2011 IEEE Global Telecommunications Conference - GLOBECOM 2011 2011
DOI: 10.1109/glocom.2011.6134566
|View full text |Cite
|
Sign up to set email alerts
|

Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(17 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…From that point forward, the investigation of protection in shrewd matrix has begun to produce a great deal of enthusiasm for the exploration network and industry especially with regards to the accumulation and the utilization of vitality utilization information gathered from homes that are utilizing the savvy lattice innovation. [22] stated that, a brilliant framework organized as 3 layers are considered by the creators, the 3 essential layers: at the most elevated layer or the upper, control focus is present kept up by the administrator of power, second layer comprises of various substations inside the circulation arrange thereby every SS(substation) is in charge of the region's power supply as well as the least layer has the shrewd meters that are deployed or set in clients' premises as appeared in Figure 4. i.e.the figure given below The proposed Anonymous Credential engineering [22] jelly clients' security data, including their day by day power utilization design from outsiders just as from the power administrator.…”
Section: Protectionmentioning
confidence: 99%
“…From that point forward, the investigation of protection in shrewd matrix has begun to produce a great deal of enthusiasm for the exploration network and industry especially with regards to the accumulation and the utilization of vitality utilization information gathered from homes that are utilizing the savvy lattice innovation. [22] stated that, a brilliant framework organized as 3 layers are considered by the creators, the 3 essential layers: at the most elevated layer or the upper, control focus is present kept up by the administrator of power, second layer comprises of various substations inside the circulation arrange thereby every SS(substation) is in charge of the region's power supply as well as the least layer has the shrewd meters that are deployed or set in clients' premises as appeared in Figure 4. i.e.the figure given below The proposed Anonymous Credential engineering [22] jelly clients' security data, including their day by day power utilization design from outsiders just as from the power administrator.…”
Section: Protectionmentioning
confidence: 99%
“…A series of privacy protection schemes were introduced to let users remain anonymous by allowing only encrypted information or minimum user information to be disclosed to the system administrators; however, the security levels and the means of protection provided by those schemes vary and can be inadequate sometimes. The blind signature [17] or the homomorphic encryption [18] scheme is mainly used [19]. To simply describe them, for instance, the former is a scheme where the first party (Party 1) attaches his signature to the message generated by the second party (Party 2) without having any knowledge about the content of the message.…”
Section: Related Researchmentioning
confidence: 99%
“…Chu et al made use of physical anonymous channel and signature to blur the relationship between signer and his signature. There is a third party escrow mechanism to authenticate the meter's reading, and it is difficult to associate the reading with a particular smart meter . Zargar and Yaghmaee protected the user privacy by using the group signature of the message, and the control center verifies its validity without revealing the signer's identity.…”
Section: Introductionmentioning
confidence: 99%