A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid
2018
KSII Transactions on Internet and Information Systems
To improve this issue, Shen et al. propose an efficient privacy-preserving cube-data aggregation scheme in which the system model consists of two-level GW. ...
Currently, many of schemes for smart grid data aggregation are based on a one-level gateway (GW) topology. ...
In addition, privacy-preserving data aggregation schemes also use the digital signature techniques to ensure the data integrity and authenticity [21] [22] . ...
doi:10.3837/tiis.2018.04.009
fatcat:7a7nmebkdramzouvjkflqm2kcu
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
2019
IEEE Transactions on Smart Grid
Smart grid allows fine-grained smart metering data collection which can improve the efficiency and reliability of the grid. ...
In this paper, we propose a novel protocol that allows suppliers and grid operators to collect users' aggregate metering data in a secure and privacy-preserving manner. ...
Another approach to aggregate data in a privacy-preserving (and efficient) manner is MPC. Danezis et al. ...
doi:10.1109/tsg.2019.2906016
fatcat:5b3gtnez3zgzhmxvslrwsowkn4
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
[article]
2019
arXiv
pre-print
In this paper we propose a novel protocol that allows suppliers and grid operators to collect users' aggregate metering data in a secure and privacy-preserving manner. ...
Our protocol is designed for a realistic scenario in which the data need to be sent to different parties, such as grid operators and suppliers. ...
Another approach to aggregate data in a privacy-preserving (and efficient) manner is MPC. Danezis et al. ...
arXiv:1801.08353v2
fatcat:5gk67zn55rf5rc3gadnmc2e3oi
Theory-Inspired Optimizations for Privacy Preserving Distributed OLAP Algorithms
[chapter]
2014
Lecture Notes in Computer Science
Actually, a lot of attention focusing on the problem of computing privacy-preserving OLAP cubes effectively and efficiently arises. ...
and the (privacy-preserving) cube delivery level. ...
[18] propose a novel incremental method for supporting secure and privacy preserving information aggregation over smart grids; this method introduces a novel scheme according to which data aggregation ...
doi:10.1007/978-3-319-07617-1_39
fatcat:7otbhzexl5buhmmav43kml4uze
A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP
[chapter]
2014
Lecture Notes in Computer Science
of aspects in the context of privacy preserving distributed OLAP, such as privacy preserving knowledge fruition schemes and query optimization. ...
Particularly, our framework makes use of the CUR matrix decomposition technique as the elementary component for computing privacy preserving two-dimensional OLAP views effectively and efficiently. ...
[23] propose a novel incremental method for supporting secure and privacy preserving information aggregation over smart grids; this method introduces a novel scheme according to which data aggregation ...
doi:10.1007/978-3-662-45550-0_16
fatcat:xww5xufphvf65ljxhvbkqreo3m
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks
[article]
2018
arXiv
pre-print
In this paper, we propose EPIC, an efficient and privacy-preserving data collection scheme with E2E data integrity verification for AMI networks. ...
Various privacy-preserving schemes for collecting fine-grained readings have been proposed for AMI networks. ...
For cryptographic schemes, the existing schemes use anonymization or data aggregation to preserve privacy. Anonymization. ...
arXiv:1810.01851v1
fatcat:dzp27mjtljab5o7voapmnucd3e
A Survey of Blockchain Enabled Cyber-Physical Systems
2020
Sensors
Smart grids,health-care systems, and industrial production processes are some of the many applications that canbenefit from the blockchain technology and will be discussed in the paper. ...
The advancement of these systems needs to incorporate an unequivocal spotlight onmaking these systems efficient. ...
Acknowledgments: The authors would like to thank Abhay Samant, University of Texas, Austin, USA for his valuable feedback and collection of data for the study conducted in this paper. ...
doi:10.3390/s20010282
pmid:31947860
pmcid:PMC6983181
fatcat:ohnywh55t5bunmnlixzesjobiq
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid
2023
Computers Materials & Continua
We also address data aggregation operations, which are considered challenging in electric power smart grids. ...
The proposed scheme offers a double layer of data encryption, device authentication, scalability, high performance, low power consumption, and improves the industry's operations; provides efficient access ...
While the scheme in [26] depended on a centralized mechanism and utilized ABI as a consensus mechanism, and was therefore susceptible to numerous security threats such as single-node crashes, bottlenecks ...
doi:10.32604/cmc.2023.034331
fatcat:bkv23ruauvb6dnqonzduk5xmci
Smart Wireless Access Points for Pervasive Computing
[chapter]
2004
Lecture Notes in Computer Science
We present an integrated framework applicable to both user-and network-oriented adaptation, that uses a common base for sensing context. ...
Smart wireless access points called M-WASPs provide a wireless network infrastructure, and perform sensing, adaptation and other cognitive functions in a distributed fashion, within a pervasive computing ...
Having a simple and efficient scheme for representing location and spaces, and other forms of context in general, is desirable for the following reasons: Support for simple but smart devices. ...
doi:10.1007/978-3-540-24614-5_24
fatcat:3qbi3ireezh3jbd43goidisf4i
(So) Big Data and the transformation of the city
2020
International Journal of Data Science and Analytics
The paper covers the main aspects of urban data analytics, focusing on privacy issues, algorithms, applications and services, and georeferenced data from social media. ...
The exponential increase in the availability of large-scale mobility data has fueled the vision of smart cities that will transform our lives. ...
Availability of data and materials The data and methods that support the findings described in this paper can be found in the SoBigData catalogue at https://sobigdata.d4science.org/catalogue-sobigdata. ...
doi:10.1007/s41060-020-00207-3
fatcat:k4eh5k2epjblzf6myc7tiw5gam
From wireless sensor networks towards cyber physical systems
2011
Pervasive and Mobile Computing
In [13] , a vehicular participatory sensing model is proposed for privacy-preserving map reconstruction by linear regression. ...
This is known as smart grid (or power grid) [11, 167, 168] . Ref. [11] discusses a smart grid test bed built in Korean. It uses ZigBee smart tags to monitor and control the power usage. ...
doi:10.1016/j.pmcj.2011.03.003
fatcat:ruaxvpykujgopjtx3pllkclp4u
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
2018
IEEE Communications Surveys and Tutorials
the current centralized IoT models, followed by recent advances made both in industry and research to solve these challenges and effectively use blockchains to provide a decentralized, secure medium for ...
In this context, the blockchain is seen as the missing link toward building a truly decentralized, trustless, and secure environment for the IoT and, in this survey, we aim to shape a coherent and comprehensive ...
[213] enable a shared data economy by leveraging zero-knowledge schemes and privacy-preserving smart contracts. ...
doi:10.1109/comst.2018.2886932
fatcat:b6m4roave5c7tpdlzgguustf6e
Applications of Explainable AI for 6G: Technical Aspects, Use Cases, and Research Challenges
[article]
2023
arXiv
pre-print
However, the risk of losing control over decision-making may increase due to high-speed, data-intensive AI decision-making beyond designers' and users' comprehension. ...
These decisions can range widely, from network resource allocation to collision avoidance for self-driving cars. ...
[214] proposed a secured demandside management engine for the smart grid using Naive Bayes, a machine learning algorithm, to efficiently preserve the energy utilization in the smart grid. ...
arXiv:2112.04698v2
fatcat:h6rhm7jevvcg3du3aktdjgf43q
Applying the Smart Grid Architecture Model for Designing and Validating System-of-Systems in the Power and Energy Domain: A European Perspective
2019
Energies
The Smart Grid Architecture Model (SGAM), an approach that has been developed during the last couple of years, provides a very good and structured basis for the design, development, and validation of new ...
This review therefore provides a comprehensive overview of the state-of-the-art and related work for the theory, distribution, and use of the aforementioned architectural concept. ...
point for a Smart Grid cyber security risk assessment [54] , to identify the target of evaluation in a Smart Grid for a risk analysis [55] , and to define use cases for identifying data privacy issues ...
doi:10.3390/en12020258
fatcat:slk52wrge5a7lafputkxqp6qhq
Building energy metering and environmental monitoring – A state-of-the-art review and directions for future research
2016
Energy and Buildings
Privacy and data protection, however, remain a concern for data aggregators and end-users. ...
and future directions of research and development -for use a reference, as well as for generating further interest in this expanding research area. ...
Data protection and privacy is a main concern for both end users and data aggregators. Other challenges including cost, interoperability, lack of ICT infrastructure are also reviewed. ...
doi:10.1016/j.enbuild.2016.03.059
fatcat:bsfstfqgejeunpfwc6ncusosve
« Previous
Showing results 1 — 15 out of 405 results