Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism
Round 1
Reviewer 1 Report
This manuscript presents a new lightweight key generation method that is based on a one-way Hash Function, and the results show reliable results of execution time, which is a good contribution to the work that has been done. When applied to large-scale wind turbines, the model enables lightweight communication between status sensors and regional gateways. It is anticipated that the authentication process for status sensors can be made more swift and reliable. Some of my thoughts are included below.
1. We need to have some additional information about the other works that might be using some promising approach to solving similar problems in wind power monitoring system in the sections devoted to related work. This is because we need to include those works in the related work sections for comparison purpose.
2. The one-way hash function that is used in the generation of lightweight keys requires further elaboration.
3. The lightweight key generation that has been proposed is quick, but how can it possibly be secure? Including some security tests in the process allows you to verify the system's safety.
4. Additional explanation is required for Table 1. Please explain how the proposed method is verified in terms of its "resistance against private key disclosure camouflage attack."
5. In addition to this, I think it would be beneficial to include some scientific discussion regarding the agile authentication model.
Author Response
Please see the attachment.
Author Response File: Author Response.pdf
Reviewer 2 Report
Abstract: Average/ need more clarity (still problem statement are not clear to me)
Keywords: Good
Introduction: Average
Literature Review: Average
Data Set: Average
Methodology: Weak/ please verify mathematical expression of the proposed method
Caption, Citations & Footnotes: Good
Pictures, graphs & Flowcharts: Average
Results: Weak/required more results
Conclusion: Average
Future Work: Poor
References: Average
----------- Overall evaluation -----------
This paper presents a security access control method for wind power monitoring system based on agile authentication mechanism.
Suggestion and Recommendation:
1. In the introduction, the scientific problem of the existed evaluation is missing. It should be elucidated clearly.
2 (a). Please improve introduction section. And so, discard extra details which is not related to the proposed work.
2 (b). At the end of the introduction, it is recommended to clearly state the research goal/objectives of this study and what the authors have done to address the identified research problem/section description. Remove extra description which is not relevant to your proposed system
3. The authors should be rechecking the grammatical errors and typos issues in the complete manuscript.
4. The presented diagram should be modified, try to define more. For example, explain sequences of operational execution (data movement), especially in Figures, such as Figure 1, 2, and 3. Till now, it is very complex to analyze.
5. I suggest you explore more open research issues in this domain and add at least 4-6 open areas that need experts’ consideration.
6. Reference format must be uniform.
Authors are encouraged to base on recent references about security access control method for wind power monitoring system based on agile authentication mechanism using artificial intelligence, such machine learning, deep learning, with blockchain distributed technology.
Please improve contribution section along with distribution section as well.
8. In methodology, only a single algorithm presented to demonstrate the working operation? authors should be clarifying the events of execution (one-by-one) for the whole process? Please elaborate.
9. The experiments should be expanded including more analysis and comparisons with other indexes/baselines and compare your proposed method with newly state-of-the-art methods.
10. The topic is very good and unique but need to improve paper organization.
Author Response
Please see the attachment.
Author Response File: Author Response.pdf
Round 2
Reviewer 2 Report
All the comments are properly addressed. I believe that this version will be accepted.
Thanks for your efforts.