메뉴 건너뛰기




Volumn 23, Issue 9, 2012, Pages 1621-1632

EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications

Author keywords

multidimensional aggregation; privacy preserving; security; Smart grid

Indexed keywords

AGGREGATION SCHEMES; AUTHENTICATION COST; BATCH VERIFICATION; CIPHERTEXTS; COMMUNICATION OVERHEADS; DATA AGGREGATION; DATA-COMMUNICATION; INFORMATION AND COMMUNICATION TECHNOLOGIES; MULTIDIMENSIONAL DATA; OPERATION CENTER; PAILLIER CRYPTOSYSTEM; POWER GRIDS; PRIVACY PRESERVING; SECURITY; SECURITY THREATS; SMART GRID; STRUCTURED DATA; TRADITIONAL POWER SYSTEM; USER PRIVACY;

EID: 84864583229     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.86     Document Type: Article
Times cited : (719)

References (26)
  • 1
    • 84864607418 scopus 로고    scopus 로고
    • "Blackout 2003," http://www.ieso. ca/imoweb/EmergencyPrep/ blackout2003, 2012.
    • (2012) Blackout 2003
  • 2
    • 79956357124 scopus 로고    scopus 로고
    • Challenges and opportunities in smart grid: A position article
    • June
    • G. W. Arnold, "Challenges and Opportunities in Smart Grid: A Position Article," Proc. IEEE, vol. 99, no. 6, pp. 922-927, June 2011.
    • (2011) Proc. IEEE , vol.99 , Issue.6 , pp. 922-927
    • Arnold, G.W.1
  • 4
    • 77955696530 scopus 로고    scopus 로고
    • A reliability perspective of the smart grid
    • June
    • K. Moslehi and R. Kumar, "A Reliability Perspective of the Smart Grid," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 57-64, June 2010.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 57-64
    • Moslehi, K.1    Kumar, R.2
  • 5
    • 79953788803 scopus 로고    scopus 로고
    • Machine-To-machine communications for home energy management system in smart grid
    • Apr.
    • D. Niyato, L. Xiao, and P. Wang, "Machine-To-Machine Communications for Home Energy Management System in Smart Grid," IEEE Comm. Magazine, vol. 49, no. 4, pp. 53-59, Apr. 2011.
    • (2011) IEEE Comm. Magazine , vol.49 , Issue.4 , pp. 53-59
    • Niyato, D.1    Xiao, L.2    Wang, P.3
  • 7
    • 84861608803 scopus 로고    scopus 로고
    • Towards optimal energy store-carry-And-deliver for phevs via v2g system
    • Mar.
    • H. Liang, B. Choi, W. Zhuang, and X. Shen, "Towards Optimal Energy Store-Carry-And-Deliver for Phevs Via v2g System," Proc. IEEE INFOCOM '12, pp. 25-30, Mar. 2012.
    • (2012) Proc. IEEE INFOCOM '12 , pp. 25-30
    • Liang, H.1    Choi, B.2    Zhuang, W.3    Shen, X.4
  • 8
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • May/June
    • P. McDaniel and S. McLaughlin, "Security and Privacy Challenges in the Smart Grid," IEEE Security & Privacy, vol. 7, no. 3, pp. 75-77, May/June 2009.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 9
    • 80053528646 scopus 로고    scopus 로고
    • An early warning system against malicious activities for smart grid communications
    • Sept./Oct.
    • Z. M. Fadlullah, M. M. Fouda, X. Shen, Y. Nozaki, and N. Kato, "An Early Warning System Against Malicious Activities for Smart Grid Communications," IEEE Network Magazine, vol. 25, no. 5, pp. 50-55, Sept./Oct. 2011.
    • (2011) IEEE Network Magazine , vol.25 , Issue.5 , pp. 50-55
    • Fadlullah, Z.M.1    Fouda, M.M.2    Shen, X.3    Nozaki, Y.4    Kato, N.5
  • 10
    • 82155185209 scopus 로고    scopus 로고
    • A light-weight message authentication scheme for smart grid communications
    • Dec.
    • M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. Shen, "A Light-Weight Message Authentication Scheme for Smart Grid Communications," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675-685, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 675-685
    • Fouda, M.M.1    Fadlullah, Z.M.2    Kato, N.3    Lu, R.4    Shen, X.5
  • 11
    • 79957710498 scopus 로고    scopus 로고
    • A dependency graph approach for fault detection and localization towards secure smart grid
    • June
    • M. He and J. Zhang, "A Dependency Graph Approach for Fault Detection and Localization towards Secure Smart Grid," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 342-351, June 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 342-351
    • He, M.1    Zhang, J.2
  • 12
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • June
    • Y. Yuan, Z. Li, and K. Ren, "Modeling Load Redistribution Attacks in Power Systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, June 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 382-390
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 13
    • 79953785474 scopus 로고    scopus 로고
    • Grs: The green, reliability, and security of emerging machine to machine communications
    • Apr.
    • R. Lu, X. Li, X. Lin, X. Liang, and X. Shen, "GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications," IEEE Comm. Magazine, vol. 49, no. 4, pp. 28-35, Apr. 2011.
    • (2011) IEEE Comm. Magazine , vol.49 , Issue.4 , pp. 28-35
    • Lu, R.1    Li, X.2    Lin, X.3    Liang, X.4    Shen, X.5
  • 15
    • 67651030465 scopus 로고    scopus 로고
    • Efficient and provably secure aggregation of encrypted data in wireless sensor networks
    • article 20
    • C. Castelluccia, A. C.-F. Chan, E. Mykletun, and G. Tsudik, "Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks," Trans. Sensor Networks, vol. 5, no. 3, article 20, 2009.
    • (2009) Trans. Sensor Networks , vol.5 , Issue.3
    • Castelluccia, C.1    Chan, A.C.-F.2    Mykletun, E.3    Tsudik, G.4
  • 16
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • DOI 10.1109/TMC.2006.144, 1683790
    • D. Westhoff, J. Girao, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006. (Pubitemid 44335247)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 17
    • 77953308558 scopus 로고    scopus 로고
    • Prisense: Privacy-preserving data aggregation in people-centric urban sensing systems
    • J. Shi, R. Zhang, Y. Liu, and Y. Zhang, "Prisense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems," Proc. IEEE INFOCOM, pp. 758-766, 2010.
    • (2010) Proc. IEEE INFOCOM , pp. 758-766
    • Shi, J.1    Zhang, R.2    Liu, Y.3    Zhang, Y.4
  • 18
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. K. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 213-229, 2001. (Pubitemid 33317917)
    • (2001) Lecture notes in computer science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 19
    • 70350675296 scopus 로고    scopus 로고
    • Privacy-preserving tuple matching in distributed databases
    • Dec.
    • Y. Sang, H. Shen, and H. Tian, "Privacy-Preserving Tuple Matching in Distributed Databases," IEEE Trans. Knowledge and Data Eng., vol. 21, no. 12, pp. 1767-1782, Dec. 2009.
    • (2009) IEEE Trans. Knowledge and Data Eng. , vol.21 , Issue.12 , pp. 1767-1782
    • Sang, Y.1    Shen, H.2    Tian, H.3
  • 20
    • 33750333499 scopus 로고    scopus 로고
    • Privacy-preserving algorithms for distributed mining of frequent itemsets
    • DOI 10.1016/j.ins.2006.08.010, PII S0020025506002441
    • S. Zhong, "Privacy-Preserving Algorithms for Distributed Mining of Frequent Itemsets," Information Sciences, vol. 177, no. 2, pp. 490-503, 2007. (Pubitemid 44634455)
    • (2007) Information Sciences , vol.177 , Issue.2 , pp. 490-503
    • Zhong, S.1
  • 21
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • DOI 10.1007/s00145-004-0314-9
    • D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," J. Cryptology, vol. 17, no. 4, pp. 297-319, 2004. (Pubitemid 41201461)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 22
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," Proc. ACM Conf. Computer and Comm. Security, pp. 62-73, 1993.
    • (1993) Proc. ACM Conf. Computer and Comm. Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 23
    • 38149054118 scopus 로고    scopus 로고
    • B. Lynn, "PBC Library," http://crypto. stanford.edu/pbc/, 2012.
    • (2012) PBC Library
    • Lynn, B.1
  • 26
    • 77952053188 scopus 로고    scopus 로고
    • Mdpa: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks
    • X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 10, no. 6, pp. 843-856, 2010.
    • (2010) Wireless Comm. and Mobile Computing , vol.10 , Issue.6 , pp. 843-856
    • Lin, X.1    Lu, R.2    Shen, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.