메뉴 건너뛰기




Volumn 7, Issue 1, 2014, Pages 206-220

On preserving user privacy in Smart Grid advanced metering infrastructure applications

Author keywords

AMI applications; Data concatenation; Homomorphic encryption; Hop by hop aggregation; User privacy

Indexed keywords

ADVANCED METERING INFRASTRUCTURES; CRYPTOGRAPHY; ELECTRIC POWER TRANSMISSION NETWORKS; ELECTRIC POWER UTILIZATION; NETWORK SECURITY; SMART POWER GRIDS;

EID: 84894094066     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.706     Document Type: Article
Times cited : (42)

References (33)
  • 1
    • 52349119748 scopus 로고    scopus 로고
    • Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, doi:10.1109/PES.2008.4596535.
    • Cleveland F. Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, 2008; 1-5. doi:10.1109/PES.2008.4596535.
    • (2008) , pp. 1-5
    • Cleveland, F.1
  • 2
    • 0026970695 scopus 로고
    • Nonintrusive appliance load monitoring
    • doi:10.1109/5.192069.
    • Hart G. Nonintrusive appliance load monitoring. Proceedings of the IEEE 1992; 80(12):1870-1891. doi:10.1109/5.192069.
    • (1992) Proceedings of the IEEE , vol.80 , Issue.12 , pp. 1870-1891
    • Hart, G.1
  • 3
    • 84894062853 scopus 로고    scopus 로고
    • Privacy and the new energy infrastructure. Social Science Research Network (SSRN), February.
    • Quinn E. Privacy and the new energy infrastructure. Social Science Research Network (SSRN), February 2009.
    • (2009)
    • Quinn, E.1
  • 5
    • 80051646795 scopus 로고    scopus 로고
    • Smart grid privacy via anonymization of smart metering data. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), doi:10.1109/SMARTGRID.2010.5622050.
    • Efthymiou C, Kalogridis G. Smart grid privacy via anonymization of smart metering data. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 238-243. doi:10.1109/SMARTGRID.2010.5622050.
    • (2010) , pp. 238-243
    • Efthymiou, C.1    Kalogridis, G.2
  • 7
    • 77954893607 scopus 로고    scopus 로고
    • A privacy model for smart metering. 2010 IEEE International Conference on Communications Workshops (ICC), doi:10.1109/ICCW.2010.5503916.
    • Bohli JM, Sorge C, Ugus O. A privacy model for smart metering. 2010 IEEE International Conference on Communications Workshops (ICC), 2010; 1-5. doi:10.1109/ICCW.2010.5503916.
    • (2010) , pp. 1-5
    • Bohli, J.M.1    Sorge, C.2    Ugus, O.3
  • 8
    • 80051651344 scopus 로고    scopus 로고
    • Privacy for smart meters: towards undetectable appliance load signatures. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), doi:10.1109/SMARTGRID.2010.5622047.
    • Kalogridis G, Efthymiou C, Denic S, Lewis T, Cepeda R. Privacy for smart meters: towards undetectable appliance load signatures. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 232-237. doi:10.1109/SMARTGRID.2010.5622047.
    • (2010) , pp. 232-237
    • Kalogridis, G.1    Efthymiou, C.2    Denic, S.3    Lewis, T.4    Cepeda, R.5
  • 9
    • 80051653423 scopus 로고    scopus 로고
    • Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage. ICASSP, IEEE, URL
    • Varodayan DP, Khisti A. Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage. ICASSP, IEEE, 2011; 1932-1935. URL http://dblp.uni-trier.de/db/conf/icassp/icassp2011.htmlVarodayanK11.
    • (2011) , pp. 1932-1935
    • Varodayan, D.P.1    Khisti, A.2
  • 12
    • 84894084566 scopus 로고    scopus 로고
    • Protecting customer privacy in smart grid by coupling asymmetric cryptography with anonimized usage data, white paper. Infosys Technologies Ltd., May.
    • Bisoi S. Protecting customer privacy in smart grid by coupling asymmetric cryptography with anonimized usage data, white paper. Infosys Technologies Ltd., May 2011.
    • (2011)
    • Bisoi, S.1
  • 13
    • 82155177539 scopus 로고    scopus 로고
    • Secure lossless aggregation for smart grid m2m networks. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), doi:10.1109/SMARTGRID.2010.5622063.
    • Bartoli A, Hernandez-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D. Secure lossless aggregation for smart grid m2m networks. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 333-338. doi:10.1109/SMARTGRID.2010.5622063.
    • (2010) , pp. 333-338
    • Bartoli, A.1    Hernandez-Serrano, J.2    Soriano, M.3    Dohler, M.4    Kountouris, A.5    Barthel, D.6
  • 14
    • 80051631772 scopus 로고    scopus 로고
    • Secure information aggregation for smart grids using homomorphic encryption. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), doi:10.1109/SMARTGRID.2010.5622064.
    • Li F, Luo B, Liu P. Secure information aggregation for smart grids using homomorphic encryption. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 327-332. doi:10.1109/SMARTGRID.2010.5622064.
    • (2010) , pp. 327-332
    • Li, F.1    Luo, B.2    Liu, P.3
  • 16
    • 84864360304 scopus 로고    scopus 로고
    • Performance evaluation of smart grid data aggregation via homomorphic encryption. Wireless Communications and Networking Conference (WCNC), 2012 IEEE, doi:10.1109/WCNC.2012.6214307.
    • Saputro N, Akkaya K. Performance evaluation of smart grid data aggregation via homomorphic encryption. Wireless Communications and Networking Conference (WCNC), 2012 IEEE, 2012; 2945-2950. doi:10.1109/WCNC.2012.6214307.
    • (2012) , pp. 2945-2950
    • Saputro, N.1    Akkaya, K.2
  • 17
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for nonspecialists
    • doi:10.1155/2007/13801. URL
    • Fontaine C, Galand F. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007; 2007: 15:1-15:15. doi:10.1155/2007/13801. URL http://dx.doi.org/10.1155/2007/13801.
    • (2007) EURASIP Journal on Information Security , vol.2007 , pp. 1-15
    • Fontaine, C.1    Galand, F.2
  • 21
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • vol. 1403, Nyberg K (ed.). Springer: Berlin, Heidelberg, doi:10.1007/BFb0054135. URL
    • Okamoto T, Uchiyama S. A new public-key cryptosystem as secure as factoring. In Advances in Cryptology EUROCRYPT'98, Lecture Notes in Computer Science, vol. 1403, Nyberg K (ed.). Springer: Berlin, Heidelberg, 1998; 308-318. doi:10.1007/BFb0054135. URL http://dx.doi.org/10.1007/BFb0054135.
    • (1998) Advances in Cryptology EUROCRYPT'98, Lecture Notes in Computer Science , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21:120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 24
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Springer-Verlag New York, Inc.: New York, NY, USA, URL
    • El Gamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of CRYPTO 84 on Advances in Cryptology. Springer-Verlag New York, Inc.: New York, NY, USA, 1985; 10-18. URL http://dl.acm.org/citation.cfm?id=19478.19480.
    • (1985) Proceedings of CRYPTO 84 on Advances in Cryptology , pp. 10-18
    • El Gamal, T.1
  • 25
    • 84945300542 scopus 로고    scopus 로고
    • A provably secure additive and multiplicative privacy homomorphism
    • Springer-Verlag: London, UK, UK, URL
    • Domingo-Ferrer J. A provably secure additive and multiplicative privacy homomorphism. In Proceedings of the 5th International Conference on Information Security, ISC '02. Springer-Verlag: London, UK, UK, 2002; 471-483. URL http://dl.acm.org/citation.cfm?id=648026.744660.
    • (2002) Proceedings of the 5th International Conference on Information Security, ISC '02 , pp. 471-483
    • Domingo-Ferrer, J.1
  • 26
    • 33749525209 scopus 로고    scopus 로고
    • Efficient aggregation of encrypted data in wireless sensor networks. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005, doi:10.1109/MOBIQUITOUS.2005.25.
    • Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005, 2005; 109-117. doi:10.1109/MOBIQUITOUS.2005.25.
    • (2005) , pp. 109-117
    • Castelluccia, C.1    Mykletun, E.2    Tsudik, G.3
  • 27
    • 82155166461 scopus 로고    scopus 로고
    • Differentiated services QoS in smart grid communication networks
    • doi:10.1002/bltj.20522. URL
    • Deshpande JG, Kim E, Thottan M. Differentiated services QoS in smart grid communication networks. Bell Labs Technical Journal 2011; 16(3): 61-81. doi:10.1002/bltj.20522. URL http://dx.doi.org/10.1002/bltj.20522.
    • (2011) Bell Labs Technical Journal , vol.16 , Issue.3 , pp. 61-81
    • Deshpande, J.G.1    Kim, E.2    Thottan, M.3
  • 28
    • 84894093311 scopus 로고    scopus 로고
    • DOE. Communications requirements of smart grid technologies, Oct.
    • DOE. Communications requirements of smart grid technologies, Oct 2010.
    • (2010)
  • 29
    • 84894099792 scopus 로고    scopus 로고
    • Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. 2nd Workshop on Embedded Systems Security (WESS)
    • Ugus O, Westhoff D, Laue R, Shoufan A, Huss SA. Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. 2nd Workshop on Embedded Systems Security (WESS), 2007.
    • (2007)
    • Ugus, O.1    Westhoff, D.2    Laue, R.3    Shoufan, A.4    Huss, S.A.5
  • 30
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • doi:10.1109/MWC.2004.1269719.
    • Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 2004; 11(1):62-67. doi:10.1109/MWC.2004.1269719.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 62-67
    • Lauter, K.1
  • 31
    • 42549159545 scopus 로고    scopus 로고
    • Public key based cryptoschemes for data concealment in wireless sensor networks. IEEE International Conference on Communications, 2006, ICC '06, vol. 5, doi:10.1109/ICC.2006.255111.
    • Mykletun E, Girao J, Westhoff D. Public key based cryptoschemes for data concealment in wireless sensor networks. IEEE International Conference on Communications, 2006, ICC '06, vol. 5, 2006; 2288-2295. doi:10.1109/ICC.2006.255111.
    • (2006) , pp. 2288-2295
    • Mykletun, E.1    Girao, J.2    Westhoff, D.3
  • 32
    • 84875313714 scopus 로고    scopus 로고
    • Mapping an arbitrary message to an elliptic curve when defined over gf (2n)
    • King B. Mapping an arbitrary message to an elliptic curve when defined over gf (2n). International Journal of Network Security 2009; 8(2):169-176.
    • (2009) International Journal of Network Security , vol.8 , Issue.2 , pp. 169-176
    • King, B.1
  • 33
    • 85099494272 scopus 로고    scopus 로고
    • On Karatsuba multiplication algorithm
    • IEEE Computer Society: Washington, DC, USA, doi:10.1109/ISDPE.2007.92. URL
    • Fang X, Li L. On Karatsuba multiplication algorithm. In Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, ISDPE '07. IEEE Computer Society: Washington, DC, USA, 2007; 274-276. doi:10.1109/ISDPE.2007.92. URL http://dx.doi.org/10.1109/ISDPE.2007.92.
    • (2007) Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, ISDPE '07 , pp. 274-276
    • Fang, X.1    Li, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.