2022
DOI: 10.1109/jiot.2021.3090270
|View full text |Cite
|
Sign up to set email alerts
|

The Secure Lattice-Based Data Aggregation Scheme in Residential Networks for Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Artificial intelligence is also proven to be very effective in protecting smart grids, intelligent vehicles, and smart cities from hackers by developing adaptive baseline behavior models, effectively detecting new, unknown attacks by combining known and unknown data sets based on predictive analytics and machine intelligence, as discussed in [156], [157], and [158] respectively. Other examples of technical approaches that have been used to develop security measures for CPS include big data analysis [159], cryptography [160], machine learning [161], deep learning [162], and distributed ledger technology [163]. Importantly also, for making data available from CPS, and sharing, provably private transformations are required that retain data utility, a comprehensive survey of such relevant differentially private techniques for CPS is provided in [164].…”
Section: ) Security and Privacymentioning
confidence: 99%
“…Artificial intelligence is also proven to be very effective in protecting smart grids, intelligent vehicles, and smart cities from hackers by developing adaptive baseline behavior models, effectively detecting new, unknown attacks by combining known and unknown data sets based on predictive analytics and machine intelligence, as discussed in [156], [157], and [158] respectively. Other examples of technical approaches that have been used to develop security measures for CPS include big data analysis [159], cryptography [160], machine learning [161], deep learning [162], and distributed ledger technology [163]. Importantly also, for making data available from CPS, and sharing, provably private transformations are required that retain data utility, a comprehensive survey of such relevant differentially private techniques for CPS is provided in [164].…”
Section: ) Security and Privacymentioning
confidence: 99%
“…Among others, syndrome decoding, low weight codewords, large weight ternary syndrome decoding, McEliece-Goppa syndrome decoding, rank-metric syndrome decoding, and syndrome decoding in various other metrics are important challenges to address in the future. [241] applied a data aggregation scheme in residential networks for smart grids. In this approach, lattice-based homomorphic cryptography is applied for resisting the networks against quantum attacks.…”
Section: Chalkias Etmentioning
confidence: 99%
“…Future computation technologies might bring risks to cybersecurity, along with the development of quantum computers, which are believed to be capable of breaking most of the commonly used encryption systems nowadays. This has brought an urgency to develop and examine many candidates for post-quantum cryptographic systems to secure data transmission in energy systems monitoring (ESM) [32,33].…”
Section: Introductionmentioning
confidence: 99%