2011
DOI: 10.1109/tsg.2011.2160975
|View full text |Cite
|
Sign up to set email alerts
|

ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 66 publications
(41 citation statements)
references
References 11 publications
0
36
0
Order By: Relevance
“…c) analyze real smart metering information sampled twice a minute over a period of thirteen days and d) appraise the protection offered by completely different power mixture algorithms. Major factors that confirm the potency of the projected power mixture algorithms are known like battery capacity and power, and user preferences for privacy based mostly allocations of battery energy quotas [1]. During this paper, Onion routing is an infrastructure for personal communication over a public network.…”
Section: Related Workmentioning
confidence: 96%
“…c) analyze real smart metering information sampled twice a minute over a period of thirteen days and d) appraise the protection offered by completely different power mixture algorithms. Major factors that confirm the potency of the projected power mixture algorithms are known like battery capacity and power, and user preferences for privacy based mostly allocations of battery energy quotas [1]. During this paper, Onion routing is an infrastructure for personal communication over a public network.…”
Section: Related Workmentioning
confidence: 96%
“…To address security and privacy problems, specific techniques can be applied, such as data perturbation techniques in which users broadcast a noisy version of their individual power demand. Additionally, also ESSs can be configured to disguise the actual appliances' electricity consumption [104,105].…”
Section: Deterministic Approach To Dsm For Cooperative Usersmentioning
confidence: 99%
“…Load signature moderation [10,11] is a good privacy preserving method that can be used by customers. It requires the presence of an energy storage facility at the customer premises, such as an old battery from an electrical vehicle.…”
Section: Overview Of Smart Grid Privacy Mechanisms In the Literaturementioning
confidence: 99%