Next Article in Journal
Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
Next Article in Special Issue
Effective and Privacy-Preserving Estimation of the Density Distribution of LBS Users under Geo-Indistinguishability
Previous Article in Journal
DNN Beamforming for LEO Satellite Communication at Sub-THz Bands
Previous Article in Special Issue
Chatter Detection in Variable Cutting Depth Side Milling Using VMD and Vibration Characteristics Analysis
 
 
Article
Peer-Review Record

Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism

Electronics 2022, 11(23), 3938; https://doi.org/10.3390/electronics11233938
by Yingli Shu 1, Quande Yuan 2,*, Wende Ke 3,* and Lei Kou 4
Reviewer 1: Anonymous
Reviewer 2:
Electronics 2022, 11(23), 3938; https://doi.org/10.3390/electronics11233938
Submission received: 5 November 2022 / Revised: 25 November 2022 / Accepted: 26 November 2022 / Published: 28 November 2022
(This article belongs to the Special Issue Smart Sensing, Monitoring, and Control in Industry 4.0)

Round 1

Reviewer 1 Report

This manuscript presents a new lightweight key generation method that is based on a one-way Hash Function, and the results show reliable results of execution time, which is a good contribution to the work that has been done. When applied to large-scale wind turbines, the model enables lightweight communication between status sensors and regional gateways. It is anticipated that the authentication process for status sensors can be made more swift and reliable. Some of my thoughts are included below.

 

1.     We need to have some additional information about the other works that might be using some promising approach to solving similar problems in wind power monitoring system in the sections devoted to related work. This is because we need to include those works in the related work sections for comparison purpose.

2.     The one-way hash function that is used in the generation of lightweight keys requires further elaboration.

 3.     The lightweight key generation that has been proposed is quick, but how can it possibly be secure? Including some security tests in the process allows you to verify the system's safety.

4.     Additional explanation is required for Table 1. Please explain how the proposed method is verified in terms of its "resistance against private key disclosure camouflage attack."

 

5.     In addition to this, I think it would be beneficial to include some scientific discussion regarding the agile authentication model.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

Abstract: Average/ need more clarity (still problem statement are not clear to me)

Keywords: Good

Introduction: Average

Literature Review: Average

Data Set: Average

Methodology: Weak/ please verify mathematical expression of the proposed method

Caption, Citations & Footnotes: Good

Pictures, graphs & Flowcharts: Average

Results: Weak/required more results

Conclusion: Average

Future Work: Poor

References: Average

 

----------- Overall evaluation -----------

This paper presents a security access control method for wind power monitoring system based on agile authentication mechanism.

 

Suggestion and Recommendation:

1. In the introduction, the scientific problem of the existed evaluation is missing. It should be elucidated clearly.

2 (a). Please improve introduction section. And so, discard extra details which is not related to the proposed work.

2 (b). At the end of the introduction, it is recommended to clearly state the research goal/objectives of this study and what the authors have done to address the identified research problem/section description. Remove extra description which is not relevant to your proposed system

3. The authors should be rechecking the grammatical errors and typos issues in the complete manuscript.

4. The presented diagram should be modified, try to define more. For example, explain sequences of operational execution (data movement), especially in Figures, such as Figure 1, 2, and 3. Till now, it is very complex to analyze.

5. I suggest you explore more open research issues in this domain and add at least 4-6 open areas that need experts’ consideration.

6. Reference format must be uniform.

Authors are encouraged to base on recent references about security access control method for wind power monitoring system based on agile authentication mechanism using artificial intelligence, such machine learning, deep learning, with blockchain distributed technology.

Please improve contribution section along with distribution section as well.

8. In methodology, only a single algorithm presented to demonstrate the working operation? authors should be clarifying the events of execution (one-by-one) for the whole process? Please elaborate.

9. The experiments should be expanded including more analysis and comparisons with other indexes/baselines and compare your proposed method with newly state-of-the-art methods.

10. The topic is very good and unique but need to improve paper organization.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

All the comments are properly addressed. I believe that this version will be accepted.

Thanks for your efforts.

Back to TopTop