Ändra sökning
Länk till posten
Permanent länk

Direktlänk
BETA
Alternativa namn
Publikationer (2 of 2) Visa alla publikationer
Borges, F. & Martucci, L. (2014). iKUP keeps users' privacy in the Smart Grid. In: Communications and Network Security (CNS), 2014 IEEE Conference on: . Paper presented at IEEE Conference on Communications and Network Security (CNS 2014), 29-31 Oct. 2014, San Francisco, CA (pp. 310-318). IEEE conference proceedings
Öppna denna publikation i ny flik eller fönster >>iKUP keeps users' privacy in the Smart Grid
2014 (Engelska)Ingår i: Communications and Network Security (CNS), 2014 IEEE Conference on, IEEE conference proceedings, 2014, s. 310-318Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Privacy-enhancing technologies for the Smart Grid usually address either the consolidation of users’ energy consumption or the verification of billing information. The goal of this paper is to introduce iKUP, a protocol that addresses both problems simultaneously. iKUP is an efficient privacy-enhancingprotocol based on DC-Nets and Elliptic Curve Cryptography as Commitment. It covers the entire cycle of power provisioning, consumption, billing, and verification. iKUP allows: (i) utility providers to obtain a consolidated energy consumption value that relates to the consumption of a user set, (ii) utility providers to verify the correctness of this consolidated value, and (iii) the verification of the correctness of the billing information by both utility providers and users. iKUP prevents utility providers from identifying individual contributions to the consolidated value and, therefore, protects the users’ privacy. The analytical performance evaluation of iKUP is validated through simulation using as input a real-world data set with over 157 million measurements collected from 6,345 smart meters. Our results show that iKUP has a worse performance than other protocols in aggregationand decryption, which are operations that happen only once per round of measurements and, thus, have a low impactin the total protocol performance. iKUP heavily outperformsother protocols in encryption, which is the most demanded cryptographic function, has the highest impact on the overall protocol performance, and it is executed in the smart meters.

Ort, förlag, år, upplaga, sidor
IEEE conference proceedings, 2014
Nyckelord
privacy, smart grid, security, cryptography, simulation, real world data set
Nationell ämneskategori
Datavetenskap (datalogi) Datorsystem
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-41927 (URN)10.1109/CNS.2014.6997499 (DOI)000410652100042 ()
Konferens
IEEE Conference on Communications and Network Security (CNS 2014), 29-31 Oct. 2014, San Francisco, CA
Tillgänglig från: 2016-04-26 Skapad: 2016-04-26 Senast uppdaterad: 2019-08-02Bibliografiskt granskad
Borges, F., Martucci, L., Beato, F. & Mühlhäuser, M. (2014). Secure and Privacy-Friendly Public Key Generation and Certification. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications: . Paper presented at 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 24-26 Sept. 2014, Beijing (pp. 114-121). New York: IEEE Press
Öppna denna publikation i ny flik eller fönster >>Secure and Privacy-Friendly Public Key Generation and Certification
2014 (Engelska)Ingår i: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, New York: IEEE Press, 2014, s. 114-121Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Digital societies increasingly rely on secure communication between parties. Certificate enrollment protocols are used by certificate authorities to issue public key certificates to clients. Key agreement protocols, such as Diffie-Hellman, are used to compute secret keys, using public keys as input, for establishing secure communication channels. Whenever the keys are generated by clients, the bootstrap process requires either (a) an out-of-band verification for certification of keys when those are generated by the clients themselves, or (b) a trusted server to generate both the public and secret parameters. This paper presents a novel constrained key agreement protocol, built upon a constrained Diffie-Hellman, which is used to generate a secure public-private key pair, and to set up a certification environment without disclosing the private keys. In this way, the servers can guarantee that the generated key parameters are safe, and the clients do not disclose any secret information to the servers.

Ort, förlag, år, upplaga, sidor
New York: IEEE Press, 2014
Nyckelord
Public Key Generation, Privacy, Security, Certification, Protocol
Nationell ämneskategori
Datorsystem Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-41929 (URN)10.1109/TrustCom.2014.19 (DOI)000380562600015 ()
Konferens
13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 24-26 Sept. 2014, Beijing
Tillgänglig från: 2016-04-26 Skapad: 2016-04-26 Senast uppdaterad: 2018-01-10Bibliografiskt granskad
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-5159-9517

Sök vidare i DiVA

Visa alla publikationer