Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications PDF

Author: Rongxing Lu

Publisher: Springer

Published: 2016-05-26

Total Pages: 191

ISBN-13: 3319328999

DOWNLOAD EBOOK →

This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the academics, researchers, and graduate students seeking to exploit secure data aggregation techniques in smart grid communications and Internet of Things (IoT) scenarios.

A Framework for Privacy-preserving Data Sharing in Smart Grid

A Framework for Privacy-preserving Data Sharing in Smart Grid PDF

Author: Khalid Alharbi

Publisher:

Published: 2016

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK →

While smart grid introduces a lot of enhancements to the traditional power grid and improves managing and controlling consumers demands, it also introduces security and privacy issues. Therefore, failure to address them will hinder the flourish of smart grid. In this thesis, we propose a novel framework for privacy-preserving data sharing in smart grid using a combination of homomorphic encryption and proxy re-encryption. The proposed framework allows distributed energy resources to be able to analyze the consumers data while preserving the consumers privacy. To the best of our knowledge, the proposed framework is first attempt to consider an important problem concerning data sharing in smart grid. Furthermore, in order to effectively collect consumer (or household) electricity consumption data, we also propose an efficient lightweight privacy- preserving data aggregation scheme, called ELPDA, for smart grid. The proposed scheme aims at resolving the power consumption data security and residential consumer privacy by employing one-time masking technique to protect consumers privacy while achieving lightweight data aggregation. Moreover, we study the situation in which gateways aggregating consumers' data become malicious. Then, we propose a security-enhanced data aggregation scheme for smart grid communications from a homomorphic cryptosystem, trapdoor hash functions and homomorphic authenticators. The distinctive feature of our scheme achieves data confidentiality and integrity against the malicious aggregator (e.g. gateway), meaning that the aggregator is not able to learn the privacy of users or corrupt the power consumption reports during the aggregation process. In addition to the above schemes for smart grid upnlink communications, we propose an efficient and privacy-preserving scheme in order to protect smart grid in downlink communications. Specifically, we propose an efficient identity based signcryption, called EIBSC, providing privacy preservation in downlink communication for smart grids. The proposed scheme is characterized by employing the concealing destination technique on the tree-based network to protect consumer privacy in downlink communication. Furthermore, the proposed scheme employs identity based signcryption to efficiently achieve downlink message source authentication, data integrity and confidentiality. Additionally, compared to other identity-based signcryption schemes, the proposed scheme is more efficient in regards to computational overhead and ciphertext size. Furthermore, security analysis demonstrates that the proposed scheme is resilient against various security threats to smart grids.

Enabling Secure and Privacy Preserving Communications in Smart Grids

Enabling Secure and Privacy Preserving Communications in Smart Grids PDF

Author: Hongwei Li

Publisher: Springer Science & Business Media

Published: 2014-03-25

Total Pages: 74

ISBN-13: 3319049453

DOWNLOAD EBOOK →

This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in smart grids. The brief is designed for researchers and professionals working with computer communication networks and smart grids. Graduate students interested in networks and communication engineering will also find the brief an essential resource.

Security Solutions and Applied Cryptography in Smart Grid Communications

Security Solutions and Applied Cryptography in Smart Grid Communications PDF

Author: Ferrag, Mohamed Amine

Publisher: IGI Global

Published: 2016-11-29

Total Pages: 464

ISBN-13: 1522518304

DOWNLOAD EBOOK →

Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe.

The Impact of Digital Technologies on Public Health in Developed and Developing Countries

The Impact of Digital Technologies on Public Health in Developed and Developing Countries PDF

Author: Mohamed Jmaiel

Publisher: Springer Nature

Published: 2020-06-24

Total Pages: 446

ISBN-13: 3030515176

DOWNLOAD EBOOK →

This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: IoT and AI solutions for e-health; biomedical and health informatics; behavior and activity monitoring; behavior and activity monitoring; and wellbeing technology. *This conference was held virtually due to the COVID-19 pandemic.

Data Analytics for Smart Grids Applications—A Key to Smart City Development

Data Analytics for Smart Grids Applications—A Key to Smart City Development PDF

Author: Devendra Kumar Sharma

Publisher: Springer Nature

Published: 2024-01-03

Total Pages: 466

ISBN-13: 3031460928

DOWNLOAD EBOOK →

This book introduces big data analytics and corresponding applications in smart grids. The characterizations of big data, smart grids as well as a huge amount of data collection are first discussed as a prelude to illustrating the motivation and potential advantages of implementing advanced data analytics in smart grids. Basic concepts and the procedures of typical data analytics for general problems are also discussed. The advanced applications of different data analytics in smart grids are addressed as the main part of this book. By dealing with a huge amount of data from electricity networks, meteorological information system, geographical information system, etc., many benefits can be brought to the existing power system and improve customer service as well as social welfare in the era of big data. However, to advance the applications of big data analytics in real smart grids, many issues such as techniques, awareness, and synergies have to be overcome. This book provides deployment of semantic technologies in data analysis along with the latest applications across the field such as smart grids.

Security and Privacy in Smart Grid

Security and Privacy in Smart Grid PDF

Author: Asmaa Abdallah

Publisher: Springer

Published: 2018-07-26

Total Pages: 126

ISBN-13: 3319936778

DOWNLOAD EBOOK →

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Advanced Technologies, Embedded and Multimedia for Human-centric Computing PDF

Author: Yueh-Min Huang

Publisher: Springer Science & Business Media

Published: 2013-11-13

Total Pages: 1213

ISBN-13: 9400772629

DOWNLOAD EBOOK →

The theme of HumanCom and EMC is focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

Communication Networks for Smart Grids

Communication Networks for Smart Grids PDF

Author: Kenneth C. Budka

Publisher: Springer Science & Business Media

Published: 2014-02-06

Total Pages: 377

ISBN-13: 1447163028

DOWNLOAD EBOOK →

This book presents an application-centric approach to the development of smart grid communication architecture. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response and synchrophasors. Features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of WANs and FANs; explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.

Privacy-Enhancing Fog Computing and Its Applications

Privacy-Enhancing Fog Computing and Its Applications PDF

Author: Xiaodong Lin

Publisher: Springer

Published: 2018-11-12

Total Pages: 89

ISBN-13: 3030021130

DOWNLOAD EBOOK →

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.