메뉴 건너뛰기




Volumn 1, Issue 2, 2013, Pages 286-296

Enhanced network coding to maintain privacy in smart grid communication

Author keywords

Anonymity; Network coding; Privacy; Smartgrid; Undetectability; Unlinkability; Unobservability

Indexed keywords

CODES (SYMBOLS); COMPLEX NETWORKS; DATA PRIVACY; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; SMART POWER GRIDS;

EID: 84928721888     PISSN: None     EISSN: 21686750     Source Type: Journal    
DOI: 10.1109/TETC.2013.2288275     Document Type: Article
Times cited : (17)

References (41)
  • 1
    • 84891370861 scopus 로고    scopus 로고
    • Privacypreserving scheme in smart grid communication using enhanced network coding
    • Jun.
    • H. Nicanfar, P. TalebiFard, A. Alasaad, and V. C. Leung, ''Privacypreserving scheme in smart grid communication using enhanced network coding, '' in Proc. IEEE ICC, Jun. 2013, pp. 1-3.
    • (2013) Proc. IEEE ICC , pp. 1-3
    • Nicanfar, H.1    TalebiFard, P.2    Alasaad, A.3    Leung, V.C.4
  • 2
    • 65249108723 scopus 로고    scopus 로고
    • Cyber-physical systems
    • Embedded
    • W. Wolf, ''Cyber-physical systems, '' in Proc. Comput., Embedded, 2009, pp. 88-89.
    • (2009) Proc. Comput. , pp. 88-89
    • Wolf, W.1
  • 4
    • 84861185029 scopus 로고    scopus 로고
    • A cyber-Physical future
    • May
    • R. Rajkumar, ''A cyber-Physical future, '' Proc. IEEE, vol. 100, no. 13, pp. 1309-1312, May 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.13 , pp. 1309-1312
    • Rajkumar, R.1
  • 5
    • 84155172767 scopus 로고    scopus 로고
    • Modeling cyber-physical systems
    • Jan.
    • P. Derler, E. A. Lee, and A. S. Vincentelli, ''Modeling cyber-physical systems, '' Proc. IEEE, vol. 100, no. 1, pp. 13-28, Jan. 2012.s
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 13-28
    • Derler, P.1    Lee, E.A.2    Vincentelli, A.S.3
  • 6
    • 84863599407 scopus 로고    scopus 로고
    • Multicast routing for decentralized control of cyber physical systems with an application in smart grid
    • Jul.
    • H. Li, L. Lai, and H. Poor, ''Multicast routing for decentralized control of cyber physical systems with an application in smart grid, '' IEEE J. Sel. Areas Commun., vol. 30, no. 6, pp. 1097-1107, Jul. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.6 , pp. 1097-1107
    • Li, H.1    Lai, L.2    Poor, H.3
  • 8
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • Jan.
    • S. Sridhar, A. Hahn, and M. Govindarasu, ''Cyber-physical system security for the electric power grid, '' Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 9
    • 84872095646 scopus 로고    scopus 로고
    • SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures
    • Dec.
    • S. Zonouz, K. M. Rogers, R. Berthier, R. B. Bobba, W. H. Sanders, and T. J. Overbye, ''SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures, '' IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1790-1799, Dec. 2012.
    • (2012) IEEE Trans. Smart Grid , vol.3 , Issue.4 , pp. 1790-1799
    • Zonouz, S.1    Rogers, K.M.2    Berthier, R.3    Bobba, R.B.4    Sanders, W.H.5    Overbye, T.J.6
  • 10
    • 84958082191 scopus 로고    scopus 로고
    • Sep. NIST Smart Grid, Cyber Security Working Group. Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security, Gaithersburg, MD, USA
    • (Sep. 2010). NIST Smart Grid, Cyber Security Working Group. Introduc- tion to NISTIR 7628 Guidelines for Smart Grid Cyber Security, Gaithersburg, MD, USA [Online]. Available: http://www.nist.gov/smartgrid
    • (2010)
  • 11
    • 79953696818 scopus 로고    scopus 로고
    • Survey of cyber security issues in smart grids
    • Apr.
    • T. M. Chen, ''Survey of cyber security issues in smart grids, '' Proc. SPIE, vol. 7709, pp. 1-11, Apr. 2010.
    • (2010) Proc. SPIE , vol.7709 , pp. 1-11
    • Chen, T.M.1
  • 12
    • 84859899942 scopus 로고    scopus 로고
    • G.hnem for AMI and DR
    • Feb.
    • A. Rossello-Busquet, ''G.hnem for AMI and DR, '' in Proc. ICNC, Feb. 2012, pp. 111-115.
    • (2012) Proc. ICNC , pp. 111-115
    • Rossello-Busquet, A.1
  • 13
    • 84865482588 scopus 로고    scopus 로고
    • AMI mesh networks- A practical solution and its performance evaluation
    • Sep.
    • P. Kulkarni, S. Gormus, Z. Fan, and F. Ramos, ''AMI mesh networks- A practical solution and its performance evaluation, '' IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1469-1481, Sep. 2012.
    • (2012) IEEE Trans. Smart Grid , vol.3 , Issue.3 , pp. 1469-1481
    • Kulkarni, P.1    Gormus, S.2    Fan, Z.3    Ramos, F.4
  • 14
    • 84873707949 scopus 로고    scopus 로고
    • Smart grid communications: Overview of research challenges solutions and standardization activities
    • Jan.
    • Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. Kalogridis, M. Sooriyabandara, et al., ''Smart grid communications: Overview of research challenges, solutions, and standardization activities, '' IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 21-38, Jan. 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.1 , pp. 21-38
    • Fan, Z.1    Kulkarni, P.2    Gormus, S.3    Efthymiou, C.4    Kalogridis, G.5    Sooriyabandara, M.6
  • 15
    • 79956370485 scopus 로고    scopus 로고
    • Multigate communication network for smart grid
    • Jun.
    • H. Gharavi and B. Hu, ''Multigate communication network for smart grid, '' Proc. IEEE, vol. 99, no. 6, pp. 1028-1045, Jun. 2011.
    • (2011) Proc. IEEE , vol.99 , Issue.6 , pp. 1028-1045
    • Gharavi, H.1    Hu, B.2
  • 16
    • 79952964418 scopus 로고    scopus 로고
    • A survey of technical requirements and consumer application standards for IP-based smart grid AMI network
    • Jan.
    • J. Wang and V. Leung, ''A survey of technical requirements and consumer application standards for IP-based smart grid AMI network, '' in Proc. ICOIN, Jan. 2011, pp. 114-119.
    • (2011) Proc. ICOIN , pp. 114-119
    • Wang, J.1    Leung, V.2
  • 17
    • 84921681906 scopus 로고    scopus 로고
    • Efficient authentication and key management mechanisms for smart grid communications
    • to be published
    • H. Nicanfar, P. Jokar, K. Beznosov, and V. C. M. Leung, ''Efficient authentication and key management mechanisms for smart grid communications, '' IEEE Syst. J., to be published.
    • IEEE Syst. J.
    • Nicanfar, H.1    Jokar, P.2    Beznosov, K.3    Leung, V.C.M.4
  • 20
    • 84958054740 scopus 로고    scopus 로고
    • Oct. 23
    • B. Blakley, (2006, Oct. 23). What is Privacy, Realy [Online]. Available: http://podcast.burtongroup.com/ip/2006/10/what-is-privacy.html
    • (2006) What is Privacy, Realy
    • Blakley, B.1
  • 21
    • 84958082192 scopus 로고    scopus 로고
    • National Institute of Standard and Technology
    • National Institute of Standard and Technology [Online]. Available: http://www.nist.gov/
  • 22
    • 0037323073 scopus 로고    scopus 로고
    • Linear network coding
    • Feb.
    • S. Li, R. Yeung, and N. Cai, ''Linear network coding, '' IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.2 , pp. 371-381
    • Li, S.1    Yeung, R.2    Cai, N.3
  • 23
    • 0242334165 scopus 로고    scopus 로고
    • An algebraic approach to network coding
    • Oct.
    • R. Koetter and M. Médard, ''An algebraic approach to network coding, '' IEEE/ACM Trans. Netw., vol. 11, no. 5, pp. 782-795, Oct. 2003.
    • (2003) IEEE/ACM Trans. Netw. , vol.11 , Issue.5 , pp. 782-795
    • Koetter, R.1    Médard, M.2
  • 24
    • 85032750989 scopus 로고    scopus 로고
    • Network coding for the internet and wireless networks
    • Sep.
    • P. A. Chou and Y. Wu, ''Network coding for the internet and wireless networks, '' IEEE Signal Process. Mag., vol. 24, no. 5, pp. 77-85, Sep. 2007.
    • (2007) IEEE Signal Process. Mag. , vol.24 , Issue.5 , pp. 77-85
    • Chou, P.A.1    Wu, Y.2
  • 25
  • 26
    • 69749123078 scopus 로고    scopus 로고
    • Linear network coding construction for multi-source multicast network
    • P. Bao-xing, Y. Lu-ming, W. Wei-ping, and X. Xiao, ''Linear network coding construction for multi-source multicast network, '' in Proc. 1st Int. Workshop ETCS, vol. 3. 2009, pp. 114-118.
    • (2009) Proc. 1st Int. Workshop ETCS , vol.3 , pp. 114-118
    • Bao-Xing, P.1    Lu-Ming, Y.2    Wei-Ping, W.3    Xiao, X.4
  • 27
    • 80053219965 scopus 로고    scopus 로고
    • Optimal subgraph selection over coded networks with delay and limited-size buffering
    • H. Ghasvari, M. Raayatpanah, B. Khalaj, and H. Bakhshi, ''Optimal subgraph selection over coded networks with delay and limited-size buffering, '' IET Commun., vol. 5, no. 11, pp. 1497-1505, 2011.
    • (2011) IET Commun. , vol.5 , Issue.11 , pp. 1497-1505
    • Ghasvari, H.1    Raayatpanah, M.2    Khalaj, B.3    Bakhshi, H.4
  • 28
    • 84874959990 scopus 로고    scopus 로고
    • Effect of intrusion detection and response on reliability of cyber physical systems
    • Mar.
    • R. Mitchell and I.-R. Chen, ''Effect of intrusion detection and response on reliability of cyber physical systems, '' IEEE Trans. Rel., vol. 62, no. 1, pp. 199-210, Mar. 2013.
    • (2013) IEEE Trans. Rel. , vol.62 , Issue.1 , pp. 199-210
    • Mitchell, R.1    Chen, I.-R.2
  • 29
    • 84155164277 scopus 로고    scopus 로고
    • ACyber-Physical systems approach to data center modeling and control for energy efficiency
    • Jan.
    • L. Parolini, B. Sinopoli, B. H. Krogh, and Z.Wang, ''ACyber-Physical systems approach to data center modeling and control for energy efficiency, '' Proc. IEEE, vol. 100, no. 1, pp. 254-268, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 254-268
    • Parolini, L.1    Sinopoli, B.2    Krogh, B.H.3    Wang, Z.4
  • 30
    • 84155165352 scopus 로고    scopus 로고
    • Ensuring safety, security, and sustainability of mission-critical cyber- physical systems
    • Jan.
    • A. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, ''Ensuring safety, security, and sustainability of mission-critical cyber- physical systems, '' Proc. IEEE, vol. 100, no. 1, pp. 283-299, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 283-299
    • Banerjee, A.1    Venkatasubramanian, K.K.2    Mukherjee, T.3    Gupta, S.K.S.4
  • 31
    • 84861198383 scopus 로고    scopus 로고
    • Cyber-physical systems: A perspective at the centennial
    • Jan.
    • K.-D. Kim and P. Kumar, ''Cyber-physical systems: A perspective at the centennial, '' Proc. IEEE, vol. 100, no. 13, pp. 1287-1308, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.13 , pp. 1287-1308
    • Kim, K.-D.1    Kumar, P.2
  • 33
    • 84876751522 scopus 로고    scopus 로고
    • An enhanced measurement transmission scheme for privacy protection in smart grid
    • S. Li, K. Choi, and K. Chae, ''An enhanced measurement transmission scheme for privacy protection in smart grid, '' in Proc. ICOIN, 2013, pp. 18-23.
    • (2013) Proc. ICOIN , pp. 18-23
    • Li, S.1    Choi, K.2    Chae, K.3
  • 34
    • 38549121414 scopus 로고    scopus 로고
    • ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless Ad Hoc networks
    • Jun.
    • X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen, and Z. Cao, ''ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless Ad Hoc networks, '' in Proc. IEEE ICC, Jun. 2007, pp. 1247-1253.
    • (2007) Proc. IEEE ICC , pp. 1247-1253
    • Lin, X.1    Lu, R.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5    Cao, Z.6
  • 35
    • 79952992733 scopus 로고    scopus 로고
    • Network coding based privacy preservation against traf-c analysis in multi-hop wireless networks
    • Mar.
    • Y. Fan, Y. Jiang, H. Zhu, J. Chen, and X. S. Shen, ''Network coding based privacy preservation against traf-c analysis in multi-hop wireless networks, '' IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 834-843, Mar. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.3 , pp. 834-843
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Chen, J.4    Shen, X.S.5
  • 36
    • 79960862937 scopus 로고    scopus 로고
    • Anonymous communication with network coding against traf-c analysis attack
    • Apr.
    • J.Wang, J.Wang, C.Wu, K. Lu, and N. Gu, ''Anonymous communication with network coding against traf-c analysis attack, '' in Proc. IEEE INFO- COM, Apr. 2011, pp. 1008-1016.
    • (2011) Proc. IEEE INFO- COM , pp. 1008-1016
    • Wang, J.1    Wang, J.2    Wu, C.3    Lu, K.4    Gu, N.5
  • 37
    • 84883063317 scopus 로고    scopus 로고
    • Untraceability of mobile devices in wireless mesh networks using linear network coding
    • Apr.
    • J. Wang, K. Lu, J. Wang, and C. Qiao, ''Untraceability of mobile devices in wireless mesh networks using linear network coding, '' in Proc. IEEE INFOCOM, Apr. 2013, pp. 270-274.
    • (2013) Proc. IEEE INFOCOM , pp. 270-274
    • Wang, J.1    Lu, K.2    Wang, J.3    Qiao, C.4
  • 38
    • 84883672889 scopus 로고    scopus 로고
    • On the flow anonymity problem in network coding
    • Jan.
    • A. O. Fathy Atya, T. ElBatt, and M. Youssef, ''On the flow anonymity problem in network coding, '' in Proc. 9th IWCMC, Jan. 2013, pp. 225-230.
    • (2013) Proc. 9th IWCMC , pp. 225-230
    • Fathy Atya, A.O.1    ElBatt, T.2    Youssef, M.3
  • 39
    • 84861325316 scopus 로고    scopus 로고
    • EIBC: Enhanced identity-based cryptography, a conceptual design
    • Mar.
    • H. Nicanfar and V. C. Leung, ''EIBC: Enhanced identity-based cryptography, a conceptual design, '' in Proc. IEEE Int. Syst. Conf. (SysCon), Mar. 2012, pp. 1-7.
    • (2012) Proc. IEEE Int. Syst. Conf. (SysCon) , pp. 1-7
    • Nicanfar, H.1    Leung, V.C.2
  • 40
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. Yao, ''On the security of public key protocols, '' IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.