1. [1] M. R. Asghar, G. Dan, D. Miorandi, and I. Chlamtac, "Smart Meter Data Privacy: A Survey," IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2820-2835, 2017. [
DOI:10.1109/COMST.2017.2720195]
2. [2] G. R. Barai, S. Krishnan, and B. Venkatesh, "Smart metering and functionalities of smart meters in smart grid-a review," IEEE Electrical Power and Energy Conference (EPEC), 2015. [
DOI:10.1109/EPEC.2015.7379940]
3. [3] S. Nimbargi, S. Mhaisne, S. Nangare, and M. Sinha, "Review on AMI technology for Smart Meter," 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), 2016. [
DOI:10.1109/ICAECCT.2016.7942549]
4. [4] K. Deepak and K. Chandrasekaran, "Investigating Elliptic Curve Cryptography for Securing Smart Grid Environments", Third ISEA Conference on Security and Privacy (ISEA-ISAP), 2020. [
DOI:10.1109/ISEA-ISAP49340.2020.234993]
5. [5] J. Zheng, D. W. Gao, and L. Lin, "Smart Meters in Smart Grid: An Overview," IEEE Green Technologies Conference (GreenTech), 2013.
6. [6] S. Kumar, H. Kumar, and G. R. Gunnam, "Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack," 2019 2nd International Conference on Data Intelligence and Security (ICDIS), 2019. [
DOI:10.1109/ICDIS.2019.00009]
7. [7] A. Albalawi, A. Almrshed, A. Badhib, and S. Alshehri, "A Survey on Authentication Techniques for the Internet of Things", International Conference on Computer and Information Sciences (ICCIS), 2019. [
DOI:10.1109/ICCISci.2019.8716401]
8. [8] RFID Forecasts, Players and Opportunities, IDTechEx, 2020.
9. [9] X. Lin, R. Lu, D. Kwan, and X. S. Shen, "REACT: an RFIDbased privacy-preserving children tracking scheme for large amusement parks," Computer Networks, vol. 54, no. 15, pp. 2744-2755, 2010. [
DOI:10.1016/j.comnet.2010.05.005]
10. [10] D. C. Wyld, "Preventing the "worst case scenario:" combating the lost laptop epidemic with RFID technology," Novel Algorithms and Techniques in Telecommunications and Networking, pp. 29-33, Springer, 2010. [
DOI:10.1007/978-90-481-3662-9_5]
11. [11] S. W. Wang, W. H. Chen, C. S. Ong, L. Liu, and Y. W. Chuang, "RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital," in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006.
12. [12] M. M. Perez, M. Cabrero-Canosa, J. V. Hermida et al., "Application of RFID technology in patient tracking and medication traceability in emergency care," Journal of Medical Systems, vol. 36, no. 6, pp. 3983-3993, 2012. [
DOI:10.1007/s10916-012-9871-x]
13. [13] J. E. Katz and R. E. Rice, "Public views of mobile medical devices and services: a US national survey of consumer sentiments towards RFID healthcare technology," International Journal of Medical Informatics, vol. 78, no. 2, pp. 104-114, 2009. [
DOI:10.1016/j.ijmedinf.2008.06.001]
14. [14] A. Ohsaga and K. Kondoh, "Bedside medication safety management system using a PDA and RFID tags," in 2013 7th International Symposium on Medical Information and Communication Technology (ISMICT), pp. 85-89, Tokyo, Japan, 2013. [
DOI:10.1109/ISMICT.2013.6521705]
15. [15] Y. T. Liao, T. L. Chen, T. S. Chen, Z. H. Zhong, and J. H. Hwang, "The application of RFID to healthcare management of nursing house," Wireless Personal Communications, vol. 91, no. 3, pp. 1237-1257, 2016. [
DOI:10.1007/s11277-016-3525-0]
16. [16] K. Fan, W. Jiang, H. Li, and Y. Yang, "Lightweight RFID protocol for medical privacy protection in IoT," IEEE Transactions on Industrial Informatics, vol. 14, pp. 1656-1665, 2018. [
DOI:10.1109/TII.2018.2794996]
17. [17] S. Anandhi, R. Anitha, and V. Sureshkumar, "IoT enabled RFID authentication and secure object tracking system for smart logistics," Wireless Personal Communications, vol. 104, no. 2, pp. 543-560, 2019. [
DOI:10.1007/s11277-018-6033-6]
18. [18] Y. K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol," in 2008 IEEE international conference on RFID, pp. 97-104, Las Vegas, NV, USA, 2008. [
DOI:10.1109/RFID.2008.4519370]
19. [19] R. Want, "An introduction to RFID technology," IEEE Pervasive Computing, vol. 5, no. 1, pp. 25-33, 2006. [
DOI:10.1109/MPRV.2006.2]
20. [20] H. Lamrani Alaoui, A. El Ghazi, M. Zbakh, A. Touhafi, and A. Braeken, "A Highly Efficient ECC-Based Authentication Protocol for RFID," Journal of Sensors, 2021. [
DOI:10.1155/2021/8876766]
21. [21] M. Alshahrani and I. Traore, "Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain," Journal of Information Security and Applications, no. 45, pp.156-175, 2019. [
DOI:10.1016/j.jisa.2019.02.003]
22. [22] F. Li, B. Luo, and P. Liu, "Secure Information Aggregation for Smart Grids Using Homomorphic Encryption," 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, pp. 327-332, 2010. [
DOI:10.1109/SMARTGRID.2010.5622064]
23. [23] P. Bhanse, B. Mishra, and D. Jena, "A Novel Smart Meter Authentication Scheme for Secure Smart Grid Communication," 2019 IEEE Region 10 Conference (TENCON), 2019. [
DOI:10.1109/TENCON.2019.8929367]
24. [24] A. Madhu and P. Prajeesha, "Prevention of FDI Attacks in Smart Meter by providing Multi-Layer Authentication using ElGamal and SHA," 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), 2021. [
DOI:10.1109/ICCMC51019.2021.9418464]