Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids

P Gope, B Sikdar - IEEE Transactions on Information Forensics …, 2018 - ieeexplore.ieee.org
The concept of smart metering allows real-time measurement of power demand which in
turn is expected to result in more efficient energy use and better load balancing. However …

Balancing security and efficiency for smart metering against misbehaving collectors

J Ni, K Zhang, X Lin, XS Shen - IEEE Transactions on Smart …, 2017 - ieeexplore.ieee.org
Smart grid enables two-way communications between smart meters and operation centers
to collect real-time power consumption of customers to improve flexibility, reliability, and …

Smart grid security enhancement by detection and classification of non‐technical losses employing deep learning algorithm

PR Jeyaraj, ERS Nadar, AC Kathiresan… - … on electrical energy …, 2020 - Wiley Online Library
Non‐technical loss (NTL) is detrimental to the smart grid. Intelligent application of advanced
metering infrastructure (AMI) helps to solve NTL detection and classification. By using …

A lightweight and fault-tolerable data aggregation scheme for privacy-friendly smart grids environment

C Huang, X Wang, Q Gan, D Huang, M Yao, Y Lin - Cluster Computing, 2021 - Springer
The smart grid has attracted great attention as a new energy network. The power supplier
collects the total consumption data through the smart meter. The data aggregation is a …

[HTML][HTML] Privacy-preserving smart metering with authentication in a smart grid

JB Hur, DY Koo, YJ Shin - Applied Sciences, 2015 - mdpi.com
The traditional security objectives of smart grids have been availability, integrity, and
confidentiality. However, as the grids incorporate smart metering and load management …

Research on the application of data encryption technology in communication security

X Li, G Wang, W Pan - International Journal of Autonomous …, 2021 - inderscienceonline.com
Aiming at the security problems of data monitoring, and forgery and tampering in the process
of wireless communication network, this paper proposes a lightweight data encryption …

P2P routing table poisoning: A quorum-based sanitizing approach

H Ismail, D Germanus, N Suri - Computers & Security, 2017 - Elsevier
Abstract Peer-to-Peer (P2P) protocols underlie multiple networked applications given that
the P2P decentralized design inherently fosters scalability and robustness. While …

Data aggregation in smart grid ami network for secure transfer of energy user-consumption data

RC Diovu, JT Agee - … Journal of Engineering Research in Africa, 2018 - Trans Tech Publ
In a secured smart grid AMI environment, congestion management during data aggregation
with security encryption for privacy preservation is a challenging issue. By introducing data …

[图书][B] Privacy-enhancing fog computing and its applications

X Lin, J Ni, Xuemin (Sherman) Shen - 2018 - Springer
Fog computing has been considered as a key enabler to reach the increasing demands on
local data analysis and numerous device connections for Internetof-Things (IoT), by …

Geographic routing protocol for peer-to-peer smart grid neighborhood area network

M Rekik, Z Chtourou, N Mitton - 2015 IEEE 15th International …, 2015 - ieeexplore.ieee.org
The distribution segment of the power system is of great importance in the smart grid (SG).
The deployment of Information and Communication Technologies (ICTs) to support …