메뉴 건너뛰기




Volumn 10, Issue 2, 2019, Pages 1225-1236

Balancing security and efficiency for smart metering against misbehaving collectors

Author keywords

Data aggregation; Dynamic billing; Security; Smart grid; Smart metering

Indexed keywords

COLLECTOR EFFICIENCY; CRYPTOGRAPHY; EFFICIENCY; ELECTRIC MEASURING INSTRUMENTS; ELECTRIC POWER TRANSMISSION NETWORKS; ELECTRIC POWER UTILIZATION; ENERGY EFFICIENCY; POLLUTION; SALES; SMART METERS; SMART POWER GRIDS;

EID: 85031813318     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2017.2761804     Document Type: Article
Times cited : (43)

References (39)
  • 1
    • 84898006994 scopus 로고    scopus 로고
    • Smart grid-The new and improved power grid: A survey
    • 4th Quart
    • X. Fang, S. Misra, G. Xue, and D. Yang, “Smart grid-The new and improved power grid: A survey,” IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 944-980, 4th Quart., 2012.
    • (2012) IEEE Commun. Surveys Tuts. , vol.14 , Issue.4 , pp. 944-980
    • Fang, X.1    Misra, S.2    Xue, G.3    Yang, D.4
  • 2
    • 84864865604 scopus 로고    scopus 로고
    • Securing smart grid: Cyber attacks, countermeasures, and challenges
    • Aug
    • X. Li et al., “Securing smart grid: Cyber attacks, countermeasures, and challenges,” IEEE Commun. Mag., vol. 58, no. 8, pp. 38-45, Aug. 2012.
    • (2012) IEEE Commun. Mag. , vol.58 , Issue.8 , pp. 38-45
    • Li, X.1
  • 7
    • 77249132957 scopus 로고    scopus 로고
    • Government of Ontario IT Standard: document 51, Govern. Ontario, Toronto, ON, Canada
    • Government of Ontario IT Standard: Advanced Metering Infrastructure, document 51, Govern. Ontario, Toronto, ON, Canada, 2007.
    • (2007) Advanced Metering Infrastructure
  • 8
    • 84864583229 scopus 로고    scopus 로고
    • EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
    • Sep
    • R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, Sep. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.9 , pp. 1621-1631
    • Lu, R.1    Liang, X.2    Li, X.3    Lin, X.4    Shen, X.5
  • 9
    • 84863427288 scopus 로고    scopus 로고
    • A practical smart metering system supporting privacy preserving billing and load monitoring
    • Singapore
    • H.-Y. Lin, W.-G. Tzeng, S.-T. Shen, and B.-S. P. Lin, “A practical smart metering system supporting privacy preserving billing and load monitoring,” in Proc. ACNS, Singapore, 2012, pp. 544-560.
    • (2012) Proc. ACNS , pp. 544-560
    • Lin, H.-Y.1    Tzeng, W.-G.2    Shen, S.-T.3    Lin, B.-S.P.4
  • 10
    • 84877580836 scopus 로고    scopus 로고
    • Privacy-preserving smart metering with multiple data consumers
    • C. Rottondi, G. Verticale, and A. Capone, “Privacy-preserving smart metering with multiple data consumers,” Comput. Netw., vol. 57, no. 7, pp. 1699-1713, 2013.
    • (2013) Comput. Netw. , vol.57 , Issue.7 , pp. 1699-1713
    • Rottondi, C.1    Verticale, G.2    Capone, A.3
  • 11
    • 84877932292 scopus 로고    scopus 로고
    • Privacy-friendly tasking and trading of energy in smart grids
    • Coimbra, Portugal
    • T. Dimitriou and G. Karame, “Privacy-friendly tasking and trading of energy in smart grids,” in Proc. ACM SAC, Coimbra, Portugal, 2013, pp. 652-659.
    • (2013) Proc. ACM SAC , pp. 652-659
    • Dimitriou, T.1    Karame, G.2
  • 12
    • 84921020529 scopus 로고    scopus 로고
    • Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids
    • C. Rottondi, M. Savi, G. Verticale, and C. Krauß, “Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids,” Security Commun. Netw., vol. 8, no. 3, pp. 343-359, 2014.
    • (2014) Security Commun. Netw. , vol.8 , Issue.3 , pp. 343-359
    • Rottondi, C.1    Savi, M.2    Verticale, G.3    Krauß, C.4
  • 13
    • 84959444946 scopus 로고    scopus 로고
    • Chameleon signatures
    • H. Krawczyk and T. Rabin, “Chameleon signatures,” in Proc. NDSS, 2000, pp. 143-154.
    • (2000) Proc. NDSS , pp. 143-154
    • Krawczyk, H.1    Rabin, T.2
  • 14
    • 85180411878 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proc. NDSS, 2005, pp. 29-43.
    • (2005) Proc. NDSS , pp. 29-43
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 15
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. Asiacrypt, 2008, pp. 90-107.
    • (2008) Proc. Asiacrypt , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 16
    • 84891063786 scopus 로고    scopus 로고
    • Privacy-enhanced data aggregation scheme against internal attackers in smart grid
    • Feb
    • C.-I. Fan, S.-Y. Huang, and Y.-L. Lai, “Privacy-enhanced data aggregation scheme against internal attackers in smart grid,” IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 666-675, Feb. 2014.
    • (2014) IEEE Trans. Ind. Informat. , vol.10 , Issue.1 , pp. 666-675
    • Fan, C.-I.1    Huang, S.-Y.2    Lai, Y.-L.3
  • 17
    • 84903204895 scopus 로고    scopus 로고
    • Privacy-preserving smart metering with verifiability for both billing and energy management
    • Kyoto, Japan
    • K. Ohara, Y. Sakai, F. Yoshida, M. Iwamoto, and K. Ohta, “Privacy-preserving smart metering with verifiability for both billing and energy management,” in Proc. AsiaPKC, Kyoto, Japan, 2014, pp. 23-32.
    • (2014) Proc. AsiaPKC , pp. 23-32
    • Ohara, K.1    Sakai, Y.2    Yoshida, F.3    Iwamoto, M.4    Ohta, K.5
  • 18
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree resid-uosity classes
    • Prague, Czech Republic
    • P. Paillier, “Public-key cryptosystems based on composite degree resid-uosity classes,” in Proc. EUROCRYPT, Prague, Czech Republic, 1999, pp. 223-238.
    • (1999) Proc. EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 19
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • Cambridge, MA, USA
    • D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-DNF formulas on ciphertexts,” in Proc. TCC, Cambridge, MA, USA, 2005, pp. 325-341.
    • (2005) Proc. TCC , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 20
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” in Proc. Asiacrypt, 2001, pp. 514-532.
    • (2001) Proc. Asiacrypt , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 21
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Jul
    • T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 22
    • 79961178921 scopus 로고    scopus 로고
    • Privacy-friendly aggregation for the smart-grid
    • Waterloo, ON, Canada
    • K. Kursawe, G. Danezis, and M. Kohlweiss, “Privacy-friendly aggregation for the smart-grid,” in Proc. PETS, Waterloo, ON, Canada, 2011, 175-191.
    • (2011) Proc. PETS , pp. 175-191
    • Kursawe, K.1    Danezis, G.2    Kohlweiss, M.3
  • 23
    • 84902299754 scopus 로고    scopus 로고
    • Human-factor-aware privacy-preserving aggregation in smart grid
    • Jun
    • W. Jia, H. Zhu, Z. Cao, X. Dong, and C. Xiao, “Human-factor-aware privacy-preserving aggregation in smart grid,” IEEE Syst. J., vol. 8, no. 2, pp. 598-607, Jun. 2014.
    • (2014) IEEE Syst. J. , vol.8 , Issue.2 , pp. 598-607
    • Jia, W.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Xiao, C.5
  • 24
    • 84929190573 scopus 로고    scopus 로고
    • Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach
    • Jun
    • J. Won, C. Y. T. Ma, D. K. Y. Yau, and N. S. V. Rao, “Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach,” IEEE/ACM Trans. Netw., vol. 24, no. 3, pp. 1661-1674, Jun. 2016.
    • (2016) IEEE/ACM Trans. Netw. , vol.24 , Issue.3 , pp. 1661-1674
    • Won, J.1    Ma, C.Y.T.2    Yau, D.K.Y.3    Rao, N.S.V.4
  • 25
    • 85029554588 scopus 로고    scopus 로고
    • Differentially private smart metering with fault tolerance and range-based filtering
    • Sep
    • J. Ni et al., “Differentially private smart metering with fault tolerance and range-based filtering,” IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2483-2493, Sep. 2017.
    • (2017) IEEE Trans. Smart Grid , vol.8 , Issue.5 , pp. 2483-2493
    • Ni, J.1
  • 26
    • 85013408054 scopus 로고    scopus 로고
    • Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise
    • Mar
    • Z. Zhang, Z. Qin, L. Zhu, J. Weng, and K. Ren, “Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise,” IEEE Trans. Smart Grid, vol. 8, no. 2, pp. 619-626, Mar. 2017.
    • (2017) IEEE Trans. Smart Grid , vol.8 , Issue.2 , pp. 619-626
    • Zhang, Z.1    Qin, Z.2    Zhu, L.3    Weng, J.4    Ren, K.5
  • 27
    • 84964886903 scopus 로고    scopus 로고
    • Security-enhanced data aggregation against malicious gateways in smart grid
    • San Diego, CA, USA
    • J. Ni, K. Alharbi, X. Lin, and X. Shen, “Security-enhanced data aggregation against malicious gateways in smart grid,” in Proc. Globecom, San Diego, CA, USA, 2015, pp. 1-6.
    • (2015) Proc. Globecom , pp. 1-6
    • Ni, J.1    Alharbi, K.2    Lin, X.3    Shen, X.4
  • 28
    • 84937717111 scopus 로고    scopus 로고
    • Efficient and privacy-preserving metering protocols for smart grid systems
    • May
    • H. J. Jo, I. S. Kim, and D. H. Lee, “Efficient and privacy-preserving metering protocols for smart grid systems,” IEEE Trans. Smart Grid, vol. 7, no. 3, pp. 1732-1742, May 2016.
    • (2016) IEEE Trans. Smart Grid , vol.7 , Issue.3 , pp. 1732-1742
    • Jo, H.J.1    Kim, I.S.2    Lee, D.H.3
  • 29
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Chicago, IL, USA
    • Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” in Proc. ACM CCS, Chicago, IL, USA, 2009, pp. 21-32.
    • (2009) Proc. ACM CCS , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 30
    • 84984631748 scopus 로고    scopus 로고
    • Energy big data analytics and security: Challenges and opportunities
    • Sep
    • J. Hu and A. V. Vasilakos, “Energy big data analytics and security: Challenges and opportunities,” IEEE Trans. Smart Grid, vol. 7, no. 5, pp. 2423-2436, Sep. 2016.
    • (2016) IEEE Trans. Smart Grid , vol.7 , Issue.5 , pp. 2423-2436
    • Hu, J.1    Vasilakos, A.V.2
  • 31
    • 85021308023 scopus 로고    scopus 로고
    • A review of false data injection attacks against modern power systems
    • Jul
    • G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A review of false data injection attacks against modern power systems,” IEEE Trans. Smart Grid, vol. 8, no. 4, pp. 1630-1638, Jul. 2017.
    • (2017) IEEE Trans. Smart Grid , vol.8 , Issue.4 , pp. 1630-1638
    • Liang, G.1    Zhao, J.2    Luo, F.3    Weller, S.R.4    Dong, Z.Y.5
  • 32
    • 33847645050 scopus 로고    scopus 로고
    • Placement of PMUs to enable bad data detection in state estimation
    • Nov
    • J. Chen and A. Abur, “Placement of PMUs to enable bad data detection in state estimation,” IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1608-1615, Nov. 2006.
    • (2006) IEEE Trans. Power Syst. , vol.21 , Issue.4 , pp. 1608-1615
    • Chen, J.1    Abur, A.2
  • 33
    • 84894537318 scopus 로고    scopus 로고
    • On false data-injection attacks against power system state estimation: Modeling and countermeasures
    • Mar
    • Q. Yang et al., “On false data-injection attacks against power system state estimation: Modeling and countermeasures,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 717-729, Mar. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.3 , pp. 717-729
    • Yang, Q.1
  • 34
    • 85018423393 scopus 로고    scopus 로고
    • Online detection of stealthy false data injection attacks in power system state estimation
    • to be published
    • A. Ashok, M. Govindarasu, and V. Ajjarapu, “Online detection of stealthy false data injection attacks in power system state estimation,” IEEE Trans. Smart Grid, to be published.
    • IEEE Trans. Smart Grid
    • Ashok, A.1    Govindarasu, M.2    Ajjarapu, V.3
  • 35
    • 85029494690 scopus 로고    scopus 로고
    • Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism
    • Sep
    • Y. He, G. J. Mendis, and J. Wei, “Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism,” IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2505-2516, Sep. 2017.
    • (2017) IEEE Trans. Smart Grid , vol.8 , Issue.5 , pp. 2505-2516
    • He, Y.1    Mendis, G.J.2    Wei, J.3
  • 36
    • 84994828087 scopus 로고    scopus 로고
    • Key-homomorphic signatures and applications to multiparty signatures and non-interactive zero-knowledge
    • Online.
    • D. Derler and D. Slamanig, “Key-homomorphic signatures and applications to multiparty signatures and non-interactive zero-knowledge,” Cryptol. ePrint Arch., Tech. Rep. 792, 2016. [Online]. Available: https://eprint.iacr.org/2016/792.pdf
    • (2016) Cryptol. ePrint Arch., Tech. Rep. , vol.792
    • Derler, D.1    Slamanig, D.2
  • 37
    • 0005506834 scopus 로고    scopus 로고
    • Kangaroos, monopoly and discrete logarithms
    • J. M. Pollard, “Kangaroos, monopoly and discrete logarithms,” J. Cryptol., vol. 13, no. 4, pp. 437-447, 2000.
    • (2000) J. Cryptol. , vol.13 , Issue.4 , pp. 437-447
    • Pollard, J.M.1
  • 38
    • 72549118033 scopus 로고    scopus 로고
    • Improved signcryption from q−Diffie-Hellman problem
    • Amalfi, Italy
    • B. Libert and J.-J. Quisquater, “Improved signcryption from q−Diffie-Hellman problem,” in Proc. SCN, Amalfi, Italy, 2004, pp. 220-234.
    • (2004) Proc. SCN , pp. 220-234
    • Libert, B.1    Quisquater, J.-J.2
  • 39
    • 84961293075 scopus 로고    scopus 로고
    • Conference key agreement from secret sharing
    • Wollongong, NSW, Australia
    • C.-H. Li and J. Pieprzyk, “Conference key agreement from secret sharing,” in Proc. ACISP, Wollongong, NSW, Australia, 1999, pp. 64-76.
    • (1999) Proc. ACISP , pp. 64-76
    • Li, C.-H.1    Pieprzyk, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.