File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-34129-8_43
- Scopus: eid_2-s2.0-84868328585
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Selling power back to the grid in a secure and privacy-preserving manner
Title | Selling power back to the grid in a secure and privacy-preserving manner |
---|---|
Authors | |
Keywords | anonymous credential authentication blind signature power selling privacy-preservation smart grid |
Issue Date | 2012 |
Citation | The 14th International Conference of Information and Communications Security (ICICS 2012), Hong Kong, China, 29-31 October 2012. In Lecture Notes in Computer Science, 2012, v. 7618, p. 445-452 How to Cite? |
Abstract | Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenue. However, the process of power selling induces two security problems, namely authentication and privacy-preservation. Like other messages, a customer's request messages for power selling should be properly authenticated to avoid various attacks. At the same time, the customer's privacy such as daily electricity usage pattern should be properly protected. In this paper, we propose a secure and privacy-preserving protocol to make this possible. Basically, authentication is done by means of anonymous credentials. Even in the reconciliation phase, the power operator only knows how much power a customer has uploaded to the grid but cannot know when the customer has done so. We evaluate our scheme to show that it is effective. © 2012 Springer-Verlag. |
Description | Lecture Notes in Computer Science, Vol. 7618 entitled: Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012: Proceedings |
Persistent Identifier | http://hdl.handle.net/10722/192713 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chim, TW | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.contributor.author | Li, VOK | en_US |
dc.contributor.author | Mui, TW | en_US |
dc.contributor.author | Tsang, YH | en_US |
dc.contributor.author | Kwok, CK | en_US |
dc.contributor.author | Yu, KY | en_US |
dc.date.accessioned | 2013-11-20T04:57:10Z | - |
dc.date.available | 2013-11-20T04:57:10Z | - |
dc.date.issued | 2012 | en_US |
dc.identifier.citation | The 14th International Conference of Information and Communications Security (ICICS 2012), Hong Kong, China, 29-31 October 2012. In Lecture Notes in Computer Science, 2012, v. 7618, p. 445-452 | en_US |
dc.identifier.isbn | 9783642341281 | - |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/192713 | - |
dc.description | Lecture Notes in Computer Science, Vol. 7618 entitled: Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012: Proceedings | - |
dc.description.abstract | Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenue. However, the process of power selling induces two security problems, namely authentication and privacy-preservation. Like other messages, a customer's request messages for power selling should be properly authenticated to avoid various attacks. At the same time, the customer's privacy such as daily electricity usage pattern should be properly protected. In this paper, we propose a secure and privacy-preserving protocol to make this possible. Basically, authentication is done by means of anonymous credentials. Even in the reconciliation phase, the power operator only knows how much power a customer has uploaded to the grid but cannot know when the customer has done so. We evaluate our scheme to show that it is effective. © 2012 Springer-Verlag. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_US |
dc.subject | anonymous credential | - |
dc.subject | authentication | - |
dc.subject | blind signature | - |
dc.subject | power selling | - |
dc.subject | privacy-preservation | - |
dc.subject | smart grid | - |
dc.title | Selling power back to the grid in a secure and privacy-preserving manner | en_US |
dc.type | Conference_Paper | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1007/978-3-642-34129-8_43 | en_US |
dc.identifier.scopus | eid_2-s2.0-84868328585 | en_US |
dc.identifier.hkuros | 223889 | - |
dc.identifier.volume | 7618 | en_US |
dc.identifier.spage | 445 | en_US |
dc.identifier.epage | 452 | en_US |
dc.description.other | The 14th International Conference of Information and Communications Security (ICICS 2012), Hong Kong, China, 29-31 October 2012. In Lecture Notes in Computer Science, 2012, v. 7618, p. 445-452 | - |
dc.identifier.issnl | 0302-9743 | - |