2015 IEEE International Conference on Communications (ICC) 2015
DOI: 10.1109/icc.2015.7248377
|View full text |Cite
|
Sign up to set email alerts
|

Privacy for IoT: Involuntary privacy enablement for smart energy systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…Security testing (51) Reports on test beds (47) Energy consumption testing (6) Interoperability Testing (7) Quality of Service (QoS) (7) Network-focused testbeds (10) Virtualized and cloud testbeds (9) End-to-End testbeds (23) Cybersecurity testbeds (5)…”
Section: Secure Strategies Architectures and Protocols (165)mentioning
confidence: 99%
See 1 more Smart Citation
“…Security testing (51) Reports on test beds (47) Energy consumption testing (6) Interoperability Testing (7) Quality of Service (QoS) (7) Network-focused testbeds (10) Virtualized and cloud testbeds (9) End-to-End testbeds (23) Cybersecurity testbeds (5)…”
Section: Secure Strategies Architectures and Protocols (165)mentioning
confidence: 99%
“…Not far from these important areas for privacy, there are plenty of research papers that define privacy for specific applications of IoT. For example, Ukil et al [51] defines the privacy issues within smart energy systems. Here, the study describes the uniqueness of privacy within smart energy systems from the smart meter (component of the smart energy management system) point of view.…”
Section: Security Analysis Approaches and Techniques (23)mentioning
confidence: 99%
“…A secondary and more feasible approach is the use of an outlier/anomaly detection algorithm at the EMU. Anomaly detection algorithms such as Z-score analysis [37], the modified Z-Score [38] or Kurtosis computation [39] enable the EMU with the capability of identifying the installation of a new appliance in the household which was not registered with the EMU earlier. With the help of these algorithms, the EMU keeps a look-out for any anomaly in the power utilization pattern.…”
Section: Step 1: Data Acquisition and Pre-processingmentioning
confidence: 99%
“…Highlighted IoT Privacy Threats cryptographic algorithms, control access management tools, data minimization techniques, and privacy or context awareness protocols (Table I). [1], [67], [44], [36], [18], [53], [22], [5], [64], [30], [7], [13], [77], [59], [73] Data minimization 3 [15], [7], [59] Access control 6 [1], [31], [30], [13], [39], [59] Privacy awareness or context awareness 12 [1], [31], [55], [5], [81], [7], [71], [70], [77], [69], [59], [8] Differential Privacy 0 Other (introspection, trust assessment and evaluation) 3 [34], [6], [40] Not Evaluated Cryptographic techniques and information manipulation 16 [24], [25], [79], [9], [20], [51], [41], [54], [43], [26], [...…”
Section: Threats Solutions Principles Perceptionsmentioning
confidence: 99%
“…Some solutions deploy access control methods, or privacy-awareness applications. For example, in [71], the study proposed the Dynamic Privacy Analyzer (DPA), a solution to make the smart-meter data owner aware of the privacy risks of sharing smart meter data with third parties. On the other hand, almost half of the proposed solutions proposed taking the human out of the loop.…”
Section: Gapsmentioning
confidence: 99%