Advertisement

Background and Models

  • Fábio Borges de Oliveira
Chapter

Abstract

This chapter contextualizes the role of smart meters in smart grid initiatives around the world to show that the smart grid concept goes beyond energy supplier modernization. In addition, this chapter presents the security model and the privacy model for Privacy-Preserving Protocols (PPPs). Security is ensured by means of cryptography, and privacy is protected by aggregation of encrypted measurements.

Keywords

Initiatives Concept Security Privacy Aggregation Maps Cryptography Aggregation 

References

  1. 1.
    F. Borges, L.A. Martucci, M. Mühlhäuser, Analysis of privacy-enhancing protocols based on anonymity networks, in 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm) (2012), pp. 378–383. doi:10.1109/SmartGridComm.2012.6486013
  2. 2.
    F. Borges et al., Secure and privacy-friendly public key generation and certification, in 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2014), pp. 114–121. doi:10.1109/TrustCom.2014.19
  3. 3.
    W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inform. Theory 22 (6), 644–654 (1976). issn:0018-9448. doi:10.1109/TIT.1976.1055638
  4. 4.
    P. Fox-Penner, Smart Power: Climate Change, the Smart Grid, and the Future of Electric Utilities (Island Press, Washington, DC, 2010). isbn:9781597268097Google Scholar
  5. 5.
    F. Katiraei, C. Sun, B. Enayati, No inverter left behind: protection, controls, and testing for high penetrations of pv inverters on distribution systems. IEEE Power Energ. Mag. 13 (2), 43–49 (2015). issn:1540-7977. doi:10.1109/MPE.2014.2380374
  6. 6.
    S. Li, K. Choi, K. Chae, An enhanced measurement transmission scheme for privacy protection in smart grid, in 2013 International Conference on Information Networking (ICOIN) (2013), pp. 18–23. doi:10.1109/ICOIN.2013.6496345
  7. 7.
    D. Novosel, V. Rabl, J. Nelson, A report to the U.S. DOE: IEEE shares its insights on priority issues [leader’s corner]. IEEE Power Energ. Mag. 13 (2), 6–12 (2015). issn:1540–7977. doi:10.1109/MPE.2014.2374971
  8. 8.
    T.G. Paraskevakos, Sensor monitoring device. US Patent 3,842,208 (1974). http://www.google.com/patents/US3842208
  9. 9.
    P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Advances in Cryptology - EUROCRYPT 1999, vol. 1592. Lecture Notes in Computer Science (Springer, Berlin, 1999), pp. 223–238. isbn:978-3-540-65889-4Google Scholar
  10. 10.
    C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28 (4), 656–715 (1949). issn:0005-8580. doi:10.1002/j.1538-7305.1949.tb00928.x
  11. 11.
    J. Vasconcelos, Survey of regulatory and technological developments concerning smart metering in the European Union electricity market (2008). issn:1830-1541. http://hdl.handle.net/1814/9267

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  • Fábio Borges de Oliveira
    • 1
  1. 1.Laboratório Nacional de Computação Científica (LNCC) - PetrópolisRio de JaneiroBrazil

Personalised recommendations