A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Challenges in Smart Grid Implementation
[chapter]
2015
SpringerBriefs in Cybersecurity
The most prevalent threat to the consumer is breach of privacy of the data and malicious control of personal devices and appliances. ...
Zigbee is a standard developed specifically for the smart grid targeted at networking in-home applications including smart meters, smart lighting, and appliances. 4 ...
status of the appliances of a household. ...
doi:10.1007/978-1-4471-6663-4_1
fatcat:ahwbvbahkff6ljhex5poab4hkm
Neighborhood watch
2012
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12
Research on smart meters has shown that fine-grained energy usage data poses privacy risks since it allows inferences about activities inside homes. ...
While smart meter deployments are very limited, more than 40 million meters in the United States have been equipped with Automatic Meter Reading (AMR) technology over the past decades. ...
Privacy advocates have, however, immediately cautioned that fine-grained energy consumption data collected by smart meters could reveal sensitive personal information from homes, and have protested against ...
doi:10.1145/2382196.2382246
dblp:conf/ccs/RoufMXXMG12
fatcat:q6lsacl27rf2hlwmqwvhdodkzq
The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid
2020
IEEE Open Journal of the Communications Society
This study presents a comprehensive overview of the latest privacy-preserving mechanisms and policies in the ESG, while promoting the employment of modern access control techniques towards preventing personal ...
Efficient categorization is provided regarding the proposed privacy preserving methods and characteristics, while focus is also given on the use of the Blockchain technology and the Multi Authority Access ...
meters and the Home Area Network (HAN), which connects the home appliances with customers smart meter. ...
doi:10.1109/ojcoms.2020.3037517
fatcat:2qhvityrlrdjvawlkx54wmpkna
Privacy Preserving and Collusion Resistant Energy Sharing
[article]
2017
arXiv
pre-print
In this paper, we propose a privacy preserving scheme for all the microgrids which can securely implement their energy sharing against both semi-honest and colluding adversaries. ...
The proposed approach includes two secure communication protocols that can ensure quantified privacy leakage and handle collusions. ...
To prevent information leakage in smart metering, three different categories of privacy preserving schemes were proposed in the past few years. ...
arXiv:1711.00208v1
fatcat:btfvii45xzatzkg54qjwxwzxau
Towards Privacy Preserving IoT Environments: A Survey
2018
Wireless Communications and Mobile Computing
IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life. ...
The ultimate source of user discomfort is the lack of control over personal raw data that is directly streamed from sensors to the outside world. ...
Wireless Communications and Mobile Computing
Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2018/1032761
fatcat:j76yhuc5rjhvbifkk5foq3klzq
Differential Privacy Techniques for Cyber Physical Systems: A Survey
[article]
2019
arXiv
pre-print
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy ...
Passive attacks are being used by intruders to get access to private information of CPSs. ...
Similarly, firmware updates for smart meters needs to be carefully considered to protect the leakage of any specific software component of smart meters. ...
arXiv:1812.02282v3
fatcat:bnapnprldnaetjnjedz473lrme
Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review
2019
Cybernetics and Information Technologies
This paper analyses previous literature, comprising 27 papers on the status of SG authentication techniques, main components, and kinds of attacks. ...
Smart Grid (SG) is a major electricity trend expected to replace traditional electricity systems. ...
and privacy attributes of SG system, to obtain a detailed observation of the current status of SG security. ...
doi:10.2478/cait-2019-0002
fatcat:hzuljrbaozhwdirfbk3db2l2re
State of the Art Authentication, Access Control, and Secure Integration in Smart Grid
2015
Energies
We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. ...
We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC), and home/building/neighborhood area network gateways ...
: privately compute aggregate meter measurements; allowing for fraud and leakage detection; individual meter reading privacy preservation; low computation and communication overhead.Cons: large number ...
doi:10.3390/en81011883
fatcat:mgasu2xbgfatpnz3dcuq65xmqa
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
2019
IEEE Communications Surveys and Tutorials
Based on the presented threats, we derive a set of security and privacy requirements for SG metering networks. ...
This survey paper shows a brief overview of real cyber attack incidents in traditional energy networks and those targeting the smart metering network. ...
Such information leakage can certainly raise privacy issues. Tellbach-Li presented cyber-attacks on smart meters in a household nanogrid [61] . ...
doi:10.1109/comst.2019.2899354
fatcat:67bz5glcfbbldpqagxmhvy2ssm
Distribution Grid Line Outage Detection with Privacy Data
[article]
2023
arXiv
pre-print
While sensor readings enable line outage identification, they bring privacy concerns by allowing an adversary to divulge sensitive information such as household occupancy and economic status. ...
In this paper, to preserve privacy, we develop a decentralized randomizing scheme to ensure no direct exposure of each user's raw data. ...
However, the utilization of grid readings brings privacy concerns, i.e., the leakage of sensitive information. ...
arXiv:2309.05140v1
fatcat:fn2mno3n7rb6bcpghai4eesuhm
Review of Smart Meter Data Analytics: Applications, Methodologies, and Challenges
2018
IEEE Transactions on Smart Grid
The widespread popularity of smart meters enables an immense amount of fine-grained electricity consumption data to be collected. ...
How to employ massive smart meter data to promote and enhance the efficiency and sustainability of the power grid is a pressing issue. ...
appliances, and information leakage. ...
doi:10.1109/tsg.2018.2818167
fatcat:yacc5fol6vhydkw2azgy4mpfai
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
2021
IEEE Access
This in-depth survey begins with an overview of security and privacy threats in IoT/IIs. ...
society, and (2) the increase of IoT/II applications and digital services with growing data collection capabilities are introducing new threats and risks on citizens' privacy. ...
Close monitoring and inference of smart meter ''appliances' ON/OFF status at different times'' can reflect the usage patterns of energy consumers. ...
doi:10.1109/access.2021.3062201
fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
Database Systems for the Smart Grid
[chapter]
2013
Green Energy and Technology
In this chapter, two aspects of database systems, namely database management and data mining, for the smart grid are covered. ...
The uses of database management and data mining for the electrical power grid comprising of the interrelated subsystems of power generation, transmission, distribution, and utilization are discussed. ...
research project titled "Data Mining for Smart Grids". ...
doi:10.1007/978-1-4471-5210-1_7
fatcat:ct7bfrxni5gkpk2oj67o4ahxsy
Televisions, video privacy, and powerline electromagnetic interference
2011
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. ...
In addition to being of scientific interest, our findings contribute to the overall debate of whether or not measurements of residential powerlines reveal significant information about the activities within ...
for his insights, feedback, and encouragement, and we thank a Shane Clark, Alexei Czeskis, Tamara Denning, Daniel Halperin, Eric Larson, and Franziska Roesner for valuable comments on earlier drafts of ...
doi:10.1145/2046707.2046770
dblp:conf/ccs/EnevGKP11
fatcat:ybualdgaqfh6xcndizo5ibp2dm
Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions
2018
IEEE Communications Surveys and Tutorials
Many modern cities strive to integrate information technology into every aspect of city life to create so-called smart cities. ...
Our survey can serve as a reference guide, contributing to the development of privacy-friendly smart cities. ...
Developers of a smart city applications should therefore always check whether the entire protocol stack supports the envisioned privacy goals. Information leakage. ...
doi:10.1109/comst.2017.2748998
fatcat:q2iwcfkjevgrpe7vjxt5ugvrjy
« Previous
Showing results 1 — 15 out of 301 results