nis
m
a
s
i
t
is
a
li
ghtwe
ight
s
e
c
ur
it
y
mec
ha
nis
m
f
or
e
xc
ha
nging
mete
r
r
e
a
d
in
a
nd
othe
r
in
f
or
mation
.
Anothe
r
ve
r
s
ion
o
f
S
a
ls
a
20
is
C
ha
C
ha
20.
I
n
a
nother
wor
k
we
ha
ve
pr
opos
e
d
C
ha
C
ha
20
a
s
the
e
nc
r
ypti
on
a
nd
de
c
r
ypti
on
mec
ha
nis
m.
He
r
e
,
we
ha
ve
c
ompar
e
d
C
ha
C
ha
20
a
nd
S
a
ls
a
20
in
the
pe
r
f
or
ma
nc
e
e
va
luation
s
e
c
ti
on.
S
a
ls
a
20
take
s
input
of
16
wor
ds
a
nd
output
s
16
wor
ds
.
L
ike
other
c
r
yptog
r
a
phy
a
lgor
it
hms
S
a
ls
a
20
a
ls
o
ha
s
a
r
ound
f
unc
ti
on
whic
h
ope
r
a
ted
r
e
pe
a
tedly
on
s
ome
da
ta
to
ge
t
the
r
e
s
ult
.
S
a
ls
a
20’
s
r
ound
f
unc
ti
on
it
s
e
lf
c
ons
is
ts
of
4
qua
r
ter
r
ound
f
unc
ti
on.
T
he
qua
r
ter
r
ound
f
unc
ti
ons
c
a
n
be
s
tate
d
a
s
,
⩘
=
(
+
)
<
<
<
7
⩘
=
(
+
)
<
<
<
9
⩘
=
(
+
)
<
<
<
13
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Sals
a20
bas
e
d
li
ghtw
e
ight
s
e
c
ur
it
y
s
c
he
me
for
s
ma
r
t
me
ter
c
omm
unication
in
s
mar
t
gr
id
(
S.
M
.
Sali
m
R
e
z
a)
231
⩘
=
(
+
)
<
<
<
18
whe
r
e
,
a
,
b,
c,
d
a
r
e
ini
ti
a
l
s
tate
wor
ds
of
32
bit
s
in
length.
I
nit
ial
s
tate
matr
ix
is
16
wor
ds
,
but
th
e
qua
r
ter
r
ound
f
unc
ti
on
ope
r
a
tes
on
4
32
-
bit
wor
ds
a
t
a
t
im
e
.
T
he
ini
t
ial
s
tate
matr
ix
c
a
n
be
de
f
ined
a
s
s
ho
w
n
in
F
igur
e
2
.
F
igur
e
2.
I
ni
ti
a
l
matr
ix
of
S
a
ls
a
20
4.
P
E
RF
ORM
AN
CE
E
VA
L
UA
T
I
ON
T
his
s
e
c
ti
on
dis
c
us
s
e
s
the
pe
r
f
or
manc
e
of
the
s
ugge
s
ted
method
f
or
S
M
.
T
he
pe
r
f
o
r
manc
e
e
va
luation
thr
ough
numer
ica
l
a
na
lys
is
done
he
r
e
a
r
e
e
xpe
c
ted
to
a
pply
to
S
M
a
nd
e
lec
tr
ica
l
a
ppli
a
nc
e
s
a
s
we
ll
.
W
e
ha
ve
numer
ica
ll
y
a
na
lyze
d
the
pe
r
f
or
manc
e
of
the
s
ugge
s
ted
method
in
ter
ms
o
f
e
ne
r
gy
c
ons
umpt
ion
a
nd
pr
oc
e
s
s
ing
ti
me.
As
thes
e
two
pa
r
a
mete
r
s
c
a
n
be
us
e
d
to
a
na
lyze
whe
ther
a
s
c
he
me
is
li
ghtwe
ight
or
not,
the
r
e
f
or
e
we
ha
ve
e
xa
mi
ne
d
to
a
na
lyze
in
c
a
s
e
of
e
ne
r
gy
uti
li
z
a
ti
on
a
nd
pr
oc
e
s
s
i
ng
ti
me.
I
n
the
T
a
ble
1
de
mons
tr
a
tes
the
pa
r
a
mete
r
s
c
ons
ider
e
d
f
or
numer
ica
l
a
na
lys
is
.
T
a
ble
1.
Nume
r
ial
P
a
r
a
mete
r
s
P
r
oc
s
s
or
I
nt
e
l
C
or
e
2 D
uo
P
r
oc
e
s
s
or
s
ope
r
a
ti
ng volt
a
ge
0.8500V to 1.5V
P
r
oc
e
s
s
or
s
ope
r
a
ti
ng f
r
e
que
nc
y
2.13 G
H
z
(
C
yc
le
s
/S
e
c
ond)
C
ur
r
e
nt
20.67 Amp
C
ur
r
e
nt
/C
yc
le
9.70 Amp
S
a
ls
a
20 S
pe
e
d
3.90 C
yc
le
s
/B
yt
e
C
ha
C
ha
20
s
pe
e
d
3.95 C
yc
le
s
/B
yt
e
E
ne
r
gy
c
ons
umpt
ion:
t
his
e
va
luation
pa
r
a
mete
r
d
e
notes
c
omput
a
ti
ona
l
e
ne
r
gy
mea
ning
the
a
mount
of
e
ne
r
gy
c
ons
umed
by
a
c
r
yptog
r
a
phy
s
c
he
me
whe
n
it
ope
r
a
tes
e
nc
r
ypti
o
n
or
de
c
r
ypti
on
o
pe
r
a
ti
on,
tr
a
ns
mi
s
s
ion
e
ne
r
gy
mea
ning
the
e
ne
r
gy
r
e
qui
r
e
d
to
tr
a
ns
mi
t
pa
c
ke
ts
to
a
r
e
c
e
ivi
ng
node
,
r
e
c
e
pti
o
n
e
ne
r
gy
mea
ning
the
a
mount
of
e
ne
r
gy
ne
e
de
d
to
r
e
c
e
ive
a
pa
c
ke
t.
it
is
im
por
tant
to
a
na
lyze
e
ne
r
gy
e
f
f
ic
ienc
y
a
s
mos
t
of
the
wir
e
le
s
s
de
vice
s
(
s
pe
c
ially
S
M
)
a
r
e
ba
tt
e
r
y
powe
r
e
d
a
nd
s
uf
f
e
r
s
f
r
om
ba
tt
e
r
y
powe
r
l
i
mi
tation.
T
hus
,
de
s
igni
ng
e
ne
r
gy
e
f
f
icie
nt
s
e
c
ur
it
y
s
c
he
me
will
e
nha
nc
e
the
li
f
e
ti
me
of
the
de
vice
s
.
T
o
e
va
luate
e
ne
r
gy
c
ons
umpt
ion
of
our
pr
opos
e
d
s
c
he
me
a
nd
C
ha
C
ha
20,
we
ha
ve
ut
il
ize
d
the
f
oll
owing
e
qua
ti
on
[
25]
:
=
/
/
w
he
r
e
,
C
C
/
B
de
notes
c
lock
c
yc
les
r
e
quir
e
d
pe
r
by
te
f
or
e
nc
r
ypti
on
a
nd
de
c
r
yp
ti
on.
C
C
/S
de
notes
c
lock
c
yc
le
r
e
quir
e
s
pe
r
s
e
c
ond
by
the
p
r
oc
e
s
s
or
.
I
is
the
c
ur
r
e
nt
a
nd
V
is
the
ope
r
a
ti
ng
volt
a
ge
.
F
igu
r
e
3
de
m
ons
tr
a
tes
the
c
ompar
is
on
of
e
ne
r
gy
c
ons
umpt
ion
of
S
a
ls
a
20
a
nd
C
ha
C
ha
20
whic
h
r
e
ve
a
ls
that
S
a
ls
a
20
take
s
le
s
s
powe
r
than
C
ha
C
ha
20
a
nd
make
s
the
p
r
opos
e
d
s
c
he
me
li
ghtwe
ight
to
be
us
e
d
in
S
M
,
whe
r
e
a
s
the
other
c
r
yptog
r
a
phy
s
c
he
mes
li
ke
AE
S
,
DE
S
r
e
quir
e
s
lot
s
of
c
omput
a
ti
ona
l
powe
r
whic
h
is
not
s
uit
a
ble
f
or
li
ghtwe
ight
e
lec
tr
onic
de
vice
.
T
a
ble
2
s
hows
the
e
ne
r
gy
c
ons
umpt
ion
va
lues
f
or
two
s
c
he
mes
na
med
S
a
ls
a
20
a
nd
C
ha
C
ha
20.
P
r
oc
e
s
s
ing
ti
me:
I
t
de
f
ines
the
ti
me
r
e
quir
e
d
f
or
t
he
pr
oc
e
s
s
or
to
pe
r
f
or
m
e
nc
r
ypti
on
or
de
c
r
ypti
on
of
a
s
ize
of
da
ta.
T
he
c
r
yp
togr
a
phy
s
c
he
me
w
hich
take
s
les
s
pr
oc
e
s
s
ing
ti
me
will
pe
r
f
o
r
m
f
a
s
t
than
the
c
r
yptogr
a
phy
s
c
he
me
whic
h
r
e
quir
e
s
lar
ge
p
r
o
c
e
s
s
ing
ti
me.
Als
o,
f
a
s
t
p
r
oc
e
s
s
ing
ti
me
will
r
e
duc
e
e
nd
to
e
nd
de
lay.
T
he
r
e
quir
e
d
ti
me
c
a
n
be
c
a
lcula
ted
a
s
,
=
=
/
/
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
228
-
233
232
w
he
r
e
,
s
pe
e
d
de
notes
bytes
pe
r
s
e
c
ond
or
thr
ough
put.
F
igur
e
4
de
mons
tr
a
tes
the
pr
oc
e
s
s
ing
ti
me
r
e
q
uir
e
d
by
C
ha
C
ha
20
a
nd
S
a
ls
a
20
whic
h
c
lea
r
ly
r
e
ve
a
ls
th
a
t
S
a
ls
a
20
take
s
les
s
pr
oc
e
s
s
ing
ti
me
whic
h
m
a
ke
s
the
pr
oc
e
s
s
ing
of
da
t
a
f
a
s
ter
.
T
a
ble
3
s
hows
the
pr
oc
e
s
s
ing
ti
me
c
ompar
is
on
of
S
a
ls
a
20
a
nd
C
ha
C
ha
20.
F
igur
e
3.
C
ompar
is
on
of
c
omput
a
ti
ona
l
e
ne
r
gy
c
on
s
umpt
ion
of
S
a
ls
a
20
a
nd
C
ha
C
ha
20
F
igur
e
4.
C
ompar
is
on
of
pr
oc
e
s
s
ing
ti
me
o
f
S
a
ls
a
20
a
nd
C
ha
C
ha
20
T
a
ble
2.
C
omput
a
ti
ona
l
e
ne
r
gy
c
ons
umpt
ion
of
two
s
c
he
mes
F
il
e
S
iz
e
S
a
ls
a
20
e
nr
gy
c
ons
umpt
io
n(
mJ
)
C
ha
C
ha
20
e
ne
r
gy c
ons
umpt
io
n(
mJ
)
1000
1
.
06
×
10
−
9
1
.
91
×
10
−
9
2000
2
.
13
×
10
−
9
3
.
83
×
10
−
9
3000
3
.
21
×
10
−
9
5
.
39
×
10
−
9
4000
4
.
37
×
10
−
9
7
.
05
×
10
−
9
5000
5
.
41
×
10
−
9
9
.
00
×
10
−
9
T
a
ble
3.
P
r
oc
e
s
s
ing
ti
me
c
ompar
is
on
of
two
s
c
he
mes
F
il
e
S
iz
e
S
a
ls
a
20
P
r
oc
e
s
s
in
g t
im
e
(
ms
)
C
ha
C
ha
20
P
r
oc
e
s
s
in
g t
im
e
(
ms
)
1000
0
.
91
0
.
93
2000
17
.
98
18
.
67
3000
29
.
87
39
.
02
4000
51
.
01
68
.
37
5000
80
.
48
101
.
98
I
n
thi
s
s
e
c
ti
on
we
ha
ve
a
na
lyze
d
the
p
r
opos
e
d
s
c
he
me
in
c
a
s
e
of
e
ne
r
gy
ut
il
iza
ti
on
a
nd
p
r
oc
e
s
s
ing
ti
me.
Our
pur
pos
e
wa
s
to
e
ns
ur
e
a
li
ghtwe
ight
s
e
c
ur
it
y
s
c
he
me
f
or
a
low
powe
r
e
d
e
lec
tr
onic
de
v
ice
S
M
.
T
he
numer
ica
l
a
na
lys
is
of
e
ne
r
gy
c
ons
umpt
ion
a
n
d
pr
oc
e
s
s
ing
ti
me
c
lea
r
ly
s
hows
that
the
s
ugge
s
te
d
s
c
he
me
S
a
ls
a
20
pe
r
f
or
ms
be
tt
e
r
a
nd
S
a
ls
a
20
r
e
quir
e
s
les
s
pr
oc
e
s
s
ing
ti
me
a
nd
c
omput
a
ti
ona
l
e
ne
r
gy
whic
h
make
s
it
li
ghtwe
ight
.
5.
CONC
L
USI
ON
I
n
thi
s
pa
pe
r
,
we
ha
ve
a
ddr
e
s
s
e
d
the
p
r
oblem
that
t
he
S
M
is
a
r
e
s
our
c
e
c
o
ns
tr
a
ined
e
lec
tr
onic
de
vice
whic
h
r
e
quir
e
s
li
gh
twe
ight
s
e
c
ur
it
y
mec
ha
nis
m
f
o
r
s
e
c
ur
ing
the
ne
twor
k
but
mos
t
of
the
pr
opos
e
d
p
r
otocols
or
methods
c
a
n
not
s
a
ti
s
f
y
the
r
e
quir
e
ments
ne
e
de
d
to
be
li
ghtwe
ight
a
s
they
c
ons
ume
huge
pr
oc
e
s
s
ing
powe
r
a
nd
take
s
huge
pr
oc
e
s
s
ing
ti
me
to
c
ompl
e
te
it
s
ope
r
a
ti
on.
T
he
r
e
f
or
e
,
we
ha
ve
s
ugge
s
ted
to
us
e
AR
X
ba
s
e
d
s
im
ple
li
ghtwe
ight
s
tr
e
a
m
c
ipher
a
lgor
it
h
m
na
me
d
S
a
ls
a
20
to
be
us
e
d
in
S
M
f
o
r
s
e
c
ur
ing
the
po
we
r
gr
id.
Along
with
S
a
ls
a
20,
we
ha
ve
a
ls
o
pr
opos
e
d
E
C
C
ba
s
e
d
a
uthentica
ti
on
be
f
or
e
e
xc
ha
nging
a
ny
da
ta.
E
C
C
is
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Sals
a20
bas
e
d
li
ghtw
e
ight
s
e
c
ur
it
y
s
c
he
me
for
s
ma
r
t
me
ter
c
omm
unication
in
s
mar
t
gr
id
(
S.
M
.
Sali
m
R
e
z
a)
233
a
ls
o
e
ne
r
gy
e
f
f
icie
nt
a
nd
it
is
a
publi
c
ke
y
-
ba
s
e
d
a
ppr
oa
c
h.
T
hus
,
be
f
o
r
e
e
xc
ha
nging
inf
or
mati
on
us
ing
S
a
ls
a
20,
the
S
M
a
uthentica
tes
with
the
legiti
mate
de
vice
.
W
e
ha
ve
numer
ica
ll
y
a
na
lyze
d
the
pe
r
f
or
manc
e
in
c
a
s
e
of
e
ne
r
gy
uti
li
z
a
ti
on
a
nd
p
r
oc
e
s
s
ing
ti
me.
F
igur
e
s
3
a
nd
4
r
e
ve
a
ls
that
our
s
ugge
s
ted
me
c
ha
nis
m
c
ons
umes
ve
r
y
les
s
e
ne
r
gy
a
nd
take
s
ve
r
y
les
s
pr
oc
e
s
s
ing
ti
me
whic
h
make
s
it
s
uit
a
ble
to
be
us
e
d
in
S
M
.
I
n
f
utur
e
,
we
will
a
na
lyze
the
s
ugge
s
ted
s
e
c
ur
it
y
s
c
he
me
in
ter
ms
o
f
i
ts
s
e
c
ur
it
y
pe
r
f
o
r
manc
e
.
RE
F
E
RE
NC
E
S
[1
]
N
.
K
o
m
n
i
n
o
s
,
et
al
.
,
“
Su
rv
e
y
i
n
Smar
t
G
ri
d
an
d
Smart
H
o
me
Secu
r
i
t
y
:
I
s
s
u
es
,
Ch
a
l
l
e
n
g
e
s
an
d
C
o
u
n
t
ermea
s
u
r
es
,”
IE
E
E
Co
m
m
u
n
i
c
a
t
i
o
n
s
S
u
r
veys
&
Tu
t
o
r
i
a
l
s
,
v
o
l
.
16
,
n
o
.
4
,
p
p
.
1
9
3
3
-
19
54
,
2
0
1
4
.
[2
]
A
.
Si
d
d
i
q
u
a
,
e
t
al
.
,
“
A
Re
v
i
e
w
an
d
T
ec
h
n
i
q
u
es
i
n
S
mart
G
ri
d
f
o
r
A
u
t
h
en
t
i
ca
t
i
o
n
o
f
Mes
s
ag
e
s
,”
In
t
er
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
La
t
es
t
E
n
g
i
n
eer
i
n
g
a
n
d
M
a
n
a
g
e
m
en
t
R
e
s
ea
r
c
h
(IJLE
M
R
)
,
v
o
l
.
03
,
n
o
.
03
,
p
p
.
91
-
9
6
,
Mar
2
0
1
8
.
[3
]
M.
J
o
u
i
n
i
,
et
a
l
.
,
“
Cl
as
s
i
f
i
ca
t
i
o
n
o
f
s
ec
u
ri
t
y
t
h
rea
t
s
i
n
i
n
fo
rma
t
i
o
n
s
y
s
t
em
s
,”
P
r
o
ce
d
i
a
Co
m
p
u
t
e
r
S
c
i
en
ce
,
v
o
l
.
32
,
p
p
.
4
8
9
-
4
96
,
2
0
1
4
.
[4
]
S.
G
arg
,
et
al
.
,
“
L
i
SA
:
A
L
i
g
h
t
w
e
i
g
h
t
an
d
Secu
re
A
u
t
h
en
t
i
ca
t
i
o
n
Mech
a
n
i
s
m
fo
r
Smart
Met
eri
n
g
In
fra
s
t
r
u
ct
u
re
,”
Th
i
s
p
a
p
er
h
a
s
b
een
a
ccep
t
ed
f
o
r
p
u
b
l
i
ca
t
i
o
n
i
n
t
h
e
IE
E
E
G
l
o
b
a
l
Co
m
m
u
n
i
ca
t
i
o
n
s
Co
n
f
er
e
n
ce
(G
L
O
B
E
CO
M
’
1
9
)
,
D
ecemb
er
2
0
1
9
.
[5
]
S.
Ry
u
,
“
PU
F
b
as
ed
Smart
Me
t
er
Secu
ri
t
y
w
i
t
h
Sx
Ch
ai
n
,”
In
t
er
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
Co
n
t
r
o
l
a
n
d
A
u
t
o
m
a
t
i
o
n
,
v
o
l
.
9
,
n
o
.
9
,
p
p
.
4
0
7
-
4
14
,
Sep
2
0
1
6
.
[6
]
Y
.
S.
L
ee
,
et
al
.
,
“
A
St
u
d
y
o
n
Secu
re
Ch
i
p
f
o
r
Me
s
s
a
g
e
A
u
t
h
en
t
i
ca
t
i
o
n
b
et
w
een
a
Smar
t
Me
t
er
an
d
H
o
me
A
p
p
l
i
an
ce
s
i
n
Smart
G
ri
d
,”
2
0
1
3
In
t
er
n
a
t
i
o
n
a
l
Co
n
f
er
e
n
ce
o
n
IT
Co
n
ver
g
e
n
ce
a
n
d
S
ecu
r
i
t
y
(ICITCS
)
,
pp
. 1
-
3
,
2
0
1
3
.
[7
]
E
.
U
.
So
y
k
an
,
et
a
l
.
,
“
Id
en
t
i
t
y
b
a
s
ed
s
i
g
n
cr
y
p
t
i
o
n
f
o
r
ad
v
a
n
ced
met
e
ri
n
g
i
n
fras
t
ru
c
t
u
re
,”
2
0
1
5
3
rd
In
t
er
n
a
t
i
o
n
a
l
Is
t
a
n
b
u
l
S
m
a
r
t
G
r
i
d
C
o
n
g
r
e
s
s
a
n
d
F
a
i
r
(ICS
G
)
,
p
p
.
1
-
5
,
2
0
1
5
.
[8
]
T
.
Ma
,
et
al
.
,
“
Ph
y
s
i
cal
L
ay
er
A
s
s
i
s
t
M
u
t
u
al
A
u
t
h
en
t
i
cat
i
o
n
s
c
h
eme
fo
r
s
mart
me
t
er
s
y
s
t
em
,”
2
0
1
4
I
E
E
E
Co
n
f
er
e
n
ce
o
n
C
o
m
m
u
n
i
c
a
t
i
o
n
s
a
n
d
Ne
t
wo
r
k
S
ecu
r
i
t
y
,
p
p
.
4
9
4
-
49
5
,
2
0
1
4
.
[9
]
J
.
Ch
o
i
,
et
al
.
,
“
A
n
E
ff
i
ci
e
n
t
Mes
s
ag
e
A
u
t
h
en
t
i
ca
t
i
o
n
f
o
r
N
o
n
-
rep
u
d
i
at
i
o
n
o
f
t
h
e
Smart
Met
er
i
n
g
Serv
i
ce
,”
2
0
1
1
F
i
r
s
t
A
CIS
/
JNU
I
n
t
e
r
n
a
t
i
o
n
a
l
Co
n
f
er
e
n
ce
o
n
Co
m
p
u
t
er
s
,
Ne
t
wo
r
ks
,
S
y
s
t
e
m
s
a
n
d
I
n
d
u
s
t
r
i
a
l
E
n
g
i
n
ee
r
i
n
g
,
p
p
.
3
3
1
-
33
3
,
2
0
1
1
.
[1
0
]
M.
Mu
s
t
ap
a
,
et
al
.
,
“
H
ard
w
are
-
O
r
i
en
t
ed
A
u
t
h
en
t
i
ca
t
i
o
n
fo
r
A
d
v
a
n
ced
Met
er
i
n
g
In
fras
t
ru
c
t
u
re
,”
IE
E
E
Tr
a
n
s
a
c
t
i
o
n
s
o
n
S
m
a
r
t
G
r
i
d
,
v
o
l
.
9
,
n
o
.
2
,
p
p
.
1
2
6
1
-
12
70
,
Mar
2
0
1
8
.
[1
1
]
A
.
M.
A
l
l
am
,
“
A
N
o
v
el
N
o
n
-
cry
p
t
o
g
ra
p
h
i
c
Secu
ri
t
y
Ser
v
i
ce
s
fo
r
A
d
v
a
n
ced
Met
er
i
n
g
In
fras
t
ru
c
t
u
re
i
n
Smart
G
ri
d
,”
Co
m
m
u
n
i
c
a
t
i
o
n
s
o
n
A
p
p
l
i
e
d
E
l
ec
t
r
o
n
i
cs
(C
A
E
)
,
v
o
l
.
3
,
n
o
.
7
,
N
o
v
2
0
1
5
.
[1
2
]
A
.
A
b
d
a
l
l
a
h
an
d
X
.
Sh
en
,
“
L
i
g
h
t
w
e
i
g
h
t
Secu
r
i
t
y
an
d
Pri
v
ac
y
Pres
erv
i
n
g
Sch
eme
fo
r
Smart
G
ri
d
Cu
s
t
o
mer
-
Si
d
e
N
et
w
o
r
k
s
,”
IE
E
E
Tr
a
n
s
a
c
t
i
o
n
s
o
n
S
m
a
r
t
G
r
i
d
,
v
o
l
.
8
,
n
o
.
3
,
p
p
.
1
0
6
4
-
10
74
,
May
2
0
1
7
.
[1
3
]
I.
Doh
,
et
al
.
,
“
Secu
re
A
u
t
h
en
t
i
ca
t
i
o
n
f
o
r
St
ru
c
t
u
r
ed
S
mart
G
ri
d
Sy
s
t
em
,”
2
0
1
5
9
th
In
t
e
r
n
a
t
i
o
n
a
l
Co
n
f
er
e
n
ce
o
n
In
n
o
va
t
i
ve
M
o
b
i
l
e
a
n
d
In
t
e
r
n
e
t
S
e
r
vi
ce
s
i
n
U
b
i
q
u
i
t
o
u
s
C
o
m
p
u
t
i
n
g
,
p
p
.
2
0
0
-
20
4
,
2
0
1
5
.
[1
4
]
S.
A
fri
n
an
d
S.
Mi
s
h
ra
,
“
A
n
an
o
n
y
mi
ze
d
au
t
h
e
n
t
i
cat
i
o
n
framew
o
r
k
fo
r
s
mar
t
met
er
i
n
g
d
a
t
a
p
ri
v
acy
,”
2
0
1
6
I
E
E
E
P
o
we
r
&
E
n
e
r
g
y
S
o
ci
e
t
y
In
n
o
v
a
t
i
ve
S
m
a
r
t
G
r
i
d
Tech
n
o
l
o
g
i
es
Co
n
f
e
r
en
ce
(I
S
G
T)
,
p
p
.
1
-
5
,
2
0
1
6
.
[1
5
]
D
.
G
h
o
s
h
,
et
al
.
,
“
A
L
i
g
h
t
w
e
i
g
h
t
A
u
t
h
en
t
i
ca
t
i
o
n
Pro
t
o
c
o
l
i
n
Smart
G
ri
d
,”
In
t
e
r
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
Net
w
o
r
k
S
ecu
r
i
t
y
,
v
o
l
.
20
,
n
o
.
3
,
p
p
.
4
1
4
-
4
22
,
May
2
0
1
8
.
[1
6
]
K
.
Mah
mo
o
d
,
et
al
.
,
“
An
el
l
i
p
t
i
c
cu
r
v
e
cry
p
t
o
g
rap
h
y
b
as
ed
l
i
g
h
t
w
ei
g
h
t
au
t
h
en
t
i
ca
t
i
o
n
s
c
h
eme
fo
r
s
mart
g
ri
d
co
mmu
n
i
ca
t
i
o
n
,”
F
u
t
u
r
e
G
e
n
er
a
t
i
o
n
Co
m
p
u
t
e
r
S
ys
t
em
s
,
v
o
l
.
81
,
p
p
.
5
5
7
-
5
65
,
Apr
il
2
0
1
8
.
[1
7
]
Y
.
Ch
en
,
et
al
.
,
“
A
Bi
l
i
n
ear
Map
Pai
ri
n
g
Ba
s
ed
A
u
t
h
en
t
i
ca
t
i
o
n
Sch
eme
fo
r
S
mart
G
ri
d
Co
mm
u
n
i
cat
i
o
n
s
:
PA
u
t
h
,”
IE
E
E
A
cces
s
,
v
o
l
.
7
,
p
p
.
2
2
6
3
3
-
2
2
6
43
,
2
0
1
9
.
[1
8
]
Q
.
Wu
a
n
d
M.
Li
,
“
A
L
i
g
h
t
w
ei
g
h
t
A
u
t
h
en
t
i
ca
t
i
o
n
Pr
o
t
o
c
o
l
f
o
r
Smart
G
ri
d
,”
IO
P
Co
n
f
e
r
en
ce
S
er
i
es
:
E
a
r
t
h
a
n
d
E
n
v
i
r
o
n
m
en
t
a
l
S
ci
e
n
ce
,
v
o
l
.
2
3
4
,
n
o
.
1
,
p
p
.
1
-
6
,
2
0
1
9
.
[1
9
]
P.
G
o
p
e
an
d
B.
Si
k
d
ar
,
“
Pri
v
ac
y
-
A
w
are
A
u
t
h
en
t
i
c
at
ed
K
e
y
A
g
reeme
n
t
Sc
h
eme
fo
r
Secu
re
Smart
G
ri
d
Co
mmu
n
i
ca
t
i
o
n
,”
IE
E
E
Tr
a
n
s
a
c
t
i
o
n
s
o
n
S
m
a
r
t
G
r
i
d
,
v
o
l
.
10
,
n
o
.
4
,
p
p
.
3
9
5
3
-
39
62
,
Jul
y
2
0
1
9
.
[2
0
]
D
.
J
.
Bern
s
t
e
i
n
,
“
C
h
aCh
a,
a
v
ari
a
n
t
o
f
Sa
l
s
a
2
0
,
”
[
O
n
l
i
n
e
]
,
A
v
ai
l
ab
l
e
:
h
t
t
p
s
:
/
/
cr.
y
p
.
t
o
/
ch
ac
h
a/
c
h
ach
a
-
2
0
0
8
0
1
2
0
.
p
d
f
,
2
0
0
8
.
[2
1
]
N
.
Men
g
i
d
i
s
et
a
l
.
,
“
Bl
o
ck
c
h
ai
n
an
d
A
I
fo
r
t
h
e
N
e
x
t
G
en
erat
i
o
n
E
n
e
rg
y
G
ri
d
s
:
C
y
b
er
s
ecu
r
i
t
y
C
h
al
l
en
g
es
an
d
O
p
p
o
r
t
u
n
i
t
i
e
s
,”
In
f
o
r
m
a
t
i
o
n
&
S
ec
u
r
i
t
y:
A
n
In
t
er
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
,
v
o
l
.
43
,
n
o
.
1
,
p
p
.
21
-
33
,
2
0
1
9
.
[2
2
]
W
.
W
an
g
an
d
Z
.
Lu
,
“
Cy
b
er
s
ecu
ri
t
y
i
n
t
h
e
Sm
art
G
ri
d
:
Su
r
v
ey
an
d
ch
al
l
en
g
es
,”
Co
m
p
u
t
er
Net
w
o
r
k
s
,
v
o
l
.
57
,
n
o
.
5
,
p
p
.
1
3
4
4
-
13
71
,
A
p
r
il
2
0
1
3
.
[2
3
]
Z
.
E
l
Mrab
et
,
et
al
.
,
“
Cy
b
er
-
s
ecu
ri
t
y
i
n
s
m
art
g
r
i
d
:
Su
r
v
ey
an
d
ch
a
l
l
e
n
g
es
,”
Co
m
p
u
t
er
s
&
E
l
ect
r
i
c
a
l
E
n
g
i
n
ee
r
i
n
g
,
v
o
l
.
67
,
p
p
.
4
6
9
-
4
82
,
A
p
ri
l
2
0
1
8
.
[2
4
]
W
.
St
al
l
i
n
g
s
,
“
Cry
p
t
o
g
rap
h
y
an
d
N
e
t
w
o
rk
Secu
r
i
t
y
,
”
4
th
E
d
i
t
i
o
n
.
Pren
t
i
ce
H
al
l
,
p
p
.
3
1
0
-
3
1
2
,
2
0
0
5
.
[2
5
]
A
.
A
h
mad
,
et
a
l
.
,
“
Co
mp
ara
t
i
v
e
A
n
a
l
y
s
i
s
o
f
D
i
ffere
n
t
E
n
cry
p
t
i
o
n
T
ec
h
n
i
q
u
es
i
n
Mo
b
i
l
e
A
d
H
o
c
N
e
t
w
o
rk
s
(MA
N
E
T
S)
,”
In
t
er
n
a
t
i
o
n
a
l
j
o
u
r
n
a
l
o
f
Co
m
p
u
t
e
r
Net
w
o
r
ks
&
C
o
m
m
u
n
i
c
a
t
i
o
n
s
(IJCNC)
,
v
o
l
.
8
,
n
o
.
2
,
p
p
.
89
-
1
0
1
,
March
2
0
1
6
.
Evaluation Warning : The document was created with Spire.PDF for Python.