Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








301 Hits in 6.2 sec

Security Challenges in Smart Grid Implementation [chapter]

Sanjay Goel, Yuan Hong
2015 SpringerBriefs in Cybersecurity  
The most prevalent threat to the consumer is breach of privacy of the data and malicious control of personal devices and appliances.  ...  Zigbee is a standard developed specifically for the smart grid targeted at networking in-home applications including smart meters, smart lighting, and appliances. 4  ...  status of the appliances of a household.  ... 
doi:10.1007/978-1-4471-6663-4_1 fatcat:ahwbvbahkff6ljhex5poab4hkm

Neighborhood watch

Ishtiaq Rouf, Hossen Mustafa, Miao Xu, Wenyuan Xu, Rob Miller, Marco Gruteser
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
Research on smart meters has shown that fine-grained energy usage data poses privacy risks since it allows inferences about activities inside homes.  ...  While smart meter deployments are very limited, more than 40 million meters in the United States have been equipped with Automatic Meter Reading (AMR) technology over the past decades.  ...  Privacy advocates have, however, immediately cautioned that fine-grained energy consumption data collected by smart meters could reveal sensitive personal information from homes, and have protested against  ... 
doi:10.1145/2382196.2382246 dblp:conf/ccs/RoufMXXMG12 fatcat:q6lsacl27rf2hlwmqwvhdodkzq

The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid

Anna Triantafyllou, Jose Antonio Perez Jimenez, Alejandro del Real Torres, Thomas Lagkas, Konstantinos Rantos, Panagiotis Sarigiannidis
2020 IEEE Open Journal of the Communications Society  
This study presents a comprehensive overview of the latest privacy-preserving mechanisms and policies in the ESG, while promoting the employment of modern access control techniques towards preventing personal  ...  Efficient categorization is provided regarding the proposed privacy preserving methods and characteristics, while focus is also given on the use of the Blockchain technology and the Multi Authority Access  ...  meters and the Home Area Network (HAN), which connects the home appliances with customers smart meter.  ... 
doi:10.1109/ojcoms.2020.3037517 fatcat:2qhvityrlrdjvawlkx54wmpkna

Privacy Preserving and Collusion Resistant Energy Sharing [article]

Yuan Hong, Han Wang, Shangyu Xie, Bingyu Liu
2017 arXiv   pre-print
In this paper, we propose a privacy preserving scheme for all the microgrids which can securely implement their energy sharing against both semi-honest and colluding adversaries.  ...  The proposed approach includes two secure communication protocols that can ensure quantified privacy leakage and handle collusions.  ...  To prevent information leakage in smart metering, three different categories of privacy preserving schemes were proposed in the past few years.  ... 
arXiv:1711.00208v1 fatcat:btfvii45xzatzkg54qjwxwzxau

Towards Privacy Preserving IoT Environments: A Survey

Mohamed Seliem, Khalid Elgazzar, Kasem Khalil
2018 Wireless Communications and Mobile Computing  
IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life.  ...  The ultimate source of user discomfort is the lack of control over personal raw data that is directly streamed from sensors to the outside world.  ...  Wireless Communications and Mobile Computing Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2018/1032761 fatcat:j76yhuc5rjhvbifkk5foq3klzq

Differential Privacy Techniques for Cyber Physical Systems: A Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2019 arXiv   pre-print
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy  ...  Passive attacks are being used by intruders to get access to private information of CPSs.  ...  Similarly, firmware updates for smart meters needs to be carefully considered to protect the leakage of any specific software component of smart meters.  ... 
arXiv:1812.02282v3 fatcat:bnapnprldnaetjnjedz473lrme

Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review

Malik Qasaimeh, Raad S. Al-Qassas, Shadi Aljawarneh
2019 Cybernetics and Information Technologies  
This paper analyses previous literature, comprising 27 papers on the status of SG authentication techniques, main components, and kinds of attacks.  ...  Smart Grid (SG) is a major electricity trend expected to replace traditional electricity systems.  ...  and privacy attributes of SG system, to obtain a detailed observation of the current status of SG security.  ... 
doi:10.2478/cait-2019-0002 fatcat:hzuljrbaozhwdirfbk3db2l2re

State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

Neetesh Saxena, Bong Choi
2015 Energies  
We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network.  ...  We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC), and home/building/neighborhood area network gateways  ...  : privately compute aggregate meter measurements; allowing for fraud and leakage detection; individual meter reading privacy preservation; low computation and communication overhead.Cons: large number  ... 
doi:10.3390/en81011883 fatcat:mgasu2xbgfatpnz3dcuq65xmqa

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew Martin
2019 IEEE Communications Surveys and Tutorials  
Based on the presented threats, we derive a set of security and privacy requirements for SG metering networks.  ...  This survey paper shows a brief overview of real cyber attack incidents in traditional energy networks and those targeting the smart metering network.  ...  Such information leakage can certainly raise privacy issues. Tellbach-Li presented cyber-attacks on smart meters in a household nanogrid [61] .  ... 
doi:10.1109/comst.2019.2899354 fatcat:67bz5glcfbbldpqagxmhvy2ssm

Distribution Grid Line Outage Detection with Privacy Data [article]

Chenhan Xiao, Yizheng Liao, Yang Weng
2023 arXiv   pre-print
While sensor readings enable line outage identification, they bring privacy concerns by allowing an adversary to divulge sensitive information such as household occupancy and economic status.  ...  In this paper, to preserve privacy, we develop a decentralized randomizing scheme to ensure no direct exposure of each user's raw data.  ...  However, the utilization of grid readings brings privacy concerns, i.e., the leakage of sensitive information.  ... 
arXiv:2309.05140v1 fatcat:fn2mno3n7rb6bcpghai4eesuhm

Review of Smart Meter Data Analytics: Applications, Methodologies, and Challenges

Yi Wang, Qixin Chen, Tao Hong, Chongqing Kang
2018 IEEE Transactions on Smart Grid  
The widespread popularity of smart meters enables an immense amount of fine-grained electricity consumption data to be collected.  ...  How to employ massive smart meter data to promote and enhance the efficiency and sustainability of the power grid is a pressing issue.  ...  appliances, and information leakage.  ... 
doi:10.1109/tsg.2018.2818167 fatcat:yacc5fol6vhydkw2azgy4mpfai

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
This in-depth survey begins with an overview of security and privacy threats in IoT/IIs.  ...  society, and (2) the increase of IoT/II applications and digital services with growing data collection capabilities are introducing new threats and risks on citizens' privacy.  ...  Close monitoring and inference of smart meter ''appliances' ON/OFF status at different times'' can reflect the usage patterns of energy consumers.  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

Database Systems for the Smart Grid [chapter]

Zeyar Aung
2013 Green Energy and Technology  
In this chapter, two aspects of database systems, namely database management and data mining, for the smart grid are covered.  ...  The uses of database management and data mining for the electrical power grid comprising of the interrelated subsystems of power generation, transmission, distribution, and utilization are discussed.  ...  research project titled "Data Mining for Smart Grids".  ... 
doi:10.1007/978-1-4471-5210-1_7 fatcat:ct7bfrxni5gkpk2oj67o4ahxsy

Televisions, video privacy, and powerline electromagnetic interference

Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak N. Patel
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies.  ...  In addition to being of scientific interest, our findings contribute to the overall debate of whether or not measurements of residential powerlines reveal significant information about the activities within  ...  for his insights, feedback, and encouragement, and we thank a Shane Clark, Alexei Czeskis, Tamara Denning, Daniel Halperin, Eric Larson, and Franziska Roesner for valuable comments on earlier drafts of  ... 
doi:10.1145/2046707.2046770 dblp:conf/ccs/EnevGKP11 fatcat:ybualdgaqfh6xcndizo5ibp2dm

Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions

David Eckhoff, Isabel Wagner
2018 IEEE Communications Surveys and Tutorials  
Many modern cities strive to integrate information technology into every aspect of city life to create so-called smart cities.  ...  Our survey can serve as a reference guide, contributing to the development of privacy-friendly smart cities.  ...  Developers of a smart city applications should therefore always check whether the entire protocol stack supports the envisioned privacy goals. Information leakage.  ... 
doi:10.1109/comst.2017.2748998 fatcat:q2iwcfkjevgrpe7vjxt5ugvrjy
« Previous Showing results 1 — 15 out of 301 results