Introduction to Smart Grids
Lack of effective real-time diagnosis and healing, the traditional power grid is sporadically suffering from failures and blackouts. For example, on August 14, 2003, power system outage affected large portions of the north eastern U.S. and Canada, which ultimately caused a $6 billion loss in economic revenue . Recently, smart grids have emerged as a promising solution to the next generation power grid system 2]. It utilizes information and communications technology to gather and act on information, such as the behavior of suppliers and consumers in an automated fashion to improve the reliability, efficiency, economics, and sustainability of the generation and distribution of electricity .
KeywordsSmart Grid Authentication Scheme Demand Response Privacy Preservation Homomorphic Encryption
- 1.“blackout 2003,” http://www.ieso.ca/imoweb/EmergencyPrep/blackout2003.
- 2.H. Liang, B. Choi, W. Zhuang, and X. Shen, “Towards optimal energy store-carry-and-deliver for phevs via v2g system,” in IEEE INFOCOM, 2012, pp. 1674–1682.Google Scholar
- 4.“Nist framework and roadmap for smart grid interoperability standards,” Release 1.0, NIST Special Publication 1108, pp. 1–145, 2010.Google Scholar
- 6.“Smart grid,” http://en.wikipedia.org/wiki/Smart_grid.
- 8.“Demand response,” http://en.wikipedia.org/wiki/Demand_response.
- 15.H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, “Edr: An efficient demand response scheme for achieving forward secrecy in smart grid,” in IEEE GLOBECOM, 2012, pp. 929–934.Google Scholar
- 16.H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, “An efficient merkle tree based authentication scheme for smart grid,” IEEE Systems Journal, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6563123.
- 17.F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption,” in 2010 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010, pp. 327–332.Google Scholar
- 20.H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, “Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, http://www.computer.org/csdl/trans/td/preprint/06506075-abs.html.
- 23.“Introduction to nistir 7628 guidelines for smart grid cyber security,” Available: http://www.nist.gov/smartgrid/upload//nistir-7628$_-$total.pdf, 2010.
- 25.M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, “Sesa:an efficient searchable encryption scheme for auction in emerging smart grid marketing,” Security and Communication Networks, http://onlinelibrary.wiley.com/doi/10.1002/sec.699/full, 2013.
- 26.P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in EUROCRYPT, 1999, pp. 223–238.Google Scholar
- 27.D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001, pp. 213–229.Google Scholar
- 28.B. Libert and J. Quisquater, “The exact security of an identity based signature and its applications,” Preprint available at http://eprint.iacr.org/2004/102, 2004.
- 29.R. Rivest, “Rfc 1321: The md5 message-digest algorithm,” Internet activities board, vol. 143, 1992.Google Scholar