Change search
Link to record
Permanent link

Direct link
BETA
Alternative names
Publications (2 of 2) Show all publications
Borges, F. & Martucci, L. (2014). iKUP keeps users' privacy in the Smart Grid. In: Communications and Network Security (CNS), 2014 IEEE Conference on: . Paper presented at IEEE Conference on Communications and Network Security (CNS 2014), 29-31 Oct. 2014, San Francisco, CA (pp. 310-318). IEEE conference proceedings
Open this publication in new window or tab >>iKUP keeps users' privacy in the Smart Grid
2014 (English)In: Communications and Network Security (CNS), 2014 IEEE Conference on, IEEE conference proceedings, 2014, p. 310-318Conference paper, Published paper (Refereed)
Abstract [en]

Privacy-enhancing technologies for the Smart Grid usually address either the consolidation of users’ energy consumption or the verification of billing information. The goal of this paper is to introduce iKUP, a protocol that addresses both problems simultaneously. iKUP is an efficient privacy-enhancingprotocol based on DC-Nets and Elliptic Curve Cryptography as Commitment. It covers the entire cycle of power provisioning, consumption, billing, and verification. iKUP allows: (i) utility providers to obtain a consolidated energy consumption value that relates to the consumption of a user set, (ii) utility providers to verify the correctness of this consolidated value, and (iii) the verification of the correctness of the billing information by both utility providers and users. iKUP prevents utility providers from identifying individual contributions to the consolidated value and, therefore, protects the users’ privacy. The analytical performance evaluation of iKUP is validated through simulation using as input a real-world data set with over 157 million measurements collected from 6,345 smart meters. Our results show that iKUP has a worse performance than other protocols in aggregationand decryption, which are operations that happen only once per round of measurements and, thus, have a low impactin the total protocol performance. iKUP heavily outperformsother protocols in encryption, which is the most demanded cryptographic function, has the highest impact on the overall protocol performance, and it is executed in the smart meters.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2014
Keywords
privacy, smart grid, security, cryptography, simulation, real world data set
National Category
Computer Sciences Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-41927 (URN)10.1109/CNS.2014.6997499 (DOI)
Conference
IEEE Conference on Communications and Network Security (CNS 2014), 29-31 Oct. 2014, San Francisco, CA
Available from: 2016-04-26 Created: 2016-04-26 Last updated: 2018-01-10Bibliographically approved
Borges, F., Martucci, L., Beato, F. & Mühlhäuser, M. (2014). Secure and Privacy-Friendly Public Key Generation and Certification. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications: . Paper presented at 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 24-26 Sept. 2014, Beijing (pp. 114-121). New York: IEEE Press
Open this publication in new window or tab >>Secure and Privacy-Friendly Public Key Generation and Certification
2014 (English)In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, New York: IEEE Press, 2014, p. 114-121Conference paper, Published paper (Refereed)
Abstract [en]

Digital societies increasingly rely on secure communication between parties. Certificate enrollment protocols are used by certificate authorities to issue public key certificates to clients. Key agreement protocols, such as Diffie-Hellman, are used to compute secret keys, using public keys as input, for establishing secure communication channels. Whenever the keys are generated by clients, the bootstrap process requires either (a) an out-of-band verification for certification of keys when those are generated by the clients themselves, or (b) a trusted server to generate both the public and secret parameters. This paper presents a novel constrained key agreement protocol, built upon a constrained Diffie-Hellman, which is used to generate a secure public-private key pair, and to set up a certification environment without disclosing the private keys. In this way, the servers can guarantee that the generated key parameters are safe, and the clients do not disclose any secret information to the servers.

Place, publisher, year, edition, pages
New York: IEEE Press, 2014
Keywords
Public Key Generation, Privacy, Security, Certification, Protocol
National Category
Computer Systems Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-41929 (URN)10.1109/TrustCom.2014.19 (DOI)000380562600015 ()
Conference
13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 24-26 Sept. 2014, Beijing
Available from: 2016-04-26 Created: 2016-04-26 Last updated: 2018-01-10Bibliographically approved
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5159-9517

Search in DiVA

Show all publications