2017
DOI: 10.3390/app7101007
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Aggregation and Authentication of Multi-Source Smart Meters in a Smart Grid System

Abstract: Abstract:The smart grid is a promising electrical grid paradigm for enhancing flexibility and reliability in power transmission through two-way communications among grid entities. In the smart grid system, the privacy of usage information measured by individual smart meters has gained significant attention, owing to the possibility of personal information inference. Moreover, efficient and reliable power provisioning can be seriously impeded through illicit manipulations of aggregated data under the influence … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 46 publications
0
10
0
Order By: Relevance
“…In this section, we provide a description of SG architecture and smart grid network model. In addition, this section defines the main security requirement of SGs [2][3][4][5][6].…”
Section: Smart Grid Architecture and Network Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we provide a description of SG architecture and smart grid network model. In addition, this section defines the main security requirement of SGs [2][3][4][5][6].…”
Section: Smart Grid Architecture and Network Modelmentioning
confidence: 99%
“…Without protection, it is easy for an attacker to passively spy on the data at a certain SM or actively forge the aggregation value through compromised SMs. Therefore, it is important to protect the confidentiality and authenticity of the aggregation data in SGs [3].…”
Section: Network Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, a faked fault data can be invented and forwarded to CC or SB. Therefore, without suitable security, the SG cannot perform well as an energy management system [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…We note that the previous works [16][17][18][19][20][21][22][23][24] did not consider NSM application within these protocols. Moreover, none [25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42] focused on NSM use cases and integration with field devices. In this paper, we tested the lab substation equipment and programs implemented to utilize NSM use cases.…”
mentioning
confidence: 99%