Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








405 Hits in 8.6 sec

Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid

2018 KSII Transactions on Internet and Information Systems  
To improve this issue, Shen et al. propose an efficient privacy-preserving cube-data aggregation scheme in which the system model consists of two-level GW.  ...  Currently, many of schemes for smart grid data aggregation are based on a one-level gateway (GW) topology.  ...  In addition, privacy-preserving data aggregation schemes also use the digital signature techniques to ensure the data integrity and authenticity [21] [22] .  ... 
doi:10.3837/tiis.2018.04.009 fatcat:7a7nmebkdramzouvjkflqm2kcu

A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection

Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin
2019 IEEE Transactions on Smart Grid  
Smart grid allows fine-grained smart metering data collection which can improve the efficiency and reliability of the grid.  ...  In this paper, we propose a novel protocol that allows suppliers and grid operators to collect users' aggregate metering data in a secure and privacy-preserving manner.  ...  Another approach to aggregate data in a privacy-preserving (and efficient) manner is MPC. Danezis et al.  ... 
doi:10.1109/tsg.2019.2906016 fatcat:5b3gtnez3zgzhmxvslrwsowkn4

A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection [article]

Mustafa A. Mustafa, Sara Cleemput, Abelrahaman Aly, Aysajan Abidin
2019 arXiv   pre-print
In this paper we propose a novel protocol that allows suppliers and grid operators to collect users' aggregate metering data in a secure and privacy-preserving manner.  ...  Our protocol is designed for a realistic scenario in which the data need to be sent to different parties, such as grid operators and suppliers.  ...  Another approach to aggregate data in a privacy-preserving (and efficient) manner is MPC. Danezis et al.  ... 
arXiv:1801.08353v2 fatcat:5gk67zn55rf5rc3gadnmc2e3oi

Theory-Inspired Optimizations for Privacy Preserving Distributed OLAP Algorithms [chapter]

Alfredo Cuzzocrea, Elisa Bertino
2014 Lecture Notes in Computer Science  
Actually, a lot of attention focusing on the problem of computing privacy-preserving OLAP cubes effectively and efficiently arises.  ...  and the (privacy-preserving) cube delivery level.  ...  [18] propose a novel incremental method for supporting secure and privacy preserving information aggregation over smart grids; this method introduces a novel scheme according to which data aggregation  ... 
doi:10.1007/978-3-319-07617-1_39 fatcat:7otbhzexl5buhmmav43kml4uze

A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP [chapter]

Alfredo Cuzzocrea, Elisa Bertino
2014 Lecture Notes in Computer Science  
of aspects in the context of privacy preserving distributed OLAP, such as privacy preserving knowledge fruition schemes and query optimization.  ...  Particularly, our framework makes use of the CUR matrix decomposition technique as the elementary component for computing privacy preserving two-dimensional OLAP views effectively and efficiently.  ...  [23] propose a novel incremental method for supporting secure and privacy preserving information aggregation over smart grids; this method introduces a novel scheme according to which data aggregation  ... 
doi:10.1007/978-3-662-45550-0_16 fatcat:xww5xufphvf65ljxhvbkqreo3m

EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks [article]

Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya
2018 arXiv   pre-print
In this paper, we propose EPIC, an efficient and privacy-preserving data collection scheme with E2E data integrity verification for AMI networks.  ...  Various privacy-preserving schemes for collecting fine-grained readings have been proposed for AMI networks.  ...  For cryptographic schemes, the existing schemes use anonymization or data aggregation to preserve privacy. Anonymization.  ... 
arXiv:1810.01851v1 fatcat:dzp27mjtljab5o7voapmnucd3e

A Survey of Blockchain Enabled Cyber-Physical Systems

Rathore, Mohamed, Guizani
2020 Sensors  
Smart grids,health-care systems, and industrial production processes are some of the many applications that canbenefit from the blockchain technology and will be discussed in the paper.  ...  The advancement of these systems needs to incorporate an unequivocal spotlight onmaking these systems efficient.  ...  Acknowledgments: The authors would like to thank Abhay Samant, University of Texas, Austin, USA for his valuable feedback and collection of data for the study conducted in this paper.  ... 
doi:10.3390/s20010282 pmid:31947860 pmcid:PMC6983181 fatcat:ohnywh55t5bunmnlixzesjobiq

A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid

Samir M. Umran, Songfeng Lu, Zaid Ameen Abduljabbar, Xueming Tang
2023 Computers Materials & Continua  
We also address data aggregation operations, which are considered challenging in electric power smart grids.  ...  The proposed scheme offers a double layer of data encryption, device authentication, scalability, high performance, low power consumption, and improves the industry's operations; provides efficient access  ...  While the scheme in [26] depended on a centralized mechanism and utilized ABI as a consensus mechanism, and was therefore susceptible to numerous security threats such as single-node crashes, bottlenecks  ... 
doi:10.32604/cmc.2023.034331 fatcat:bkv23ruauvb6dnqonzduk5xmci

Smart Wireless Access Points for Pervasive Computing [chapter]

Roel Ocampo, Hermann de Meer
2004 Lecture Notes in Computer Science  
We present an integrated framework applicable to both user-and network-oriented adaptation, that uses a common base for sensing context.  ...  Smart wireless access points called M-WASPs provide a wireless network infrastructure, and perform sensing, adaptation and other cognitive functions in a distributed fashion, within a pervasive computing  ...  Having a simple and efficient scheme for representing location and spaces, and other forms of context in general, is desirable for the following reasons: Support for simple but smart devices.  ... 
doi:10.1007/978-3-540-24614-5_24 fatcat:3qbi3ireezh3jbd43goidisf4i

(So) Big Data and the transformation of the city

Gennady Andrienko, Natalia Andrienko, Chiara Boldrini, Guido Caldarelli, Paolo Cintia, Stefano Cresci, Angelo Facchini, Fosca Giannotti, Aristides Gionis, Riccardo Guidotti, Michael Mathioudakis, Cristina Ioana Muntean (+6 others)
2020 International Journal of Data Science and Analytics  
The paper covers the main aspects of urban data analytics, focusing on privacy issues, algorithms, applications and services, and georeferenced data from social media.  ...  The exponential increase in the availability of large-scale mobility data has fueled the vision of smart cities that will transform our lives.  ...  Availability of data and materials The data and methods that support the findings described in this paper can be found in the SoBigData catalogue at https://sobigdata.d4science.org/catalogue-sobigdata.  ... 
doi:10.1007/s41060-020-00207-3 fatcat:k4eh5k2epjblzf6myc7tiw5gam

From wireless sensor networks towards cyber physical systems

Fang-Jing Wu, Yu-Fen Kao, Yu-Chee Tseng
2011 Pervasive and Mobile Computing  
In [13] , a vehicular participatory sensing model is proposed for privacy-preserving map reconstruction by linear regression.  ...  This is known as smart grid (or power grid) [11, 167, 168] . Ref. [11] discusses a smart grid test bed built in Korean. It uses ZigBee smart tags to monitor and control the power usage.  ... 
doi:10.1016/j.pmcj.2011.03.003 fatcat:ruaxvpykujgopjtx3pllkclp4u

Applications of Blockchains in the Internet of Things: A Comprehensive Survey

Muhammad Salek Ali, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, Mubashir Husain Rehmani
2018 IEEE Communications Surveys and Tutorials  
the current centralized IoT models, followed by recent advances made both in industry and research to solve these challenges and effectively use blockchains to provide a decentralized, secure medium for  ...  In this context, the blockchain is seen as the missing link toward building a truly decentralized, trustless, and secure environment for the IoT and, in this survey, we aim to shape a coherent and comprehensive  ...  [213] enable a shared data economy by leveraging zero-knowledge schemes and privacy-preserving smart contracts.  ... 
doi:10.1109/comst.2018.2886932 fatcat:b6m4roave5c7tpdlzgguustf6e

Applications of Explainable AI for 6G: Technical Aspects, Use Cases, and Research Challenges [article]

Shen Wang, M.Atif Qureshi, Luis Miralles-Pechuán, Thien Huynh-The, Thippa Reddy Gadekallu, Madhusanka Liyanage
2023 arXiv   pre-print
However, the risk of losing control over decision-making may increase due to high-speed, data-intensive AI decision-making beyond designers' and users' comprehension.  ...  These decisions can range widely, from network resource allocation to collision avoidance for self-driving cars.  ...  [214] proposed a secured demandside management engine for the smart grid using Naive Bayes, a machine learning algorithm, to efficiently preserve the energy utilization in the smart grid.  ... 
arXiv:2112.04698v2 fatcat:h6rhm7jevvcg3du3aktdjgf43q

Applying the Smart Grid Architecture Model for Designing and Validating System-of-Systems in the Power and Energy Domain: A European Perspective

Mathias Uslar, Sebastian Rohjans, Christian Neureiter, Filip Pröstl Andrén, Jorge Velasquez, Cornelius Steinbrink, Venizelos Efthymiou, Gianluigi Migliavacca, Seppo Horsmanheimo, Helfried Brunner, Thomas Strasser
2019 Energies  
The Smart Grid Architecture Model (SGAM), an approach that has been developed during the last couple of years, provides a very good and structured basis for the design, development, and validation of new  ...  This review therefore provides a comprehensive overview of the state-of-the-art and related work for the theory, distribution, and use of the aforementioned architectural concept.  ...  point for a Smart Grid cyber security risk assessment [54] , to identify the target of evaluation in a Smart Grid for a risk analysis [55] , and to define use cases for identifying data privacy issues  ... 
doi:10.3390/en12020258 fatcat:slk52wrge5a7lafputkxqp6qhq

Building energy metering and environmental monitoring – A state-of-the-art review and directions for future research

Muhammad Waseem Ahmad, Monjur Mourshed, David Mundow, Mario Sisinni, Yacine Rezgui
2016 Energy and Buildings  
Privacy and data protection, however, remain a concern for data aggregators and end-users.  ...  and future directions of research and development -for use a reference, as well as for generating further interest in this expanding research area.  ...  Data protection and privacy is a main concern for both end users and data aggregators. Other challenges including cost, interoperability, lack of ICT infrastructure are also reviewed.  ... 
doi:10.1016/j.enbuild.2016.03.059 fatcat:bsfstfqgejeunpfwc6ncusosve
« Previous Showing results 1 — 15 out of 405 results