Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 3680671, 11 pages
https://doi.org/10.1155/2017/3680671
Research Article

Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks

1National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
2State Key Laboratory of Cryptology, Beijing 100878, China
3Westone Cryptologic Research Center, Beijing 100070, China

Correspondence should be addressed to Yinghui Zhang; moc.361@gnaahzhy and Dong Zheng; moc.liamtoh@otpyrcgnehzd

Received 20 October 2016; Revised 8 December 2016; Accepted 4 January 2017; Published 30 January 2017

Academic Editor: Jing Zhao

Copyright © 2017 Yinghui Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Alliance, “5 g white paper,” White paper, Next Generation Mobile Networks, Frankfurt, Germany, 2015. View at Google Scholar
  2. G. Locke and P. D. Gallagher, NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0, National Institute of Standards and Technology, 2010.
  3. M. Peng, Y. Li, Z. Zhao, and C. Wang, “System architecture and key technologies for 5G heterogeneous cloud radio access networks,” IEEE Network, vol. 29, no. 2, pp. 6–14, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Peng, S. Yan, and H. V. Poor, “Ergodic capacity analysis of remote radio head associations in cloud radio access networks,” IEEE Wireless Communications Letters, vol. 3, no. 4, pp. 365–368, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: opportunities and challenges,” Information Sciences, vol. 305, pp. 357–383, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. J. Li, J. Li, X. Chen, C. Jia, and W. Lou, “Identity-based encryption with outsourced revocation in cloud computing,” IEEE Transactions on Computers, vol. 64, no. 2, pp. 425–437, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. L. M. Kaufman, “Data security in the world of cloud computing,” IEEE Security and Privacy, vol. 7, no. 4, pp. 61–64, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, “Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing,” Information Sciences, vol. 379, pp. 42–61, 2017. View at Publisher · View at Google Scholar · View at Scopus
  9. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Li, X. Chen, M. Li, P. P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1615–1625, 2014. View at Google Scholar
  12. J. G. Andrews, S. Buzzi, W. Choi et al., “What will 5G be?” IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1065–1082, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. N. Nikaein, E. Schiller, R. Favraud et al., “Network store: exploring slicing in future 5G networks,” in Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture (MobiArch '15), pp. 8–13, Paris, France, September 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient aggregation of encrypted data in wireless sensor networks,” in Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems-Networking and Services (MobiQuitous '05), pp. 109–117, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Westhoff, J. Girao, and M. Acharya, “Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation,” IEEE Transactions on Mobile Computing, vol. 5, no. 10, pp. 1417–1431, 2006. View at Publisher · View at Google Scholar · View at Scopus
  16. X. Lin, R. Lu, and X. S. Shen, “MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 10, no. 6, pp. 843–856, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Wu, H. Mohsenian-Rad, and J. Huang, “Vehicle-to-aggregator interaction game,” IEEE Transactions on Smart Grid, vol. 3, no. 1, pp. 434–442, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. L. Gan, U. Topcu, and S. H. Low, “Optimal decentralized protocol for electric vehicle charging,” IEEE Transactions on Power Systems, vol. 28, no. 2, pp. 940–951, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. S. Tonyali, O. Cakmak, K. Akkaya, M. M. Mahmoud, and I. Guvenc, “Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 709–719, 2016. View at Publisher · View at Google Scholar
  21. K. Rabieh, M. Mahmoud, K. Akkaya, and S. Tonyali, “Scalable certificate revocation schemes for smart grid AMI networks using bloom filters,” IEEE Transactions on Dependable and Secure Computing, 2015. View at Publisher · View at Google Scholar
  22. Y. H. Zhang, X. F. Chen, H. Li, and J. Cao, “Identity-based construction for secure and efficient handoff authentication schemes in wireless networks,” Security and Communication Networks, vol. 5, no. 10, pp. 1121–1130, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Cao, M. Ma, and H. Li, “A group-based authentication and key agreement for MTC in LTE networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '12), pp. 1017–1022, Anaheim, Calif, USA, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. M. M. E. A. Mahmoud and X. Shen, “A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1805–1818, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. Y. Zhang, X. Chen, J. Li, and H. Li, “Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks,” Computer Networks, vol. 75, pp. 192–211, 2014. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, “EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2053–2064, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. P. Guo, J. Wang, X. H. Geng, C. S. Kim, and J.-U. Kim, “A variable threshold-value authentication architecture for wireless mesh networks,” Journal of Internet Technology, vol. 15, no. 6, pp. 929–935, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. M. Mahmoud, N. Saputro, P. Akula, and K. Akkaya, “Privacy-preserving power injection over a hybrid AMI/LTE smart grid network,” IEEE Internet of Things Journal, 2016. View at Publisher · View at Google Scholar
  29. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in cryptology—(EUROCRYPT '99), vol. 1592 of Lecture Notes in Comput. Sci., pp. 223–238, Springer, Berlin, Germany, 1999. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Advances in Cryptology-CRYPTO 2001, pp. 213–229, Springer, Berlin, Germany, 2001. View at Google Scholar
  31. W. Stallings, Cryptography and Network Security: Principles and Practices, Pearson Education, New Delhi, India, 2006.