메뉴 건너뛰기




Volumn 1, Issue 5, 2014, Pages 414-429

P3: Privacy preservation protocol for automatic appliance control application in smart grid

Author keywords

Attribute based encryption; automatic appliance control (AAC); data privacy; privacy preservation

Indexed keywords

CRYPTOGRAPHY; SMART POWER GRIDS;

EID: 84908457755     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2014.2358578     Document Type: Conference Paper
Times cited : (31)

References (40)
  • 1
    • 84908438451 scopus 로고    scopus 로고
    • Online]. Available: accessed on Feb
    • The GNU MP Bignum Library [Online]. Available: http://gmplib.org/, accessed on Feb. 9, 2014
    • (2014) The GNU MP Bignum Library , vol.9
  • 2
    • 84908438450 scopus 로고    scopus 로고
    • Online]. Available: accessed on Feb. 9 2014
    • - 2011). Control Your House Lights (and more) with Your iPhone [Online]. Available: http://cybernetnews.com/control-lights-with-youriphone/, accessed on Feb. 9, 2014
    • (2011) Control Your House Lights (And More) with Your IPhone
  • 3
    • 84908438449 scopus 로고    scopus 로고
    • Online]. Available: accessed on Feb. 9 2014
    • - 2004). Control Your Appliances Over The Internet [Online]. Available: http://www.popularmechanics.com/technology/gadgets/1279916, accessed on Feb. 9, 2014
    • (2004) Control Your Appliances over the Internet
  • 5
    • 23044435243 scopus 로고    scopus 로고
    • Efficient implementations for pairingbased cryptography
    • P. Barreto, B. Lynn, and M. Scott, "Efficient implementations for pairingbased cryptography," J. Cryptol., vol. 17, pp. 321-334, 2004
    • (2004) J. Cryptol , vol.17 , pp. 321-334
    • Barreto, P.1    Lynn, B.2    Scott, M.3
  • 6
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attributebased encryption
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE S&P07, 2007, pp. 321-334
    • (2007) Proc. IEEE S&P07 , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 7
    • 79959853254 scopus 로고    scopus 로고
    • Relations among privacy notions acm
    • J.-M. Bohli and A. Pashalidis, "Relations among privacy notions," ACM Trans. Inf. Syst. Secur., vol. 14, no. 4, pp. 362-380, 2011
    • (2011) Trans. Inf. Syst. Secur , vol.14 , Issue.4 , pp. 362-380
    • Bohli, J.-M.1    Pashalidis, A.2
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from Weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from Weil pairing," in Proc. Crypto01, 2001, vol. 2139, pp. 213-229
    • (2001) Proc. Crypto01 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 78149274300 scopus 로고    scopus 로고
    • AERO: Extraction of users activities from electric power consumption data
    • Aug
    • H. S. Cho, T. Yamazaki, and M. Hahn, "AERO: Extraction of users activities from electric power consumption data," IEEE Trans. Consum. Electron., vol. 56, no. 3, pp. 2011-2018, Aug. 2010
    • (2010) IEEE Trans. Consum. Electron , vol.56 , Issue.3 , pp. 2011-2018
    • Cho, H.S.1    Yamazaki, T.2    Hahn, M.3
  • 10
    • 80051646795 scopus 로고    scopus 로고
    • Smart grid privacy via anonymization of smart metering data
    • C. Efthymiou and G. Kalogridis, "Smart grid privacy via anonymization of smart metering data," in Proc. IEEE SmartGridComm10, 2010, pp. 238-243
    • (2010) Proc. IEEE SmartGridComm , vol.10 , pp. 238-243
    • Efthymiou, C.1    Kalogridis, G.2
  • 11
    • 80054080910 scopus 로고    scopus 로고
    • Privacy-friendly energy-metering via homomorphic encryption
    • F. D. Garcia and B. Jacobs, "Privacy-friendly energy-metering via homomorphic encryption," in Proc. STM10, 2010, vol. 6710, pp. 226-238
    • (2010) Proc. STM0 , vol.6710 , pp. 226-238
    • Garcia, F.D.1    Jacobs, B.2
  • 12
    • 84894755237 scopus 로고    scopus 로고
    • Secure data retrieval for decentralized disruptiontolerant military networks
    • Feb
    • J. Hur and K. Kang, "Secure data retrieval for decentralized disruptiontolerant military networks," IEEE/ACM Trans. Netw., vol. 22, no. 1, pp. 16-26, Feb. 2014
    • (2014) IEEE/ ACM Trans. Netw , vol.22 , Issue.1 , pp. 16-26
    • Hur, J.1    Kang, K.2
  • 15
    • 82155173473 scopus 로고    scopus 로고
    • ElecPrivacy: Evaluating the privacy protection of electricity management algorithms
    • Dec
    • G. Kalogridis, R. Cepeda, T. Lewis, S. Denic, and C. Efthymiou, "ElecPrivacy: Evaluating the privacy protection of electricity management algorithms," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 750-758, Dec. 2011
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 750-758
    • Kalogridis, G.1    Cepeda, R.2    Lewis, T.3    Denic, S.4    Efthymiou, C.5
  • 16
    • 84893061815 scopus 로고    scopus 로고
    • Maintaining privacy in data rich demand response applications
    • Berlin, Germany: Springer-Verlag
    • M. Karwe and J. Strüker, "Maintaining privacy in data rich demand response applications," in Smart Grid Security, vol. 7823. Berlin, Germany: Springer-Verlag, 2013, pp. 85-95
    • (2013) Smart Grid Security , vol.7823 , pp. 85-95
    • Karwe, M.1    Strüker, J.2
  • 17
    • 79961178921 scopus 로고    scopus 로고
    • Privacy-friendly aggregation for the smart-grid
    • K. Kursawe, G. Danezis, and M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in Proc. PETS11, 2011, vol. 6794, pp. 175-191
    • (2011) Proc. PETS , vol.11 , Issue.6794 , pp. 175-191
    • Kursawe, K.1    Danezis, G.2    Kohlweiss, M.3
  • 18
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • A. Lewko and B. Waters, "Decentralizing attribute-based encryption," in Proc. EUROCRYPT11, 2011, vol. 6632, pp. 568-588
    • (2011) Proc. EUROCRYPT11 , vol.6632 , pp. 568-588
    • Lewko, A.1    Waters, B.2
  • 19
    • 84894101649 scopus 로고    scopus 로고
    • Privacy preservation scheme for multicast communications in smart buildings of the smart grid
    • D. Li, Z. Aung, S. Sampalli, J.Williams, and A. Sanchez, "Privacy preservation scheme for multicast communications in smart buildings of the smart grid," Smart Grid Renew. Energy, vol. 4, pp. 313-324, 2013
    • (2013) Smart Grid Renew. Energy , vol.4 , pp. 313-324
    • Li, D.1    Aung, Z.2    Sampalli, S.3    Williams, J.4    Sanchez, A.5
  • 20
    • 84860848445 scopus 로고    scopus 로고
    • Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis
    • D. Li, Z. Aung, J. Williams, and A. Sanchez, "Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis," in Proc. IEEE PES Innov. Smart Grid Technol. (ISGT2), 2012, pp. 1-8
    • (2012) Proc. IEEE PES Innov. Smart Grid Technol. (ISGT12 , pp. 1-8
    • Li, D.1    Aung, Z.2    Williams, J.3    Sanchez, A.4
  • 21
    • 84876028271 scopus 로고    scopus 로고
    • P3: Privacy preservation protocol for appliance control application
    • D. Li, Z. Aung, J. Williams, and A. Sanchez, "P3: Privacy preservation protocol for appliance control application," in Proc. IEEE SmartGridComm12, 2012, pp. 294-299
    • (2012) Proc. IEEE SmartGridComm , vol.12 , pp. 294-299
    • Li, D.1    Aung, Z.2    Williams, J.3    Sanchez, A.4
  • 22
    • 56749137665 scopus 로고    scopus 로고
    • A hybrid group key management protocol for reliable and authenticated rekeying
    • D. Li and S. Sampalli, "A hybrid group key management protocol for reliable and authenticated rekeying," Int. J. Netw. Secur., vol. 6, pp. 270-281, 2008
    • (2008) Int. J. Netw. Secur , vol.6 , pp. 270-281
    • Li, D.1    Sampalli, S.2
  • 23
    • 80051631772 scopus 로고    scopus 로고
    • Secure information aggregation for smart grids using homomorphic encryption
    • F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in Proc. IEEE SmartGridComm10, 2010, pp. 327-332
    • (2010) Proc. IEEE SmartGridComm10 , pp. 327-332
    • Li, F.1    Luo, B.2    Liu, P.3
  • 24
    • 79955950768 scopus 로고    scopus 로고
    • Compressed meter reading for delay-sensitive and secure load report in smart grid
    • H. Li, R. Mao, L. Lai, and R. C. Qiu, "Compressed meter reading for delay-sensitive and secure load report in smart grid," in Proc. IEEE SmartGridComm10, 2010, pp. 114-119
    • (2010) Proc. IEEE SmartGridComm0 , pp. 114-119
    • Li, H.1    Mao, R.2    Lai, L.3    Qiu, R.C.4
  • 25
    • 82155192847 scopus 로고    scopus 로고
    • Multicast authentication in the smart grid with onetime signature
    • Dec
    • Q. Li and G. Cao, "Multicast authentication in the smart grid with onetime signature," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 686-696, Dec. 2011
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 686-696
    • Li, Q.1    Cao, G.2
  • 27
    • 77249154055 scopus 로고    scopus 로고
    • Inferring personal information from demand-response systems
    • Jan./Feb
    • M. A. Lisovich, D. K. Mulligan, and S. B. Wicker, "Inferring personal information from demand-response systems," IEEE Secur. Privacy, vol. 8, no. 1, pp. 11-20, Jan./Feb. 2010
    • (2010) IEEE Secur. Privacy , vol.8 , Issue.1 , pp. 11-20
    • Lisovich, M.A.1    Mulligan, D.K.2    Wicker, S.B.3
  • 28
    • 79959950900 scopus 로고    scopus 로고
    • Privacy concerns in upcoming residential and commercial demand-response systems
    • M. A. Lisovich and S. B.Wicker, "Privacy concerns in upcoming residential and commercial demand-response systems," in Proc. Clemson PS08, 2008, pp. 1-8
    • (2008) Proc. Clemson PS08 , pp. 1-8
    • Lisovich, M.A.1    Wicker, S.B.2
  • 29
    • 77955309418 scopus 로고    scopus 로고
    • Online]. Available: accessed on Apr. 13 2013
    • B. Lynn. (2006). The Stanford Pairing Based Crypto Library [Online]. Available: http://crypto.stanford.edu/pbc/, accessed on Apr. 13, 2013
    • (2006) The Stanford Pairing Based Crypto Library
    • Lynn, B.1
  • 30
    • 80755168372 scopus 로고    scopus 로고
    • Protecting consumer privacy from electric load monitoring
    • S. McLaughlin, P. McDaniel, and W. Aiello, "Protecting consumer privacy from electric load monitoring," in Proc. ACM CCS11, 2011, pp. 87-98
    • (2011) Proc. ACM CCS , vol.11 , pp. 87-98
    • McLaughlin, S.1    McDaniel, P.2    Aiello, W.3
  • 33
    • 77952887452 scopus 로고    scopus 로고
    • Security technology for smart grid networks
    • Jun
    • A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 99-107
    • Metke, A.R.1    Ekl, R.L.2
  • 34
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. ACM CCS07, 2007, pp. 195-203
    • (2007) Proc. ACM CCS07 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 36
    • 80955143493 scopus 로고    scopus 로고
    • Privacy-preserving smart metering
    • A. Rial and G. Danezis, "Privacy-preserving smart metering," in Proc. ACM WPES11, 2011, pp. 49-60
    • (2011) Proc. ACM WPES , vol.11 , pp. 49-60
    • Rial, A.1    Danezis, G.2
  • 37
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • Jun
    • Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 382-390
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 38
    • 84906994292 scopus 로고    scopus 로고
    • Performance evaluation of attribute-based encryption: Toward data privacy in the IoT
    • Sydney, N.S.W., Australia
    • X.Wang, J. Zhang, E. M. Schooler, and M. Ion, "Performance evaluation of attribute-based encryption: Toward data privacy in the IoT," in Proc. IEEE ICC14, Sydney, N.S.W., Australia, 2014, pp. 1-6
    • (2014) Proc. IEEE ICC4 , pp. 1-6
    • Wang, X.1    Zhang, J.2    Schooler, E.M.3    Ion, M.4
  • 40
    • 82155198906 scopus 로고    scopus 로고
    • Application-aware secure multicast for power grid communication
    • J. Zhang and C. A. Gunter, "Application-aware secure multicast for power grid communication," in Proc. IEEE SmartGridComm10, 2010, pp. 339-344
    • (2010) Proc. IEEE SmartGridComm , vol.10 , pp. 339-344
    • Zhang, J.1    Gunter, C.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.