2013 22nd International Conference on Computer Communication and Networks (ICCCN) 2013
DOI: 10.1109/icccn.2013.6614158
|View full text |Cite
|
Sign up to set email alerts
|

Network Coding Based Encryption System for Advanced Metering Infrastructure

Abstract: In a smart grid system, the metering data collected by smart meters (SMs) and transferred via an Advanced Metering Infrastructure to the utility for billing purposes, and to the demand-response system to achieve cost effective resource allocation. The collected data at the SMs are sent to aggregators (AGRs), which in turn forward these data to a higher layer data collection system using secured communications. However, metering data are typically transferred between SMs and AGRs over wireless multi-hop communi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…These approaches take advantage of in-network data processing (also referred to as aggregation) to induce some obfuscating operations on the transmitted data [24]- [31]. Examples of this category include cluster-based private data aggregation [24] and its integrity enhanced version [25], secret perturbation [26], k-indistinguishable privacy-preserving data aggregation [27], a centralized authentication server based in-network aggregation for AMI [28], [29], a secure architecture for distributed aggregation of additive data [30], and a network coding-based encryption between smart meters and aggregators [31]. Unlike these techniques, our problem formulation does not assume any statistical property for in-network processing and deliver the MD data unaltered to the PO.…”
Section: Related Workmentioning
confidence: 99%
“…These approaches take advantage of in-network data processing (also referred to as aggregation) to induce some obfuscating operations on the transmitted data [24]- [31]. Examples of this category include cluster-based private data aggregation [24] and its integrity enhanced version [25], secret perturbation [26], k-indistinguishable privacy-preserving data aggregation [27], a centralized authentication server based in-network aggregation for AMI [28], [29], a secure architecture for distributed aggregation of additive data [30], and a network coding-based encryption between smart meters and aggregators [31]. Unlike these techniques, our problem formulation does not assume any statistical property for in-network processing and deliver the MD data unaltered to the PO.…”
Section: Related Workmentioning
confidence: 99%
“…Another category for providing security exploits the aggregate statistics of the sensed data, such as summation, average, minimum, maximum, and so on. These approaches take advantage of in-network data processing (also referred to as aggregation) to apply some obfuscating operations on the transmitted data [35], [58], [73], [78], [79], [98], [101], [124], [142], and [162]. A few common examples in this category include cluster-based private data aggregation [78] and its integrity enhanced version [79], secret perturbation [58], k-indistinguishable privacy-preserving data aggregation [73], a centralized authentication server based in-network aggregation for AMI [98,162], homomorphic encryption-based aggregation [28,33,101], a secure architecture for distributed secure hierarchical data collection aggregation of additive data [141,142], a secure and scalable data collection protocol for smart meter data [87,152], multifunctional, privacy-protecting aggregation [29], and a network coding-based encryption between smart meters and aggregators [124].…”
Section: Aggregationmentioning
confidence: 99%
“…Another category for providing security exploits the aggregate statistics of the sensed data, such as summation, average, minimum, maximum, etc. These approaches take advantage of in-network data processing (also referred to as aggregation) to induce some obfuscating operations on the transmitted data [12]- [20]. Our problem formulation does not assume any statistical property for in-network processing.…”
Section: Related Workmentioning
confidence: 99%