2013
DOI: 10.1109/jsac.2013.130716
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids

Abstract: Abstract-The widespread deployment of Automatic Metering Infrastructures in Smart Grid scenarios rises great concerns about privacy preservation of user-related data, from which detailed information about customer's habits and behaviors can be deduced. Therefore, the users' individual measurements should be aggregated before being provided to External Entities such as utilities, grid managers and third parties.This paper proposes a security architecture for distributed aggregation of additive data, in particul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 92 publications
(63 citation statements)
references
References 23 publications
0
63
0
Order By: Relevance
“…The tamper-proof meter reports the value in a certified form [13]. Similar assumptions can be found in many smart metering schemes such as [14][15][16]. They assume that smart meters are fully trusted or the readings from meters are certified.…”
Section: Assumption the Proposed Scheme Is Based On The Following Asmentioning
confidence: 91%
“…The tamper-proof meter reports the value in a certified form [13]. Similar assumptions can be found in many smart metering schemes such as [14][15][16]. They assume that smart meters are fully trusted or the readings from meters are certified.…”
Section: Assumption the Proposed Scheme Is Based On The Following Asmentioning
confidence: 91%
“…Especially, each wireless smart meter cannot find out any intermediate or final aggregation results. For user-related privacy preservation, References [21] and [22] propose a security architecture for distributed aggregation of smart metering data, and it collects the data and provides communication and cryptographic capabilities by relying on Gateways placed at the customers' premises. In order to resist impersonation and false data injection attacks, Reference [23] proposes an efficient and secure data aggregation scheme which is aimed to provide early detection of impersonation and false data injection attacks using hop-by-hop security, thus minimizing the need to rely entirely on the end receiver for verification.…”
Section: Relate Workmentioning
confidence: 99%
“…as the one proposed in [26]), meaning that the Aggregator node can perform additions on the measurements, but cannot access the individual inputs nor the generated noise. Depending on the available technology and computational power at the Meters, the Aggregator can be implemented either centralized [21] or distributed [26].…”
Section: The Aggregation Architecturementioning
confidence: 99%