Enabling Secure and Privacy Preserving Communications in Smart Grids

Enabling Secure and Privacy Preserving Communications in Smart Grids PDF

Author: Hongwei Li

Publisher: Springer Science & Business Media

Published: 2014-03-25

Total Pages: 74

ISBN-13: 3319049453

DOWNLOAD EBOOK →

This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in smart grids. The brief is designed for researchers and professionals working with computer communication networks and smart grids. Graduate students interested in networks and communication engineering will also find the brief an essential resource.

IoT Security

IoT Security PDF

Author: Madhusanka Liyanage

Publisher: John Wiley & Sons

Published: 2019-12-24

Total Pages: 327

ISBN-13: 1119527945

DOWNLOAD EBOOK →

An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book: Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications PDF

Author: Rongxing Lu

Publisher: Springer

Published: 2016-05-26

Total Pages: 191

ISBN-13: 3319328999

DOWNLOAD EBOOK →

This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the academics, researchers, and graduate students seeking to exploit secure data aggregation techniques in smart grid communications and Internet of Things (IoT) scenarios.

A Framework for Privacy-preserving Data Sharing in Smart Grid

A Framework for Privacy-preserving Data Sharing in Smart Grid PDF

Author: Khalid Alharbi

Publisher:

Published: 2016

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK →

While smart grid introduces a lot of enhancements to the traditional power grid and improves managing and controlling consumers demands, it also introduces security and privacy issues. Therefore, failure to address them will hinder the flourish of smart grid. In this thesis, we propose a novel framework for privacy-preserving data sharing in smart grid using a combination of homomorphic encryption and proxy re-encryption. The proposed framework allows distributed energy resources to be able to analyze the consumers data while preserving the consumers privacy. To the best of our knowledge, the proposed framework is first attempt to consider an important problem concerning data sharing in smart grid. Furthermore, in order to effectively collect consumer (or household) electricity consumption data, we also propose an efficient lightweight privacy- preserving data aggregation scheme, called ELPDA, for smart grid. The proposed scheme aims at resolving the power consumption data security and residential consumer privacy by employing one-time masking technique to protect consumers privacy while achieving lightweight data aggregation. Moreover, we study the situation in which gateways aggregating consumers' data become malicious. Then, we propose a security-enhanced data aggregation scheme for smart grid communications from a homomorphic cryptosystem, trapdoor hash functions and homomorphic authenticators. The distinctive feature of our scheme achieves data confidentiality and integrity against the malicious aggregator (e.g. gateway), meaning that the aggregator is not able to learn the privacy of users or corrupt the power consumption reports during the aggregation process. In addition to the above schemes for smart grid upnlink communications, we propose an efficient and privacy-preserving scheme in order to protect smart grid in downlink communications. Specifically, we propose an efficient identity based signcryption, called EIBSC, providing privacy preservation in downlink communication for smart grids. The proposed scheme is characterized by employing the concealing destination technique on the tree-based network to protect consumer privacy in downlink communication. Furthermore, the proposed scheme employs identity based signcryption to efficiently achieve downlink message source authentication, data integrity and confidentiality. Additionally, compared to other identity-based signcryption schemes, the proposed scheme is more efficient in regards to computational overhead and ciphertext size. Furthermore, security analysis demonstrates that the proposed scheme is resilient against various security threats to smart grids.

On Privacy-Preserving Protocols for Smart Metering Systems

On Privacy-Preserving Protocols for Smart Metering Systems PDF

Author: Fábio Borges de Oliveira

Publisher: Springer

Published: 2016-08-13

Total Pages: 164

ISBN-13: 331940718X

DOWNLOAD EBOOK →

This book presents current research in privacy-preserving protocols for smart grids. It contains several approaches and compares them analytically and by means of simulation. In particular, the book introduces asymmetric DC-Nets, which offer an ideal combination of performance and features in comparison with homomorphic encryption; data anonymization via cryptographic protocols; and data obfuscation by means of noise injection or by means of the installation of storage banks. The author shows that this theory can be leveraged into several application scenarios, and how asymmetric DC-Nets are generalizations of additive homomorphic encryption schemes and abstractions of symmetric DC-Nets. The book provides the reader with an understanding about smart grid scenarios, the privacy problem, and the mathematics and algorithms used to solve it.

Smart Grids: Security and Privacy Issues

Smart Grids: Security and Privacy Issues PDF

Author: Kianoosh G. Boroojeni

Publisher: Springer

Published: 2016-10-22

Total Pages: 120

ISBN-13: 3319450506

DOWNLOAD EBOOK →

This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science. It presents comprehensive insight to understanding the big picture of privacy and security challenges in both physical and information aspects of smart grids. The authors utilize an advanced interdisciplinary approach to address the existing security and privacy issues and propose legitimate countermeasures for each of them in the standpoint of both computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools and illustrated by real-world examples.

Privacy-Enhancing Fog Computing and Its Applications

Privacy-Enhancing Fog Computing and Its Applications PDF

Author: Xiaodong Lin

Publisher: Springer

Published: 2018-11-12

Total Pages: 89

ISBN-13: 3030021130

DOWNLOAD EBOOK →

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.

Security and Privacy in Smart Grid

Security and Privacy in Smart Grid PDF

Author: Asmaa Abdallah

Publisher: Springer

Published: 2018-07-26

Total Pages: 126

ISBN-13: 3319936778

DOWNLOAD EBOOK →

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

Smart Cities Cybersecurity and Privacy

Smart Cities Cybersecurity and Privacy PDF

Author: Danda B. Rawat

Publisher: Elsevier

Published: 2018-12-04

Total Pages: 303

ISBN-13: 0128150335

DOWNLOAD EBOOK →

Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city’s physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications. Consolidates in one place state-of-the-art academic and industry research Provides a holistic and systematic framework for design, evaluating, and deploying the latest security solutions for smart cities Improves understanding and collaboration among all smart city stakeholders to develop more secure smart city architectures

Internet of Things Security and Privacy

Internet of Things Security and Privacy PDF

Author: Ali Ismail Awad

Publisher: CRC Press

Published: 2023-12-06

Total Pages: 273

ISBN-13: 1003810276

DOWNLOAD EBOOK →

The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems. The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. This book is a valuable companion and comprehensive reference for postgraduate and senior undergraduate students taking an advanced IoT security and privacy course.