메뉴 건너뛰기




Volumn 7, Issue 3, 2014, Pages 602-610

An anonymous data aggregation scheme for smart grid systems

Author keywords

Batch verification; Multi dimensional data aggregation; Privacy preserving

Indexed keywords

ELECTRIC POWER TRANSMISSION NETWORKS; ENERGY EFFICIENCY; SMART POWER GRIDS;

EID: 84894086739     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.761     Document Type: Article
Times cited : (42)

References (21)
  • 1
    • 77956607253 scopus 로고    scopus 로고
    • Opportunities and challenges of wireless sensor networks in smart grid
    • Gungor V, Lu B, Hancke G. Opportunities and challenges of wireless sensor networks in smart grid. Industrial Electronics, IEEE Transactions on 2010; 57(10):3557-3564.
    • (2010) Industrial Electronics, IEEE Transactions on , vol.57 , Issue.10 , pp. 3557-3564
    • Gungor, V.1    Lu, B.2    Hancke, G.3
  • 2
    • 84894079532 scopus 로고    scopus 로고
    • NIST framework and roadmap for smart grid interoperability standards, release 1.0. Technical Report 1108, National Institute of Standards and Technology
    • NIST framework and roadmap for smart grid interoperability standards, release 1.0. Technical Report 1108, National Institute of Standards and Technology, 2010.
    • (2010)
  • 4
    • 78650124008 scopus 로고    scopus 로고
    • Dynamic pricing and stabilization of supply and demand in modern electric power grids. First IEEE International Conference on Smart Grid Communications, IEEE
    • Roozbehani M, Dahleh M, Mitter S. Dynamic pricing and stabilization of supply and demand in modern electric power grids. First IEEE International Conference on Smart Grid Communications, IEEE, 2010; 543-548.
    • (2010) , pp. 543-548
    • Roozbehani, M.1    Dahleh, M.2    Mitter, S.3
  • 5
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • McDaniel P, McLaughlin S. Security and privacy challenges in the smart grid. Security & Privacy, IEEE 2009; 7(3):75-77.
    • (2009) Security & Privacy, IEEE , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 6
    • 84874319277 scopus 로고    scopus 로고
    • A privacy-preserving acceleration authentication protocol for mobile pay-TV systems
    • doi:10.1002/sec.584.
    • Liu X, Zhang Y. A privacy-preserving acceleration authentication protocol for mobile pay-TV systems. Security and Communication Networks 2012. doi:10.1002/sec.584.
    • (2012) Security and Communication Networks
    • Liu, X.1    Zhang, Y.2
  • 7
    • 78149274300 scopus 로고    scopus 로고
    • AERO: extraction of user's activities from electric power consumption data
    • Cho H, Yamazaki T, Hahn M. AERO: extraction of user's activities from electric power consumption data. Consumer Electronics, IEEE Transactions on 2010; 56(3):2011-2018.
    • (2010) Consumer Electronics, IEEE Transactions on , vol.56 , Issue.3 , pp. 2011-2018
    • Cho, H.1    Yamazaki, T.2    Hahn, M.3
  • 8
    • 34548301953 scopus 로고    scopus 로고
    • PDA: privacy-preserving data aggregation in wireless sensor networks. The 26th IEEE International Conference on Computer Communications, IEEE
    • He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T. PDA: privacy-preserving data aggregation in wireless sensor networks. The 26th IEEE International Conference on Computer Communications, IEEE, 2007; 2045-2053.
    • (2007) , pp. 2045-2053
    • He, W.1    Liu, X.2    Nguyen, H.3    Nahrstedt, K.4    Abdelzaher, T.5
  • 9
    • 51349116601 scopus 로고    scopus 로고
    • Confidentiality protection for distributed sensor data aggregation. The 27th IEEE International Conference on Computer Communications, IEEE
    • Feng T, Wang C, Zhang W, Ruan L. Confidentiality protection for distributed sensor data aggregation. The 27th IEEE International Conference on Computer Communications, IEEE, 2008; 56-60.
    • (2008) , pp. 56-60
    • Feng, T.1    Wang, C.2    Zhang, W.3    Ruan, L.4
  • 10
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation
    • Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. Mobile Computing, IEEE Transactions on 2006; 5(10):1417-1431.
    • (2006) Mobile Computing, IEEE Transactions on , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 11
    • 77953308558 scopus 로고    scopus 로고
    • PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. The 29th IEEE International Conference on Computer Communications, IEEE
    • Shi J, Zhang R, Liu Y, Zhang Y. PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. The 29th IEEE International Conference on Computer Communications, IEEE, 2010; 1-9.
    • (2010) , pp. 1-9
    • Shi, J.1    Zhang, R.2    Liu, Y.3    Zhang, Y.4
  • 12
    • 84864583229 scopus 로고    scopus 로고
    • EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications
    • Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9):1621-1631.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.9 , pp. 1621-1631
    • Lu, R.1    Liang, X.2    Li, X.3    Lin, X.4    Shen, X.5
  • 13
    • 77952053188 scopus 로고    scopus 로고
    • MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks
    • Lin X, Lu R, Shen X. MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Communications and Mobile Computing 2010; 10(6):843-856.
    • (2010) Wireless Communications and Mobile Computing , vol.10 , Issue.6 , pp. 843-856
    • Lin, X.1    Lu, R.2    Shen, X.3
  • 14
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes. The 17th International Conference on Theory and Application of Cryptographic Techniques, Springer
    • Paillier P. Public-key cryptosystems based on composite degree residuosity classes. The 17th International Conference on Theory and Application of Cryptographic Techniques, Springer, 1999; 223-238.
    • (1999) , pp. 223-238
    • Paillier, P.1
  • 15
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing. The 21st Annual International Cryptology Conference on Advances in Cryptology, Springer
    • Boneh D, Franklin M. Identity-based encryption from the Weil pairing. The 21st Annual International Cryptology Conference on Advances in Cryptology, Springer, 2001; 213-229.
    • (2001) , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 16
    • 26444573086 scopus 로고    scopus 로고
    • Two improved partially blind signature schemes from bilinear pairings. The 10th Australasian conference on Information Security and Privacy, Springer
    • Chow S, Hui L, Yiu S, Chow K. Two improved partially blind signature schemes from bilinear pairings. The 10th Australasian conference on Information Security and Privacy, Springer, 2005; 316-328.
    • (2005) , pp. 316-328
    • Chow, S.1    Hui, L.2    Yiu, S.3    Chow, K.4
  • 19
    • 38149121099 scopus 로고    scopus 로고
    • Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. The First International Conference on Pairing-based Cryptography, Springer
    • Delerablée C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. The First International Conference on Pairing-based Cryptography, Springer, 2007; 39-59.
    • (2007) , pp. 39-59
    • Delerablée, C.1    Paillier, P.2    Pointcheval, D.3
  • 20
    • 35048868592 scopus 로고    scopus 로고
    • The security of DSA and ECDSA. Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography, Springer
    • Vaudenay S. The security of DSA and ECDSA. Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography, Springer, 2003; 309-323.
    • (2003) , pp. 309-323
    • Vaudenay, S.1
  • 21
    • 84894024902 scopus 로고    scopus 로고
    • The pairing-based cryptography library.
    • Aitel D. The pairing-based cryptography library. http://crypto.stanford.edu/pbc/
    • Aitel, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.