2015
DOI: 10.1109/access.2015.2506198
|View full text |Cite
|
Sign up to set email alerts
|

DEP2SA: A Decentralized Efficient Privacy-Preserving and Selective Aggregation Scheme in Advanced Metering Infrastructure

Abstract: This paper proposes a novel solution, called a decentralized, efficient, privacy-preserving, and selective aggregation (DEP2SA) scheme, designed to support secure and user privacy-preserving data collection in the advanced metering infrastructure. DEP2SA is more efficient and applicable in real-life deployment, as compared with the state of the art, by adopting and adapting a number of key technologies: 1) it uses a multi-recipient system model, making it more applicable to a liberalized electricity market; 2)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 47 publications
(58 citation statements)
references
References 37 publications
0
58
0
Order By: Relevance
“…The considered network model is shown in Figure 1. This model was used in [2], [3] to secure uplink smart grid communications. In this paper, we aim to secure the downlink communications.…”
Section: A Network Modelmentioning
confidence: 99%
“…The considered network model is shown in Figure 1. This model was used in [2], [3] to secure uplink smart grid communications. In this paper, we aim to secure the downlink communications.…”
Section: A Network Modelmentioning
confidence: 99%
“…For an aggregator encompassing central controller level aggregation, Mustafa et al [37] considered a multi-recipient model, while Ruj and Nayak [44] examined a single-recipient one. At the gateway level, Li et al [39], He et al [45], Deng and Yang [46], Cho et al [33], Hur et al [47], and He et al [48] constructed an aggregation tree for user privacy.…”
Section: Privacy-preserving Aggregation With Authenticationmentioning
confidence: 99%
“…In their scheme, the central controller receives encrypted measurements and computes aggregation on them. Mustafa et al [37] designed a privacy-preserving selective aggregation scheme in a multi-recipient system model in concert with a bilinear pairing-based BLS short signature, aggregate signature, and additive homomorphic Paillier encryption algorithms. Garcia and Jacobs [38] proposed a privacy-preserving energy metering system based on homomorphic encryption.…”
Section: Privacy-preserving Aggregation With Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…It should be sufficient for the supplier just to know (i) how much electricity in total its customers traded at each period, and (ii) how much per month it should reward/charge each of its customers for the electricity traded on the market. To achieve this, a combination of selective data aggregation using homomorphic encryption (as in [21]), commitment scheme and zero-knowledge proofs (as in [22], [23]) could be used.…”
Section: Security and Privacy Requirementsmentioning
confidence: 99%