2016
DOI: 10.1109/tsg.2015.2449278
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
40
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 92 publications
(40 citation statements)
references
References 24 publications
0
40
0
Order By: Relevance
“…The tamper-proof meter reports the value in a certified form [13]. Similar assumptions can be found in many smart metering schemes such as [14][15][16]. They assume that smart meters are fully trusted or the readings from meters are certified.…”
Section: Assumption the Proposed Scheme Is Based On The Following Asmentioning
confidence: 92%
“…The tamper-proof meter reports the value in a certified form [13]. Similar assumptions can be found in many smart metering schemes such as [14][15][16]. They assume that smart meters are fully trusted or the readings from meters are certified.…”
Section: Assumption the Proposed Scheme Is Based On The Following Asmentioning
confidence: 92%
“…They used a trusted third party which can conduct key revocation, and the third party can be easily duplicated in case power outages occur. Jo et al (2016) proposed efficient and privacy-preserving protocols for a smart grid in [7]. The proposed protocols were shown to be robust against attacks of data collection unit (DCU) compromise attacks.…”
Section: Related Workmentioning
confidence: 99%
“…However, withholding usage information prevents utility providers from gaining any improved forecasting information and from selling the consumption measurements. This problem may be solved by also using protocols designed to report temporally accurate billing information while keeping the identity of the meter anonymous as proposed in [12][13][14].…”
Section: Related Workmentioning
confidence: 99%