2014 International Conference on Computer, Information and Telecommunication Systems (CITS) 2014
DOI: 10.1109/cits.2014.6878971
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving and Cheat-Resilient electricity consumption reporting Scheme for smart grids

Abstract: One of the significant benefits of smart grid as compared to conventional power grid is the capability to collect fine-grained data from each smart meter remotely, thereby enabling utility provider to balance load effectively and offer time-adaptive pricing schemes. Nevertheless, the ability to read fine-granular measurements constitutes a serious privacy threat to the consumers. Therefore, it is crucial to consider the privacy issues in smart grid in order to preserve consumers' privacy and protect data integ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(19 citation statements)
references
References 15 publications
0
19
0
Order By: Relevance
“…Communication Overhead (CO) in Hayouni et al [5] is also high as it distributes two sets of key vectors to each node for a certain time and also adds two tags to each message for integrity, which create extra burden in the network. CO of [13] is a slightly high than [10] as it sends all the secret to privacy Secret Sharing Prevent nodes from reconstructing and retrieving the hidden data even having all the shares Do not discuss the mechanism to feed the variables in sensor nodes. 6…”
Section: Communication Overheadmentioning
confidence: 99%
See 3 more Smart Citations
“…Communication Overhead (CO) in Hayouni et al [5] is also high as it distributes two sets of key vectors to each node for a certain time and also adds two tags to each message for integrity, which create extra burden in the network. CO of [13] is a slightly high than [10] as it sends all the secret to privacy Secret Sharing Prevent nodes from reconstructing and retrieving the hidden data even having all the shares Do not discuss the mechanism to feed the variables in sensor nodes. 6…”
Section: Communication Overheadmentioning
confidence: 99%
“…Kumar and Madria [8] have both medium SL and EC. Yip et al [10] and callegary et al [13] can both have high sensor life. Due to repeated encryption and decryption of message Bista et al [9] provide small SL and medium EC.…”
Section: Sensor Node Life and Energy Consumptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Sook-Chin Yip et al [33] employ an incremental hash function to conceal the consumer data while allowing the utility company to check the integrity of user data. The approach is divided into a threestep procedure: 1) the real time power consumption is converted to a corresponding cost using a quadratic cost function which is then hashed with an incremental hash function.…”
Section: Solutions For Privacymentioning
confidence: 99%