Endre søk
Link to record
Permanent link

Direct link
BETA
Alternativa namn
Publikasjoner (2 av 2) Visa alla publikasjoner
Borges, F. & Martucci, L. (2014). iKUP keeps users' privacy in the Smart Grid. In: Communications and Network Security (CNS), 2014 IEEE Conference on: . Paper presented at IEEE Conference on Communications and Network Security (CNS 2014), 29-31 Oct. 2014, San Francisco, CA (pp. 310-318). IEEE conference proceedings
Åpne denne publikasjonen i ny fane eller vindu >>iKUP keeps users' privacy in the Smart Grid
2014 (engelsk)Inngår i: Communications and Network Security (CNS), 2014 IEEE Conference on, IEEE conference proceedings, 2014, s. 310-318Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Privacy-enhancing technologies for the Smart Grid usually address either the consolidation of users’ energy consumption or the verification of billing information. The goal of this paper is to introduce iKUP, a protocol that addresses both problems simultaneously. iKUP is an efficient privacy-enhancingprotocol based on DC-Nets and Elliptic Curve Cryptography as Commitment. It covers the entire cycle of power provisioning, consumption, billing, and verification. iKUP allows: (i) utility providers to obtain a consolidated energy consumption value that relates to the consumption of a user set, (ii) utility providers to verify the correctness of this consolidated value, and (iii) the verification of the correctness of the billing information by both utility providers and users. iKUP prevents utility providers from identifying individual contributions to the consolidated value and, therefore, protects the users’ privacy. The analytical performance evaluation of iKUP is validated through simulation using as input a real-world data set with over 157 million measurements collected from 6,345 smart meters. Our results show that iKUP has a worse performance than other protocols in aggregationand decryption, which are operations that happen only once per round of measurements and, thus, have a low impactin the total protocol performance. iKUP heavily outperformsother protocols in encryption, which is the most demanded cryptographic function, has the highest impact on the overall protocol performance, and it is executed in the smart meters.

sted, utgiver, år, opplag, sider
IEEE conference proceedings, 2014
Emneord
privacy, smart grid, security, cryptography, simulation, real world data set
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-41927 (URN)10.1109/CNS.2014.6997499 (DOI)000410652100042 ()
Konferanse
IEEE Conference on Communications and Network Security (CNS 2014), 29-31 Oct. 2014, San Francisco, CA
Tilgjengelig fra: 2016-04-26 Laget: 2016-04-26 Sist oppdatert: 2019-08-02bibliografisk kontrollert
Borges, F., Martucci, L., Beato, F. & Mühlhäuser, M. (2014). Secure and Privacy-Friendly Public Key Generation and Certification. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications: . Paper presented at 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 24-26 Sept. 2014, Beijing (pp. 114-121). New York: IEEE Press
Åpne denne publikasjonen i ny fane eller vindu >>Secure and Privacy-Friendly Public Key Generation and Certification
2014 (engelsk)Inngår i: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, New York: IEEE Press, 2014, s. 114-121Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Digital societies increasingly rely on secure communication between parties. Certificate enrollment protocols are used by certificate authorities to issue public key certificates to clients. Key agreement protocols, such as Diffie-Hellman, are used to compute secret keys, using public keys as input, for establishing secure communication channels. Whenever the keys are generated by clients, the bootstrap process requires either (a) an out-of-band verification for certification of keys when those are generated by the clients themselves, or (b) a trusted server to generate both the public and secret parameters. This paper presents a novel constrained key agreement protocol, built upon a constrained Diffie-Hellman, which is used to generate a secure public-private key pair, and to set up a certification environment without disclosing the private keys. In this way, the servers can guarantee that the generated key parameters are safe, and the clients do not disclose any secret information to the servers.

sted, utgiver, år, opplag, sider
New York: IEEE Press, 2014
Emneord
Public Key Generation, Privacy, Security, Certification, Protocol
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-41929 (URN)10.1109/TrustCom.2014.19 (DOI)000380562600015 ()
Konferanse
13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 24-26 Sept. 2014, Beijing
Tilgjengelig fra: 2016-04-26 Laget: 2016-04-26 Sist oppdatert: 2018-01-10bibliografisk kontrollert
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-5159-9517