Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017 (2017), Article ID 2539673, 8 pages
https://doi.org/10.1155/2017/2539673
Research Article

Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

School of Computer Sciences, Nanjing University of Posts and Telecommunications, Nanjing, China

Correspondence should be addressed to Zhiwei Wang

Received 17 January 2017; Revised 24 April 2017; Accepted 4 May 2017; Published 6 June 2017

Academic Editor: Zhe Yang

Copyright © 2017 Zhiwei Wang and Hao Xie. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Li, W. Qiao, H. Sun et al., “Smart transmission grid: vision and framework,” in Proceedings of IEEE Transactions on Smart Grid, vol. 1, pp. 168–177, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. D. Niyato, L. Xiao, and P. Wang, “Machine-to-machine communications for home energy management system in smart grid,” IEEE Communications Magazine, vol. 49, no. 4, pp. 53–59, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, “Toward intelligent machine-to-machine communications in smart grid,” IEEE Communications Magazine, vol. 49, no. 4, pp. 60–65, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Liang, B. J. Choi, W. Zhuang, and X. Shen, “Towards optimal energy store-carry-and-deliver for PHEVs via V2G system,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 1674–1682, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. K. Sha, N. Alatrash, and Z. Wang, “A secure and efficient framework to read isolated smart grid devices,” IEEE Transactions on Smart Grid, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. I. E. I., “Utility-scale smart meter deployments: building block of the evolving power grid,” IEI Smart Meter Update, sep 2014. View at Google Scholar
  7. F. D. Garcia and B. Jacobs, “Privacy-friendly energy-metering via homomorphic encryption,” in Proceedings of 6th International conference Security and Trust Management, vol. 6710, pp. 226–238, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  8. F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption,” in Proceedings of the 1st IEEE International Conference on Smart Grid Communications (Smart Grid Comm '10), pp. 327–332, IEEE, Gaithersburg, Md, USA, October 2010. View at Publisher · View at Google Scholar
  9. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. C.-I. Fan, S.-Y. Huang, and Y.-L. Lai, “Privacy-enhanced data aggregation scheme against internal attackers in smart grid,” IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 666–675, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2015. View at Publisher · View at Google Scholar
  12. T. Ma, J. Zhou, M. Tang et al., “Social network and tag sources based augmenting collaborativerecommender system,” IEICE Transactions on Information and Systems, vol. E98-D, no. 4, pp. 902–910, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. D. Mandell Freeman, “Improved security for linearly homomorphic signatures: a generic framework,” in Public Key Cryptography – PKC 2012, pp. 697–714, Springer, Heidelberg, Berlin, Germany, 2012. View at Google Scholar
  14. Z. Wang, G. Sun, and D. Chen, “A new definition of homomorphic signature for identity management in mobile cloud computing,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 546–553, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. Z. Brakerski and S. Goldwasser, “Circular and leakage resilient public-key encryption under subgroup indistinguishability,” in Advances in Cryptology – CRYPTO 2010, Rabin. and T., Eds., vol. 6223, pp. 1–20, Springer, Heidelberg, Berlin, Germany, 2010. View at Google Scholar
  16. E. Teske, “Computing discrete logarithms in arithmetic progressions,” http://citeseerx.ist.psu.edu/.
  17. B. Lynn, “The pairing-based cryptography (pbc) library,” http://crypto.stanford.edu/pbc.
  18. D. Boneh and X. Boyen, “Short signatures without random oracles and the SDH assumption in bilinear groups,” Journal of Cryptology, vol. 21, no. 2, pp. 149–177, 2008. View at Publisher · View at Google Scholar · View at MathSciNet