2014
DOI: 10.1109/tii.2013.2277938
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
192
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 233 publications
(194 citation statements)
references
References 26 publications
1
192
0
1
Order By: Relevance
“…Recently, many research works have been performed on authentication protocols/schemes for the V2G network [5], [8], [9], privacy preserving authentication [7] and threshold credit-based incentive mechanism [14], privacy-enhanced data aggregation [15], privacy preserving communication [16], and virtual ring architecture for smart grid privacy [17]. However, various possible attacks in the V2G network are still not well investigated.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, many research works have been performed on authentication protocols/schemes for the V2G network [5], [8], [9], privacy preserving authentication [7] and threshold credit-based incentive mechanism [14], privacy-enhanced data aggregation [15], privacy preserving communication [16], and virtual ring architecture for smart grid privacy [17]. However, various possible attacks in the V2G network are still not well investigated.…”
Section: Related Workmentioning
confidence: 99%
“…However, the scheme is just a variant of standard DSA algorithm and does not consider the important aspects in the V2G network, such as privacypreservation of vehicle's sensitive information, prevention against various security attacks, and key management for secure communication. Privacy of the users and communication security of the smart grid are studied in [15] where a batchoriented power-usage data aggregation scheme for the smart grid is proposed. However, the scheme discusses a generic adversary model without any security attack scenario, and does not provide mutual authentication.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…By injecting blinding factors and using Paillier's additive homomorphism encryption scheme [12], Fan et al [17] proposed the first DA scheme for the SG withstanding internal attacks. Compared with related schemes [11,[13][14][15][16], Fan et al's DA scheme [17] could provide better solution of preserving user's privacy in the SG. However, Fan et al's scheme suffers from the key leakage problem because any adversary could extract the user's private key through the public information.…”
Section: Related Workmentioning
confidence: 99%
“…The three schemes are all based on Pallier's homomorphic encryption technology. Fan et al [10] proposed data aggregations scheme based on the subgroup indistinguishability assumption. All the above aggregation schemes are designed for the in-network smart grid devices, and they are used to aggregate individual usage date from different customers.…”
Section: Introductionmentioning
confidence: 99%