2012 Proceedings IEEE INFOCOM Workshops 2012
DOI: 10.1109/infcomw.2012.6193469
|View full text |Cite
|
Sign up to set email alerts
|

A security framework for smart metering with multiple data consumers

Abstract: Abstract-The increasing diffusion of Automatic Meter Reading (AMR) has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about the habits of the users can be inferred. On the other hand, aggregated measurements about consumption are crucial for several goals, including resource provisioning, forecasting, and monitoring. This paper proposes a framework for allowing information Consumers, such as utilities and third parties, to collect data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…4: Evaluation on utility, accuracy and computation overhead a system that can tolerate some offline clients, but a trusted dealer and a trusted initial setup phase between all participants and the aggregator are still needed. Rottondi et al [28] also discussed node failures but they addressed a different issue from this paper.…”
Section: Related Workmentioning
confidence: 86%
“…4: Evaluation on utility, accuracy and computation overhead a system that can tolerate some offline clients, but a trusted dealer and a trusted initial setup phase between all participants and the aggregator are still needed. Rottondi et al [28] also discussed node failures but they addressed a different issue from this paper.…”
Section: Related Workmentioning
confidence: 86%
“…Moreover, the smart meter has to perform hard computations, and therefore, the computation overhead on the NAN gateway is larger when there are many thousands of meters. Moreover, more schemes on homomorphic encryption can be found in [166], [184]- [187].…”
Section: He Data Managementmentioning
confidence: 99%
“…The first category of techniques built cryptographic protocols to directly aggregate or analyze such meter readings without sharing the raw data. For instance, Rottondi et al [19] proposed a privacy preserving infrastructure based on cryptographic primitives to enable utilities and data consumers to collect and aggregate metering data. The second category of techniques obfuscate the meter readings to prevent adversaries from learning the status of the appliances at different times.…”
Section: Related Workmentioning
confidence: 99%