2013
DOI: 10.1109/tsg.2012.2228240
|View full text |Cite
|
Sign up to set email alerts
|

UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid

Abstract: Abstract-Smart sensing and wireless communication technologies enable the electric power grid system to deliver electricity more efficiently through the dynamic analysis of the electricity demand and supply. The current solution is to extend the traditional static electricity pricing strategy to a time-based one where peak-time prices are defined to influence electricity usage behavior of customers. However, the time-based pricing strategy is not truly dynamic and the electricity resource cannot be optimally u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
97
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 172 publications
(97 citation statements)
references
References 23 publications
0
97
0
Order By: Relevance
“…Optimization of the network smart grid system implies that, in the transient process to reach the equilibrium, some indexes can be optimized. The grid provider is capable of influencing decisions of users in the network by presenting dynamic pricing strategies (Liang et al, 2013;Jiang et al, 2014). It is possible that the smart grid provider and some of the users cooperate to affect decisions of other users, such that the common benefit can be improved.…”
Section: Introductionmentioning
confidence: 99%
“…Optimization of the network smart grid system implies that, in the transient process to reach the equilibrium, some indexes can be optimized. The grid provider is capable of influencing decisions of users in the network by presenting dynamic pricing strategies (Liang et al, 2013;Jiang et al, 2014). It is possible that the smart grid provider and some of the users cooperate to affect decisions of other users, such that the common benefit can be improved.…”
Section: Introductionmentioning
confidence: 99%
“…For example, when λ d = 5 and λ x = 10, as shown in Fig. 7a, the number of information leakage is in the interval [5,15]. However, when λ d = 5 and λ x = 20, as shown in Fig.…”
Section: Eppdr Provides the Forward Secrecy Of Users' Session Keysmentioning
confidence: 94%
“…However, when λ d = 5 and λ x = 20, as shown in Fig. 7c, the number of information leakage is in the interval [5,25]. Note that λ x represents the intensity of X i , where X i is the time interval of Round i .…”
Section: Eppdr Provides the Forward Secrecy Of Users' Session Keysmentioning
confidence: 98%
See 1 more Smart Citation
“…Especially in IoT applications, the ubiquitous but resource-constrained sensors require extremely high efficiency and low overhead. For example, privacypreserving real-time pricing mechanisms require not only effective privacy guarantees for individuals' electricity usage but also fast response to the dynamical changes of demands and supply in the smart grid [24]. Thus, it is important to provide an efficient privacy-preserving method to publish crowdsourced high-dimensional data.…”
Section: Introductionmentioning
confidence: 99%