File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Selling power back to the grid in a secure and privacy-preserving manner

TitleSelling power back to the grid in a secure and privacy-preserving manner
Authors
Issue Date2012
Citation
The 14th International Conference of Information and Communications Security (ICICS 2012), Hong Kong, China, 29-31 October 2012. In Lecture Notes in Computer Science, 2012, v. 7618, p. 445-452 How to Cite?
AbstractSmart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenue. However, the process of power selling induces two security problems, namely authentication and privacy-preservation. Like other messages, a customer's request messages for power selling should be properly authenticated to avoid various attacks. At the same time, the customer's privacy such as daily electricity usage pattern should be properly protected. In this paper, we propose a secure and privacy-preserving protocol to make this possible. Basically, authentication is done by means of anonymous credentials. Even in the reconciliation phase, the power operator only knows how much power a customer has uploaded to the grid but cannot know when the customer has done so. We evaluate our scheme to show that it is effective. © 2012 Springer-Verlag.
DescriptionLecture Notes in Computer Science, Vol. 7618 entitled: Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012: Proceedings
Persistent Identifierhttp://hdl.handle.net/10722/192713
ISBN
ISSN
2005 Impact Factor: 0.402
2015 SCImago Journal Rankings: 0.252

 

DC FieldValueLanguage
dc.contributor.authorChim, TWen_US
dc.contributor.authorYiu, SMen_US
dc.contributor.authorHui, LCKen_US
dc.contributor.authorLi, VOKen_US
dc.contributor.authorMui, TWen_US
dc.contributor.authorTsang, YHen_US
dc.contributor.authorKwok, CKen_US
dc.contributor.authorYu, KYen_US
dc.date.accessioned2013-11-20T04:57:10Z-
dc.date.available2013-11-20T04:57:10Z-
dc.date.issued2012en_US
dc.identifier.citationThe 14th International Conference of Information and Communications Security (ICICS 2012), Hong Kong, China, 29-31 October 2012. In Lecture Notes in Computer Science, 2012, v. 7618, p. 445-452en_US
dc.identifier.isbn9783642341281-
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/10722/192713-
dc.descriptionLecture Notes in Computer Science, Vol. 7618 entitled: Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012: Proceedings-
dc.description.abstractSmart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenue. However, the process of power selling induces two security problems, namely authentication and privacy-preservation. Like other messages, a customer's request messages for power selling should be properly authenticated to avoid various attacks. At the same time, the customer's privacy such as daily electricity usage pattern should be properly protected. In this paper, we propose a secure and privacy-preserving protocol to make this possible. Basically, authentication is done by means of anonymous credentials. Even in the reconciliation phase, the power operator only knows how much power a customer has uploaded to the grid but cannot know when the customer has done so. We evaluate our scheme to show that it is effective. © 2012 Springer-Verlag.en_US
dc.languageengen_US
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.titleSelling power back to the grid in a secure and privacy-preserving manneren_US
dc.typeConference_Paperen_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.doi10.1007/978-3-642-34129-8_43en_US
dc.identifier.scopuseid_2-s2.0-84868328585en_US
dc.identifier.hkuros223889-
dc.identifier.volume7618en_US
dc.identifier.spage445en_US
dc.identifier.epage452en_US
dc.description.otherThe 14th International Conference of Information and Communications Security (ICICS 2012), Hong Kong, China, 29-31 October 2012. In Lecture Notes in Computer Science, 2012, v. 7618, p. 445-452-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats