2017
DOI: 10.3390/cryptography1030020
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Secure and Private Billing Protocols for Smart Metering

Abstract: Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware. These protocols protect the privacy of customer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…This is because key generation and distribution in a cryptographic scheme may result in a security breach when SM data is transmitted through data networks [ 8 , 9 ]. To deal with this scenario, research efforts have been focused on privacy of information, security issues and countermeasures, see [ 10 , 11 , 12 , 13 , 14 ] and reference therein. In this sense, the research effort to secure public-key encryption schemes against classical computing attacks is worth mentioning.…”
Section: Introductionmentioning
confidence: 99%
“…This is because key generation and distribution in a cryptographic scheme may result in a security breach when SM data is transmitted through data networks [ 8 , 9 ]. To deal with this scenario, research efforts have been focused on privacy of information, security issues and countermeasures, see [ 10 , 11 , 12 , 13 , 14 ] and reference therein. In this sense, the research effort to secure public-key encryption schemes against classical computing attacks is worth mentioning.…”
Section: Introductionmentioning
confidence: 99%