منوی کاربری
  • پشتیبانی: ۴۲۲۷۳۷۸۱ - ۰۴۱
  • سبد خرید

دانلود رایگان مقاله انگلیسی تجمع امن و مقیاس پذیر در انعطاف پذیری شبکه - نشریه الزویر

عنوان فارسی
تجمع امن و مقیاس پذیر در انعطاف پذیری شبکه هوشمند در برابر نهادهای مخرب
عنوان انگلیسی
Secure and scalable aggregation in the smart grid resilient against malicious entities
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
10
سال انتشار
2016
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E36
رشته های مرتبط با این مقاله
مهندسی کامپیوتر
گرایش های مرتبط با این مقاله
امنیت اطلاعات
مجله
شبکه های ad hoc
دانشگاه
گروه مهندسی کامپیوتر، دانشگاه کویت، کویت
کلمات کلیدی
شبکه هوشمند، اندازه گیری هوشمند، تجمع امن، دشمنان نیمه صادقانه و مخرب، امنیت و حریم خصوصی
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

abstract


The smart electricity grid introduces new opportunities for fine-grained consumption monitoring. Such functionality, however, requires the constant collection of electricity data that can be used to undermine consumer privacy. In this work, we address this problem by proposing two decentralized protocols to securely aggregate the measurements of n smart meters. The first protocol is a very lightweight one, it uses only symmetric cryptographic primitives and provides security against honest-but-curious adversaries. The second protocol is public-key based and considers the malicious adversarial model; malicious entities not only try to learn the private measurements of smart meters but also disrupt protocol execution. Both protocols do not rely on centralized entities or trusted third parties to operate. Additionally, we show that they are highly scalable owning to the fact that every smart meter has to interact with only a few others, thus requiring only O(1) work and memory overhead. Finally, we implement a prototype based on our proposals and we evaluate its performance in realistic deployment settings.

نتیجه گیری

7. Conclusions


In this work we presented two decentralized privacy-respecting protocols for securely aggregating the consumption values reported by smart meters. The first protocol uses only symmetric cryptography primitives and focuses against honest-but-curious adversaries. The second one uses public cryptography primitives to protect against more aggressive adversaries that not only try to infer private measurements but also disrupt protocol execution. Our implementation showed that both protocols are highly efficient in practice, requiring the smart meters to interact with a few others, thus imposing only a small overhead per device and making these protocols fit for real-life smart grid deployments.


بدون دیدگاه