2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) 2020
DOI: 10.1109/csndsp49049.2020.9249549
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-protection Scheme for Smart Water Grid Based on Blockchain and Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Machine learning is used to implement an energy prediction analytic module for predicting short-term energy consumption to minimize the cost of electricity to consumers. Lalle et al in [223] employ blockchain and machine learning to guarantee the data privacy of smart water grid users. First, k-means++ is used to partition users into clusters, and then a private blockchain is adopted to store user data of each cluster.…”
Section: ) Application In Smart Gridmentioning
confidence: 99%
See 1 more Smart Citation
“…Machine learning is used to implement an energy prediction analytic module for predicting short-term energy consumption to minimize the cost of electricity to consumers. Lalle et al in [223] employ blockchain and machine learning to guarantee the data privacy of smart water grid users. First, k-means++ is used to partition users into clusters, and then a private blockchain is adopted to store user data of each cluster.…”
Section: ) Application In Smart Gridmentioning
confidence: 99%
“…mining pool security strategy [135] --Iterative game mining pool management [129] [130] --Auction -resource management in MEC [138] [139] -Others mining pool management [128] performance analysis [131] mining competition analysis [132] security condition acquisition [136] [226] security in edge networks [140] resource allocation [145] -Optimization theory Convex optimization -security in D2D communication [152] -Geometric programming -resource allocation in IoT [163] -Stochastic programming -optimal algorithm and strategy design in mobile edge network [169] -Lyapunov Optimization DDoS attack avoidance [159] resource allocation in mobile device cloud [164] -Others analytical framework modeling for PBFT [157] sharding security [160] performance analysis [166] [165] security [158] [161], resource allocation in MEC [162], optimal algorithm and strategy design in payment channel network [167] optimal algorithm and strategy design in electric taxi charging scenarios [168] Machine Learning Supervised learning majority-attack avoidance [190] --Unsupervised learning performance optimization [211] security in Bitcoin [204] [205] [206] energy trading [222] data privacy [223] Federated learning -privacy and security in centralized machine learning [193] intrusion identification [208] privacy protection [218] [213] -Deep learning identify malicious nodes [203] application in IoT [217], application in smart grid [221] Reinforcement learning -resource management in IoT …”
Section: A Cryptographymentioning
confidence: 99%
“…This malicious gateway can send fake information to the network server and therefore disturb the network communication. Blockchain technology [44] can bring some solutions to security and privacy problems but an in-depth investigation is required.…”
Section: B Security and Privacymentioning
confidence: 99%
“…Therefore, some researchers propose a privacy protection scheme based on blockchain. Lalle et al [7] proposed a smart water meter privacy protection data aggregation scheme based on blockchain technology and machine learning algorithms, which uses pseudonyms to mask users' identities. Mahmoud et al [8] proposed an intelligent water meter data aggregation mechanism based on distributed ledger and blockchain technology, which uses bloom filter to simulate the identity of customers.…”
Section: Introductionmentioning
confidence: 99%
“…Mahmoud et al [8] proposed an intelligent water meter data aggregation mechanism based on distributed ledger and blockchain technology, which uses bloom filter to simulate the identity of customers. However, neither scheme [7] nor scheme [8] has conducted security analysis and comparative research.…”
Section: Introductionmentioning
confidence: 99%