2014 IEEE International Conference on Smart Grid Communications (SmartGridComm) 2014
DOI: 10.1109/smartgridcomm.2014.7007664
|View full text |Cite
|
Sign up to set email alerts
|

Secure data collection in constrained tree-based Smart Grid environments

Abstract: To facilitate more efficient control, massive amounts of sensors or measurement devices will be deployed in the Smart Grid. Data collection then becomes non-trivial. In this paper, we study the scenario where a data collector is responsible for collecting data from multiple measurement devices, but only some of them can communicate with the data collector directly. Others have to rely on other devices to relay the data. We first develop a communication protocol so that the data reported by each device is prote… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…In this paper, resources and policies were manually configured by IoT device owners. In the future, we could try to let the smart gateway act as a data collector to proactively detect the device resources in the access network, automatically deploy access control policies for each new IoT device, and quickly and safely collect all data resources based on constrained trees [ 34 ], giving the system intelligence.…”
Section: Conclusion and Prospectsmentioning
confidence: 99%
“…In this paper, resources and policies were manually configured by IoT device owners. In the future, we could try to let the smart gateway act as a data collector to proactively detect the device resources in the access network, automatically deploy access control policies for each new IoT device, and quickly and safely collect all data resources based on constrained trees [ 34 ], giving the system intelligence.…”
Section: Conclusion and Prospectsmentioning
confidence: 99%
“…These approaches take advantage of in-network data processing (also referred to as aggregation) to apply some obfuscating operations on the transmitted data [35], [58], [73], [78], [79], [98], [101], [124], [142], and [162]. A few common examples in this category include cluster-based private data aggregation [78] and its integrity enhanced version [79], secret perturbation [58], k-indistinguishable privacy-preserving data aggregation [73], a centralized authentication server based in-network aggregation for AMI [98,162], homomorphic encryption-based aggregation [28,33,101], a secure architecture for distributed secure hierarchical data collection aggregation of additive data [141,142], a secure and scalable data collection protocol for smart meter data [87,152], multifunctional, privacy-protecting aggregation [29], and a network coding-based encryption between smart meters and aggregators [124]. Another one is reported in [110].…”
Section: Aggregationmentioning
confidence: 99%