Coverart for item
The Resource On Privacy-Preserving Protocols for Smart Metering Systems : Security and Privacy in Smart Grids

On Privacy-Preserving Protocols for Smart Metering Systems : Security and Privacy in Smart Grids

Label
On Privacy-Preserving Protocols for Smart Metering Systems : Security and Privacy in Smart Grids
Title
On Privacy-Preserving Protocols for Smart Metering Systems
Title remainder
Security and Privacy in Smart Grids
Creator
Subject
Language
eng
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
On Privacy-Preserving Protocols for Smart Metering Systems : Security and Privacy in Smart Grids
Label
On Privacy-Preserving Protocols for Smart Metering Systems : Security and Privacy in Smart Grids
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4644563
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface -- Scope -- Audience -- Recommended Background -- Content -- Highlights -- Acknowledgments -- Contents -- List of Figures -- List of Tables -- List of Algorithms -- List of Acronyms -- List of Abbreviations -- List of Symbols -- Part I Foundations -- 1 Introduction -- 1.1 Motivation -- 1.2 Research Questions -- 1.3 Contributions -- 1.3.1 High Level Explanation of the Selected PPPs -- 1.3.1.1 ppp1 -- 1.3.1.2 ppp2 -- 1.3.1.3 ppp3 -- 1.3.1.4 ppp4 -- 1.3.2 Summary of the Results -- 1.4 Outline -- References -- 2 Background and Models -- 2.1 Smart Grids Around the World -- 2.2 Security and Privacy Models -- 2.2.1 Terminology in PPPs -- 2.2.2 Security Model -- 2.2.2.1 Attack Model -- 2.2.2.2 Trust Model -- 2.2.2.3 Considerations About the Cryptographic Functions -- 2.2.3 Privacy Model -- 2.2.3.1 Attack Model -- 2.2.3.2 Trust Model -- References -- 3 A Selective Review -- 3.1 Solutions with Restrictive Result -- 3.1.1 Data Obfuscation by Means of Storage Banks -- 3.1.2 Anonymization Via Pseudonymous -- 3.1.3 Data Obfuscation by Means of Noise Injection -- 3.2 Solutions Addressed in This Book: Anonymization Via Cryptographic Protocols -- 3.2.1 Protocols Based on Homomorphic Encryption -- 3.2.2 Protocols Based on DC-Nets -- 3.2.3 Protocols Based on Commitment -- References -- Part II Contributions -- 4 Reasons to Measure Frequently and Their Requirements -- 4.1 Reasons for Frequent Measurements -- 4.1.1 Fraud and Energy Loss -- 4.1.2 Virtualization of the Supplier Commodity Network -- 4.1.3 Fair Distribution -- 4.2 Requirements -- References -- 5 Quantifying the Aggregation Size -- 5.1 Algebraic Properties -- 5.2 Probabilistic Properties -- References -- 6 Selected Privacy-Preserving Protocols -- 6.1 Monetary Value -- 6.2 PPP1 The Fastest -- 6.2.1 Security Analysis -- 6.2.2 Privacy Analysis -- 6.2.3 Performance Analysis
  • 6.3 PPP2 Based on Commitments and ECC -- 6.3.1 Cryptographic Primitives -- 6.3.2 Proposed Protocol -- 6.3.2.1 Privacy-Unfriendly Individual m Verification -- 6.3.2.2 Aggregated m Verification -- 6.3.2.3 Detecting Deceptive u -- 6.3.2.4 Billing Verification -- 6.3.3 Security Analysis -- 6.3.4 Privacy Analysis -- 6.3.5 Performance Analysis -- 6.4 PPP3 Based on Asymmetric DC-Nets -- 6.4.1 Cryptographic Primitives -- 6.4.1.1 Properties from the Definition -- 6.4.1.2 Derived Properties -- 6.4.1.3 adcn and Their Applications -- 6.4.2 Attacker Model -- 6.4.3 Proposed Protocol -- 6.4.4 Verification Property -- 6.4.4.1 Privacy-Unfriendly Individual m Verification -- 6.4.4.2 Aggregated m Verification -- 6.4.4.3 Detecting Failures and Deceptive u -- 6.4.4.4 Billing Verification -- 6.4.5 Security Analysis -- 6.4.6 Privacy Analysis -- 6.4.7 Performance Analysis -- 6.5 PPP4 Based on Quantum Mechanics -- 6.5.1 Cryptographic Primitives -- 6.5.2 Proposed Protocol -- 6.5.3 Security Analysis -- 6.5.4 Privacy Analysis -- References -- 7 Analytical Comparison -- 7.1 Security -- 7.2 Privacy -- 7.3 Requirements -- 7.4 Verification Property -- 7.5 Performance -- 7.6 Summary -- References -- 8 Simulation and Validation -- 8.1 Dataset -- 8.1.1 Anomalies -- 8.1.2 Sanitized Dataset -- 8.1.3 Dataset Characteristics -- 8.2 Implementation of the Core Algorithms -- 8.3 Simulation Parameters -- 8.4 Simulation Results -- 8.4.1 Encryption Algorithms -- 8.4.2 Aggregation Algorithms -- 8.4.3 Decryption Algorithms -- 8.4.4 Overall Performance -- References -- 9 Concluding Remarks -- 9.1 Recapitulation -- 9.2 Main Results -- 9.3 Outlook -- 9.4 Final Remarks -- A Algorithms -- B Parameters for ECC -- C Mean Measurement by Meter -- Glossary -- Index
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319407180&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4385873'}
Extent
1 online resource (164 pages)
Form of item
online
Isbn
9783319407180
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...