2016
DOI: 10.48550/arxiv.1611.07722
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Privacy-preserving Schemes for Smart Grid Communications

Mohamed Amine Ferrag,
Leandros A. Maglaras,
Helge Janicke
et al.

Abstract: In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids. Based on the communication and system models, we classify these schemes that are published between 2013 and 2016, in five categories, including, 1) Smart grid with the advanced metering infrastructure, 2) Data aggregation communications, 3) Smart grid marketing archite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 148 publications
(450 reference statements)
0
3
0
Order By: Relevance
“…The scheme is resistant to differential attacks and keeps consumers information secret with an acceptable noise rate. PDAFT [7], DPAFT [4], and MuDA [7], shows nearly same characteristics with differences on their cryptographic methods [12]. PDAFT employs homomorphic Paillier cryptosystem [23], while DPAFT and MUDA use Boneh-Goh-Nissim cryptosystem [5].…”
Section: Related Workmentioning
confidence: 98%
“…The scheme is resistant to differential attacks and keeps consumers information secret with an acceptable noise rate. PDAFT [7], DPAFT [4], and MuDA [7], shows nearly same characteristics with differences on their cryptographic methods [12]. PDAFT employs homomorphic Paillier cryptosystem [23], while DPAFT and MUDA use Boneh-Goh-Nissim cryptosystem [5].…”
Section: Related Workmentioning
confidence: 98%
“…22 are published between 2011 and 2016. We noted here that we have reviewed some authentication protocols proposed for secure smart grid communications in our survey in [164], namely, the schemes in [254], [255], [256], [33], [257], [258], [259], [260], [261]. In this subsection, we will review only the works that are not reviewed in the survey [164].…”
Section: Authentication Protocols For Ioementioning
confidence: 99%
“…Differential attack: In a differential privacy attack, the adversary can infer information from two adjacent datasets [7,12,34,35].…”
mentioning
confidence: 99%