An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Q Jiang, J Ma, X Lu, Y Tian - Peer-to-peer Networking and Applications, 2015 - Springer
User authentication with unlinkability is one of the corner stone services for many security
and privacy services which are required to secure communications in wireless sensor …

SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors

Y Zhang, C Xu, S Yu, H Li… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cyber-physical-social system (CPSS) allows individuals to share personal information
collected from not only cyberspace but also physical space. This has resulted in generating …

Efficient and privacy-preserving metering protocols for smart grid systems

HJ Jo, IS Kim, DH Lee - IEEE Transactions on Smart Grid, 2015 - ieeexplore.ieee.org
Smart grids have attracted increasing interest in the field of industrial research. These
systems allow electricity consumers to communicate with electrical systems using …

MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications

L Chen, R Lu, Z Cao, K AlHarbi, X Lin - Peer-to-peer networking and …, 2015 - Springer
Privacy-preserving data aggregation has been widely studied to meet the requirement of
timely monitoring electricity consumption of users while protecting individual user's data …

A lightweight authenticated communication scheme for smart grid

Y Liu, C Cheng, T Gu, T Jiang, X Li - IEEE Sensors Journal, 2015 - ieeexplore.ieee.org
In smart grid, various kinds of sensors have been equipped in smart meters to collect real-
time consumption data and execute the instructions from the power management center …

Lightweight security and privacy preserving scheme for smart grid customer-side networks

A Abdallah, X Shen - IEEE Transactions on Smart Grid, 2015 - ieeexplore.ieee.org
Information security and customers' privacy in smart grid are significant concerns. Existing
security and privacy preserving schemes consider that the consumption reports for electricity …

Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks

S Tonyali, O Cakmak, K Akkaya… - IEEE Internet of …, 2015 - ieeexplore.ieee.org
While the newly envisioned smart (er) grid (SG) will result in a more efficient and reliable
power grid, its collection and use of fine-grained meter data has widely raised concerns on …

A full lifecycle privacy protection scheme for sensitive data in cloud computing

J Xiong, F Li, J Ma, X Liu, Z Yao, PS Chen - Peer-to-peer Networking and …, 2015 - Springer
With the rapid development of versatile cloud services, it becomes increasingly susceptible
to expose users' sensitive data into the cloud computing environment. In this paper, we …

DEP2SA: A decentralized efficient privacy-preserving and selective aggregation scheme in advanced metering infrastructure

MA Mustafa, N Zhang, G Kalogridis, Z Fan - IEEE Access, 2015 - ieeexplore.ieee.org
This paper proposes a novel solution, called a decentralized, efficient, privacy-preserving,
and selective aggregation (DEP2SA) scheme, designed to support secure and user privacy …

Maximizing renewable energy use with decentralized residential demand response

I Dusparic, A Taylor, A Marinescu… - 2015 IEEE First …, 2015 - ieeexplore.ieee.org
Due to steady urbanization, the electrical grid is facing significant changes in the supply of
resources as well as changes in the type, scale, and patterns of residential user demand. To …