메뉴 건너뛰기




Volumn 73, Issue 1, 2013, Pages 23-50

Towards privacy protection in smart grid

Author keywords

Authentication; Confidentiality; Energy; Privacy; Smart grid

Indexed keywords

CONFIDENTIALITY; ENERGY; IMPLEMENTATION COMPLEXITY; INFORMATION COMMUNICATION TECHNOLOGY; KEY CHARACTERISTICS; SENSITIVE INFORMATIONS; SMART GRID; SMART GRID TECHNOLOGIES;

EID: 84886601284     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-012-0939-1     Document Type: Article
Times cited : (79)

References (69)
  • 1
    • 0037377597 scopus 로고    scopus 로고
    • SCADA and IP: Is network convergence really here?
    • 10.1109/MIA.2003.1180947
    • McClanahan R. (2003) SCADA and IP: Is network convergence really here?. IEEE Industry Applications Magazine 9(2): 29-36
    • (2003) IEEE Industry Applications Magazine , vol.9 , Issue.2 , pp. 29-36
    • McClanahan, R.1
  • 2
    • 61449229394 scopus 로고    scopus 로고
    • The evolution of distribution
    • 10.1109/MPE.2008.931392
    • Fan J.; Borlase S. (2009) The evolution of distribution. IEEE Power and Energy Magazine 7(2): 63-68
    • (2009) IEEE Power and Energy Magazine , vol.7 , Issue.2 , pp. 63-68
    • Fan, J.1    Borlase, S.2
  • 3
    • 73649137161 scopus 로고    scopus 로고
    • The path of the smart grid
    • 2668452 10.1109/MPE.2009.934876
    • Farhangi H. (2010) The path of the smart grid. IEEE Power and Energy Magazine 8(1): 18-28
    • (2010) IEEE Power and Energy Magazine , vol.8 , Issue.1 , pp. 18-28
    • Farhangi, H.1
  • 4
    • 84957457736 scopus 로고    scopus 로고
    • NIST framework and roadmap for smart grid interoperability standards, release 2.0
    • NIST February 2012
    • NIST. (2012). NIST framework and roadmap for smart grid interoperability standards, release 2.0. NIST Special Publication 1108R2, February 2012.
    • (2012) NIST Special Publication 1108R2
  • 5
    • 84881432525 scopus 로고    scopus 로고
    • New electricity grids may be smart
    • 18 May 2010 (last accessed 2 Oct 2012)
    • Mark, J. (2010). New electricity grids may be smart, but not so private - The Denver post. 18 May 2010. Available at: http://www.denverpost.com/business/ ci-15106430 (last accessed 2 Oct 2012).
    • (2010) But Not so Private - The Denver Post
    • Mark, J.1
  • 6
    • 84886590232 scopus 로고    scopus 로고
    • Advanced metering infrastructure, white paper
    • U.S. Department of Energy February 2008 (last accessed 2 Oct 2012)
    • U.S. Department of Energy. (2008). Advanced metering infrastructure, white paper. NETL Modern Grid Strategy Powering our 21st-Century Economy, February 2008. Available at: http://www.netl.doe.gov/smartgrid/referenceshelf/ whitepapers/AMI%20White%20paper%20final%20021108%20%282%29%20APPROVED-2008-02- 12.pdf (last accessed 2 Oct 2012).
    • (2008) NETL Modern Grid Strategy Powering Our 21st-Century Economy
  • 7
    • 84886582209 scopus 로고    scopus 로고
    • Assessment of demand response & advanced metering
    • Federal Energy Regulatory Commission (last accessed 2 Oct 2012)
    • Federal Energy Regulatory Commission. (2008). Assessment of demand response & advanced metering. Staff Report, December 2008. Available at: http://www.ferc.gov/legal/staff-reports/demand-response.pdf (last accessed 2 Oct 2012).
    • (2008) Staff Report, December 2008
  • 8
    • 27744595750 scopus 로고    scopus 로고
    • Toward a smart grid: Power delivery for the 21st century
    • 10.1109/MPAE.2005.1507024
    • Massoud A.; Wollenberg B. (2005) Toward a smart grid: Power delivery for the 21st century. IEEE Power and Energy Magazine 3(5): 34-41
    • (2005) IEEE Power and Energy Magazine , vol.3 , Issue.5 , pp. 34-41
    • Massoud, A.1    Wollenberg, B.2
  • 9
    • 79951648231 scopus 로고    scopus 로고
    • Review and evaluation of security threats on the communication networks in the smart grid
    • Lu, Z.; Lu, X.; Wang, W.; Wang, C. (2010). Review and evaluation of security threats on the communication networks in the smart grid. In Proceedings of IEEE military communications conference (pp. 1830-1835).
    • (2010) Proceedings of IEEE Military Communications Conference , pp. 1830-1835
    • Lu, Z.1    Lu, X.2    Wang, W.3    Wang, C.4
  • 11
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • 10.1109/MSP.2009.76
    • McDaniel P.; McLaughlin S. (2009) Security and privacy challenges in the smart grid. IEEE Security and Privacy 7(3): 75-77
    • (2009) IEEE Security and Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 13
    • 47649131946 scopus 로고    scopus 로고
    • Who are you? The trade-off between information utility and privacy
    • 10.1109/MIC.2008.91
    • Miller J. (2008) Who are you? The trade-off between information utility and privacy. IEEE Internet Computing 12(4): 93-96
    • (2008) IEEE Internet Computing , vol.12 , Issue.4 , pp. 93-96
    • Miller, J.1
  • 14
    • 57049121693 scopus 로고    scopus 로고
    • Who are you, part II: More on the trade-off between information utility and privacy
    • 10.1109/MIC.2008.135
    • Miller J. (2008) Who are you, part II: More on the trade-off between information utility and privacy. IEEE Internet Computing 12(6): 91-93
    • (2008) IEEE Internet Computing , vol.12 , Issue.6 , pp. 91-93
    • Miller, J.1
  • 15
    • 0002377195 scopus 로고
    • Personality correlates of privacy
    • 10.1080/00223980.1982.9923528
    • Pedersen D. (1982) Personality correlates of privacy. Journal of Psychology 112: 11-14
    • (1982) Journal of Psychology , vol.112 , pp. 11-14
    • Pedersen, D.1
  • 17
    • 84855924342 scopus 로고    scopus 로고
    • International Energy Agency (last accessed 2 Oct 2012)
    • International Energy Agency. (2011). Technology roadmap: Smart grids. International Energy Agency, April 2011. Available at: http://www.iea.org/ papers/2011/smartgrids-roadmap.pdf (last accessed 2 Oct 2012).
    • (2011) Technology Roadmap: Smart Grids. International Energy Agency
  • 19
    • 0036870154 scopus 로고    scopus 로고
    • Privacy for telecom services
    • 10.1109/MIC.2002.978364
    • Singh M. (2002) Privacy for telecom services. IEEE Internet Computing 6(1): 4-5
    • (2002) IEEE Internet Computing , vol.6 , Issue.1 , pp. 4-5
    • Singh, M.1
  • 22
    • 84857223714 scopus 로고    scopus 로고
    • Credential-based privacy - Preserving power request scheme for smart grid network
    • Cheung, J.; Chim, T.; Yiu, S.; Li, V. (2011). Credential-based privacy - preserving power request scheme for smart grid network. In IEEE Global telecommunications conference (pp. 1-5).
    • (2011) IEEE Global Telecommunications Conference , pp. 1-5
    • Cheung, J.1    Chim, T.2    Yiu, S.3    Li, V.4
  • 27
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • 32133 10.1002/j.1538-7305.1949.tb00928.x
    • Shannon C. (1949) Communication theory of secrecy systems. Bell System Technical Journal 28(4): 656-715
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 29
    • 84893899081 scopus 로고    scopus 로고
    • Toshiba Inc. (last accessed 2 Oct 2012)
    • Toshiba Inc. (2012). Solar power generation. Available at http://www.toshiba.co.jp/env/en/energy/solar.htm (last accessed 2 Oct 2012).
    • (2012) Solar Power Generation
  • 30
    • 84886601600 scopus 로고    scopus 로고
    • Toshiba Inc. (last accessed 2 Oct 2012)
    • Toshiba Inc. (2012). Super-charge ion battery (SCiB^TM). Available at: http://www.toshiba.com/ind/product-display.jsp?id1=821 (last accessed 2 Oct 2012).
    • (2012) Super-charge Ion Battery (SCiB^TM)
  • 42
    • 84864583229 scopus 로고    scopus 로고
    • EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
    • Lu, R.; Liang, X.; Li, X.; Lin, X.; Shen, X. (2012). EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1621-1631.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.9 , pp. 1621-1631
    • Lu, R.1    Liang, X.2    Li, X.3    Lin, X.4    Shen, X.5
  • 43
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Berlin: Springer
    • Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypyt (Lecture Notes in Computer Science), Vol. 1592 (pp. 223-238). Berlin: Springer.
    • (1999) Proceedings of Eurocrypyt (Lecture Notes in Computer Science) , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 48
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • Westhoff, D.; Girao, J.; Acharya, M. (2006). Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing, 5(10), 1417-1431.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 49
    • 77953308558 scopus 로고    scopus 로고
    • PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems
    • Shi, J.; Zhang, R.; Liu, Y.; Zhang, Y. (2010). PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems. In Proceedings of IEEE INFOCOM (pp. 1-9).
    • (2010) Proceedings of IEEE INFOCOM , pp. 1-9
    • Shi, J.1    Zhang, R.2    Liu, Y.3    Zhang, Y.4
  • 51
    • 0042432064 scopus 로고    scopus 로고
    • Performance analysis of a generic proxy-based client-server system for World-Wide Web services using a generalized Markov chain model
    • Veeravalli B. (2003) Performance analysis of a generic proxy-based client-server system for World-Wide Web services using a generalized Markov chain model. Journal of High Speed Networks 12(3-4): 111-131
    • (2003) Journal of High Speed Networks , vol.12 , Issue.3-4 , pp. 111-131
    • Veeravalli, B.1
  • 56
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • 10.1023/A:1016598314198
    • Perrig A.; Szewczyk R.; Wen V.; Culler D.; Tygar J. (2002) SPINS: Security protocols for sensor networks. Wireless Networks 8(5): 521-534
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Wen, V.3    Culler, D.4    Tygar, J.5
  • 58
    • 84886597620 scopus 로고    scopus 로고
    • Electricity grid in U.S. Penetrated by spies
    • Gorman, S. (2009) Electricity grid in U.S. Penetrated by spies. The Wall Street Journal.
    • (2009) The Wall Street Journal
    • Gorman, S.1
  • 60
    • 79954605963 scopus 로고    scopus 로고
    • National Institute of Standards and Technology Cyber Security Working Group, NISTIR 7628, August 2010 (last accessed 10 Nov 2012)
    • National Institute of Standards and Technology. (2010). Guidelines for Smart grid cyber security: Privacy and the smart grid, Vol. 2. Cyber Security Working Group, NISTIR 7628, August 2010. Available at: http://csrc.nist.gov/ publications/nistir/ir7628/nistir-7628-vol2.pdf (last accessed 10 Nov 2012).
    • (2010) Guidelines for Smart Grid Cyber Security: Privacy and the Smart Grid , vol.2
  • 61
    • 84886591534 scopus 로고    scopus 로고
    • U.S. Department of Energy December 10, 2009 (last accessed 2 Oct 2012)
    • U.S. Department of Energy. (2009). DOE awards $620 million for ARRA 'Smart Grid' pilot projects, December 10, 2009. Available at: bx.businessweek.com/smart-grid/ (last accessed 2 Oct 2012).
    • (2009) DOE Awards $620 Million for ARRA 'Smart Grid' Pilot Projects
  • 64
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous Web transactions with crowds
    • 10.1145/293411.293778
    • Reiter M.; Rubin A. (1999) Anonymous Web transactions with crowds. Communications of the ACM 42(2): 32-48
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-48
    • Reiter, M.1    Rubin, A.2
  • 66
    • 34548310311 scopus 로고    scopus 로고
    • Protecting receiver-location privacy in wireless sensor networks
    • Anchorage, AK
    • Jian, Y.; Chen, S.; Zhang, Z.; Zhang, L. (2007). Protecting receiver-location privacy in wireless sensor networks. In Proceedings of Infocom 2007, Anchorage, AK (pp. 1955-1963).
    • (2007) Proceedings of Infocom 2007 , pp. 1955-1963
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 67
    • 80455173432 scopus 로고    scopus 로고
    • Enhance data privacy in service compositions through a privacy proxy
    • Vienna, Austria
    • Ma, Z.; Manglery, J.; Wagner, C.; Bleier, T. (2011). Enhance data privacy in service compositions through a privacy proxy. In Proceedings of ARES 2011, Vienna, Austria (pp. 615-620).
    • (2011) Proceedings of ARES 2011 , pp. 615-620
    • Ma, Z.1    Manglery, J.2    Wagner, C.3    Bleier, T.4
  • 68
    • 84860860164 scopus 로고    scopus 로고
    • Do not snoop my habits: Preserving privacy in the smart grid
    • 10.1109/MCOM.2012.6194398
    • Marmol F.; Sorge C.; Ugus O.; Perez G. (2012) Do not snoop my habits: Preserving privacy in the smart grid. IEEE Communications Magazine 50(5): 166-172
    • (2012) IEEE Communications Magazine , vol.50 , Issue.5 , pp. 166-172
    • Marmol, F.1    Sorge, C.2    Ugus, O.3    Perez, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.