2016 IEEE Global Communications Conference (GLOBECOM) 2016
DOI: 10.1109/glocom.2016.7841782
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
30
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(31 citation statements)
references
References 10 publications
1
30
0
Order By: Relevance
“…3, he can obtain v i,j P and v j,i P . However, given Point Multiplication (1024bit) 1.36 µs T 11 Paillier encryption (1024bits) 19.47 ms T 12 Paillier decryption (1024bits) 18.88 ms T 13 Paillier aggregation (1024bits) 19.9 µs T 14 Paillier Ciphertext Exponentiation 24.25 ms v i,j P and P , it is computationally infeasible to obtain v i,j . Therefore, only the involved parties can compute the keys.…”
Section: ) Data Integritymentioning
confidence: 99%
See 1 more Smart Citation
“…3, he can obtain v i,j P and v j,i P . However, given Point Multiplication (1024bit) 1.36 µs T 11 Paillier encryption (1024bits) 19.47 ms T 12 Paillier decryption (1024bits) 18.88 ms T 13 Paillier aggregation (1024bits) 19.9 µs T 14 Paillier Ciphertext Exponentiation 24.25 ms v i,j P and P , it is computationally infeasible to obtain v i,j . Therefore, only the involved parties can compute the keys.…”
Section: ) Data Integritymentioning
confidence: 99%
“…The main difference between the conference version and the current version are as follows. First, [14] did not address E2E data integrity, E2E authenticity, attacker identification, dynamic pricing, and details of key management and sharing secret masks offline and efficiently. The journal version addresses all these challenges.…”
mentioning
confidence: 99%
“…In this case, when the aggregator (DC in [23]) colludes with a smart meter SM 2 , then the aggregator can know the usage data of another smart meter SM 1 , which is a serious privacy issue. Apart from [20]- [23], a masking-based multi-hop data aggregation scheme has been proposed in [24]. During data aggregation, each smart meter needs to select n proxies and add masking values to meter readings.…”
Section: A Related Workmentioning
confidence: 99%
“…The role of data traffic distribution in a smart grid network [66][67][68][69][70] can be classified into two sections. The first among these is a home area network (HAN) [71], which involves interaction between the utility and the users through underlying connections such as smart meters and sensors.…”
Section: Smart Grid and 5gmentioning
confidence: 99%