메뉴 건너뛰기




Volumn 8, Issue 3, 2015, Pages 343-359

Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

Author keywords

Chord; Overlay attacks; Smart grids

Indexed keywords

COMPLIANCE CONTROL; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; ELECTRIC POWER TRANSMISSION NETWORKS; ENERGY UTILIZATION; PATIENT MONITORING; POWER MANAGEMENT (TELECOMMUNICATION); SMART POWER GRIDS;

EID: 84921020529     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.983     Document Type: Article
Times cited : (12)

References (33)
  • 1
    • 84921047157 scopus 로고    scopus 로고
    • Guidelines for smart grid cyber security, NIST Interagency Report 7628, National Institute of Standards and Technology, Information Technology Laboratory
    • National Institute of Standards and Technology (NIST). Guidelines for smart grid cyber security, NIST Interagency Report 7628, National Institute of Standards and Technology, Information Technology Laboratory, 2010. http://www.nist.gov.
    • (2010)
  • 2
    • 84921047156 scopus 로고    scopus 로고
    • Peer-to-peer networks applied to power grid
    • Beitollahi H, Deconinck G. Peer-to-peer networks applied to power grid, 2007.
    • (2007)
    • Beitollahi, H.1    Deconinck, G.2
  • 4
    • 84921028487 scopus 로고    scopus 로고
    • A low-cost alternative to smart metering infrastructure based on peer-to-peer technologies, 6th International Conference on the European Energy Market, 2009. EEM 2009, Leuven, Belgium
    • Rusitschka S, Gerdes C, Eger K. A low-cost alternative to smart metering infrastructure based on peer-to-peer technologies, 6th International Conference on the European Energy Market, 2009. EEM 2009, Leuven, Belgium, 2009;1-6.
    • (2009) , pp. 1-6
    • Rusitschka, S.1    Gerdes, C.2    Eger, K.3
  • 5
    • 84885891473 scopus 로고    scopus 로고
    • Towards benchmarking of P2P technologies from a SCADA systems protection perspective, MOBILIGHT 2010: Inproceedings of the 2nd International Conference on Mobile Lightweight Wireless Systems
    • Khelil A, Jeckel S, Germanus D, Suri N. Towards benchmarking of P2P technologies from a SCADA systems protection perspective, MOBILIGHT 2010: Inproceedings of the 2nd International Conference on Mobile Lightweight Wireless Systems, 2010;400-414.
    • (2010) , pp. 400-414
    • Khelil, A.1    Jeckel, S.2    Germanus, D.3    Suri, N.4
  • 6
    • 84880204032 scopus 로고    scopus 로고
    • Distributed privacy-preserving aggregation of metering data in smart grids
    • Rottondi C, Verticale G, Krauss C. Distributed privacy-preserving aggregation of metering data in smart grids. IEEE Journal on Selected Areas in Communications 2013; 31 (7): 1342-1354, DOI: 10.1109/JSAC.2013.130716.
    • (2013) IEEE Journal on Selected Areas in Communications , vol.31 , Issue.7 , pp. 1342-1354
    • Rottondi, C.1    Verticale, G.2    Krauss, C.3
  • 8
    • 84921047154 scopus 로고    scopus 로고
    • SoK: Privacy technologies for smart grids - a survey of options
    • Jawurek M, Kerschbaum F, Danezis G. SoK: Privacy technologies for smart grids - a survey of options, 2012. http://www.research.microsoft.com/pubs/178055/paper.pdf.
    • (2012)
    • Jawurek, M.1    Kerschbaum, F.2    Danezis, G.3
  • 9
    • 84904608123 scopus 로고    scopus 로고
    • EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
    • Li H, Lin X, Yang H, Liang X, Lu R, Shen X. EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Transactions on Parallel and Distributed Systems 2013; PP (99): 1-1, DOI: 10.1109/TPDS.2013.124.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , Issue.99 , pp. 1-1
    • Li, H.1    Lin, X.2    Yang, H.3    Liang, X.4    Lu, R.5    Shen, X.6
  • 10
    • 84874617140 scopus 로고    scopus 로고
    • 2DAS: self-certified pkc-based privacy-preserving data aggregation scheme in smart grid
    • 2DAS: self-certified pkc-based privacy-preserving data aggregation scheme in smart grid. International Journal of Distributed Sensor Networks 2013; 2013: Article ID 457325, 11 pages, DOI: 10.1155/2013/457325.
    • (2013) International Journal of Distributed Sensor Networks , vol.2013 , pp. 11
    • Zhang, J.1    Liu, L.2    Cui, Y.3    Chen, Z.4
  • 11
    • 84875055639 scopus 로고    scopus 로고
    • A decentralized security framework for data aggregation and access control in smart grids
    • Ruj S, Nayak A. A decentralized security framework for data aggregation and access control in smart grids. IEEE Transactions on Smart Grid 2013; 4 (1): 196-205, DOI: 10.1109/TSG.2012.2224389.
    • (2013) IEEE Transactions on Smart Grid , vol.4 , Issue.1 , pp. 196-205
    • Ruj, S.1    Nayak, A.2
  • 13
    • 79961178921 scopus 로고    scopus 로고
    • Privacy-friendly aggregation for the smart-grid
    • Springer-Verlag: Berlin, Heidelberg
    • Kursawe K, Danezis G, Kohlweiss M. Privacy-friendly aggregation for the smart-grid. In Privacy Enhancing Technologies, Vol.6794. Springer-Verlag: Berlin, Heidelberg, 2011; 175-191.
    • (2011) Privacy Enhancing Technologies , vol.6794 , pp. 175-191
    • Kursawe, K.1    Danezis, G.2    Kohlweiss, M.3
  • 14
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Cryptology, CRYPTO '91, Springer-Verlag: London, UK, UK [Accessed on January 2013].
    • Pedersen TP. Non-interactive and information-theoretic secure verifiable secret sharing, Proceedings of the 11th Annual International Cryptology Conference on Advances In Cryptology, CRYPTO '91, Springer-Verlag: London, UK, UK, 1992; 129-140. http://dl.acm.org/citation.cfm?id=646756.705507 [Accessed on January 2013].
    • (1992) Proceedings of the 11th Annual International Cryptology Conference on Advances , pp. 129-140
    • Pedersen, T.P.1
  • 15
    • 84957080948 scopus 로고    scopus 로고
    • A simple publicly verifiable secret sharing scheme and its application to electronic
    • CRYPTO '99, Springer-Verlag: London, UK, UK [Accessed on January 2013].
    • Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '99, Springer-Verlag: London, UK, UK, 1999; 148-164. http://dl.acm.org/citation.cfm?id=646764.703956 [Accessed on January 2013].
    • (1999) Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology , pp. 148-164
    • Schoenmakers, B.1
  • 16
    • 84921047153 scopus 로고    scopus 로고
    • Differentially private billing with rebates [Accessed on January 2013].
    • Danezis G, Kohlweiss M, Rial A. Differentially private billing with rebates, 2011. http://www.research.microsoft.com/pubs/144654/main.pdf [Accessed on January 2013].
    • (2011)
    • Danezis, G.1    Kohlweiss, M.2    Rial, A.3
  • 17
    • 84874332569 scopus 로고    scopus 로고
    • Asynchronous computational vss with reduced communication complexity
    • Dawson Ed (ed), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg [Accessed on January 2013].
    • Backes M, Datta A, Kate A. Asynchronous computational vss with reduced communication complexity. In Topics in Cryptology - CT-RSA 2013, vol.7779, Dawson Ed (ed), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg, 2013; 259-276. DOI: 10.1007/978-3-642-36095-4_17. http://dx.doi.org/10.1007/978-3-642-36095-4_17 [Accessed on January 2013].
    • (2013) Topics in Cryptology - CT-RSA 2013 , vol.7779 , pp. 259-276
    • Backes, M.1    Datta, A.2    Kate, A.3
  • 19
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • LNCS series. Springer-Verlag: Berlin, Heidelberg
    • Boneh D, Boyen X, Shacham H. Short group signatures. In Proceedings of CRYPTO 04, LNCS series. Springer-Verlag: Berlin, Heidelberg, 2004; 41-55.
    • (2004) Proceedings of CRYPTO 04 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 20
    • 14844309671 scopus 로고    scopus 로고
    • Group signatures with verifier-local revocation
    • CCS '04, ACM: New York, NY, USA [Accessed on January 2013].
    • Boneh D, Shacham H. Group signatures with verifier-local revocation, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04, ACM: New York, NY, USA, 2004; 168-177. http://doi.acm.org/10.1145/1030083.1030106 [Accessed on January 2013].
    • (2004) Proceedings of the 11th ACM Conference on Computer and Communications Security , pp. 168-177
    • Boneh, D.1    Shacham, H.2
  • 21
    • 78650275037 scopus 로고    scopus 로고
    • Shorter verifier-local revocation group signature with backward unlinkability
    • Pairing'10, Springer-Verlag: Berlin, Heidelberg [Accessed on January 2013].
    • Wei L, Liu J. Shorter verifier-local revocation group signature with backward unlinkability, Proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing'10, Springer-Verlag: Berlin, Heidelberg, 2010;136-146. http://dl.acm.org/citation.cfm?id=1948966.1948979 [Accessed on January 2013].
    • (2010) Proceedings of the 4th International Conference on Pairing-Based Cryptography , pp. 136-146
    • Wei, L.1    Liu, J.2
  • 24
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems
    • Middleware '01, Springer-Verlag: London, UK, UK [Accessed on January 2013].
    • Rowstron AIT, Druschel P. Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Middleware '01, Springer-Verlag: London, UK, UK, 2001; 329-350. http://dl.acm.org/citation.cfm?id=646591.697650 [Accessed on January 2013].
    • (2001) Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg , pp. 329-350
    • Rowstron, A.I.T.1    Druschel, P.2
  • 25
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • Druschel P, Kaashoek F, Rowstron A (eds), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg
    • Douceur J. The Sybil attack. In Peer-to-Peer Systems, vol.2429, Druschel P, Kaashoek F, Rowstron A (eds), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg, 2002; 251-260.
    • (2002) Peer-to-Peer Systems , vol.2429 , pp. 251-260
    • Douceur, J.1
  • 27
    • 84978382732 scopus 로고    scopus 로고
    • Secure routing for structured peer-to-peer overlay networks
    • [Accessed on January 2013]. 2002-12
    • Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS. Secure routing for structured peer-to-peer overlay networks. SIGOPS Operating Systems Review 2002-12; 36 (SI): 299-314, DOI: 10.1145/844128.844156. http://doi.acm.org/10.1145/844128.844156 [Accessed on January 2013].
    • SIGOPS Operating Systems Review , vol.36 , pp. 299-314
    • Castro, M.1    Druschel, P.2    Ganesh, A.3    Rowstron, A.4    Wallach, D.S.5
  • 30
    • 84877580836 scopus 로고    scopus 로고
    • Privacy-preserving smart metering with multiple data consumers
    • [Accessed on January 2013].
    • Rottondi C, Verticale G, Capone A. Privacy-preserving smart metering with multiple data consumers. Computer Networks 2013; 57 (7): 1699-1713, http://www.sciencedirect.com/science/article/pii/S1389128613000364 [Accessed on January 2013].
    • (2013) Computer Networks , vol.57 , Issue.7 , pp. 1699-1713
    • Rottondi, C.1    Verticale, G.2    Capone, A.3
  • 31
    • 84923272193 scopus 로고    scopus 로고
    • An overview of the OMNeT++ simulation environment, Simutools '08: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems Workshops, Marseille, France
    • Varga A, Hornig R. An overview of the OMNeT++ simulation environment, Simutools '08: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems Workshops, Marseille, France, 2008; 1-10.
    • (2008) , pp. 1-10
    • Varga, A.1    Hornig, R.2
  • 32
    • 84921047152 scopus 로고    scopus 로고
    • OverSim: the overlay simulation framework [Accessed on January 2013]
    • OverSim: the overlay simulation framework. http://www.oversim.org/ [Accessed on January 2013].
  • 33
    • 84983503429 scopus 로고    scopus 로고
    • Detection and mitigation of the eclipse attack in Chord overlays
    • June To appear in International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS-2014), Hasselt, Belgium
    • Rottondi C, Panzeri A, Yagne C, Verticale G. Detection and mitigation of the eclipse attack in Chord overlays, To appear in International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS-2014), Hasselt, Belgium, June 2014.
    • (2014)
    • Rottondi, C.1    Panzeri, A.2    Yagne, C.3    Verticale, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.