2017
DOI: 10.1155/2017/2539673
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

Abstract: Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isola… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…On the basis of above performance analysis, we can conclude that scheme of [18] is better than other schemes [12,17,20,21,22,23,24,25] whereas scheme [18] has used 21 times multiplication operations. So, it is clear that the proposed scheme is more efficient than other existed literatures [12,17,18,20,21,22,23,24,25] because it uses only 8 times XOR operations which is more efficient than the 21 times of multiplication operations Figures 3 & 4 deduces that the proposed work requires less computation cost as compared to the existing works [12,17,18,20,21,22,23,24,25]. The proposed scheme has used the visual cryptography technique instead of public cryptography, which is simple and easy to implement than public cryptography.…”
Section: B Performance Analysismentioning
confidence: 88%
See 2 more Smart Citations
“…On the basis of above performance analysis, we can conclude that scheme of [18] is better than other schemes [12,17,20,21,22,23,24,25] whereas scheme [18] has used 21 times multiplication operations. So, it is clear that the proposed scheme is more efficient than other existed literatures [12,17,18,20,21,22,23,24,25] because it uses only 8 times XOR operations which is more efficient than the 21 times of multiplication operations Figures 3 & 4 deduces that the proposed work requires less computation cost as compared to the existing works [12,17,18,20,21,22,23,24,25]. The proposed scheme has used the visual cryptography technique instead of public cryptography, which is simple and easy to implement than public cryptography.…”
Section: B Performance Analysismentioning
confidence: 88%
“…On the basis of above statement, we can say that multiplication operator is more efficient operator than bilinear and exponential operators. From table 2 and 3, it is clear that among all the existing literatures, ref [18] is better than other ref [12,17,20,21,22,23,24,25] for n ≥ 9. S. Zhang et al [18] have used only 21 times multiplication operations.…”
Section: B Performance Analysismentioning
confidence: 92%
See 1 more Smart Citation
“…It opens up a new opportunity to connect people to sensor devices distributed around them. With the development of the sensor technologies, a lot of IoT applications have been designed, such as healthcare services, smart grid devices [2]- [4], smart transport systems [5], [6] and smart city etc., which enhance the living conditions greatly. In the context of IoT application domains, there exist two types of networks, i.e., distributed and centralized networks [7].…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless, the second type are the ones that cannot be easily covered by the data communication network. The reasons for why we have such isolated devices have been comprehensively discussed and explained in References For example, one of the main reasons is that most of these devices are located in distant places, which makes the extension of the network very costly. Therefore, as illustrated in Figure , the electricity service provider (ESP) reads consumption reports from the isolated smart meters (ISMs) by the utilization of a handheld and portable smart reader device and sending one of its worker to their physical location.…”
Section: Introductionmentioning
confidence: 99%