Research on Privacy Protection Scheme Based on Certificateless Aggregation Signcryption in AMI
DOI: 10.23977/iotea.2019.41002 | Downloads: 67 | Views: 4580
Author(s)
Wang Baoyi 1, Liu Li 1, Zhang Shaomin 1, Huang Jing 1
Affiliation(s)
1 School of Control and Computer Engineering, North China Electric Power University, Baoding, 071003, China
Corresponding Author
Wang BaoyiABSTRACT
User's power smart meter value is frequently uploaded to the power company by the smart meters, which makes users face privacy leakage issues. The smart meter sends the data to the power company through the data concentrator. So the data concentrator has a large amount of data to be transmitted. Therefore, we design a secure certificateless aggregation signcryption scheme for this problem. Using the scheme not only protects the user's power usage information from being leaked, but also reduces the amount of data transmitted by the data concentrator by aggregation. Through calculation and comparison, it is concluded that implementing the scheme has shorter computing time than the existing security scheme, which can greatly improve the data transmission efficiency.
KEYWORDS
AMI, certificateless aggregation signcryption, privacy protectionCITE THIS PAPER
Baoyi, W., Li, L., Shaomin, Z., Jing, H., , Research on Privacy Protection Scheme Based on Certificateless Aggregation Signcryption in AMI, Internet of Things (IoT) and Engineering Applications (2019) 4: 7-12. DOI: http://dx.doi.org/10.23977/iotea.2019.41002.
REFERENCES
[1] LIANG Jianquan, JIN Xianji, TONG Weiming, et al. Key Management Scheme for Wireless Sensor Networks in Advanced Metering Infrastructure[J].Automation of Electric Power Systems,2016,40(19):119-126.
[2] SU Sheng, LI Zhiqiang, GU Ke, et al. Cloud Security Based Malware Detection in Advanced Metering Infrastructure[J].Automation of Electric Power Systems,2017,41(5):134-138.
[3] LUAN Wenpeng , WANG Guan , XU Daqing. Advanced Metering Infrastructure Solution Supporting Multiple Services and Business Integration [J]. Proceedings of the CSEE, 2014, 34 (29): 5088-5095.
[4] ZHANG Xu. The research on data privacy protection for user in smart grid[D]. Shanghai University of Electric Power, 2017.
[5] LU Baohui, MA Yonghong. Research on communication system of advanced metering infrastructure for smart grid and its data security measures [J]. Power System Technology, 2013, 37 (8): 2244-2249.
[6] V. Seferian, R. Kanj, A. Chehab and A. Kayssi, "Identity Based Key Distribution Framework for Link Layer Security of AMI Networks," in IEEE Transactions on Smart Grid, 2018, 9(4): 3166 - 3179.
[7] FAN Ai-wan,LIU Yukun, ZHAO Weiting. Application of Certificateless Signcryption Scheme to Smart Grids [J]. Electric Power, 2014,47(7):128-133.
[8] LIU J H, MAO K F, HU J W. Certificateless aggregate signcryption scheme based on bilinear pairings[J]. Journal of Computer Applications, 2016, 36 (6): 1558 -1562.
[9] ZHANG X F, WEI L X, WANG X Z. Certificateless aggregate signcryption scheme with public verifiability [J]. Journal of Computer Applications, 2013,33(7) : 1858 -1860.
[10] SU Jingfeng, LIU Juxia. Efficient certificateless aggregate signcryption scheme without bilinear pairings [J]. Journalof Computer Applications, 2018, 38(2): 374-378, 385.
Downloads: | 905 |
---|---|
Visits: | 71577 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks