Abstract
Recently, smart grids have attracted increasing attention [1–4]. Compared with the traditional power grid, smart grids are featured with many attractive characteristics, e.g., self-monitoring, self-healing, remote check, pervasive control and more customer choices [5–8]. One appealing feature of smart grids is demand response (DR), which can assist users to use energy efficiently and transfer non-emergent power demand from on-peak time to off-peak time [9]. DR can also bring various benefits to users. For example, users can reduce their electricity expenditure by matching the operation time of different electric appliances in their places to the period with the cheapest price.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
R. Deng, J. Chen, X. Cao, Y. Zhang, S. Maharjan, and S. Gjessing, “Sensing-performance tradeoff in cognitive radio enabled smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 302–310, 2013.
H. Liang, B. Choi, W. Zhuang, and X. Shen, “Towards optimal energy store-carry-and-deliver for phevs via v2g system,” in IEEE INFOCOM, 2012, pp. 1674–1682.
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “Eppa: An efficient and privacy preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012.
H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, “Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, http://www.computer.org/csdl/trans/td/preprint/06506075-abs.html.
H. Liang, B. Choi, A. Abdrabou, W. Zhuang, and X. Shen, “Decentralized economic dispatch in microgrids via heterogeneous wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 6, pp. 1061–1074, 2012.
M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, “Ecq: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid,” in IEEE GLOBECOM, Atlanta, GA, USA, 2013.
X. Lu, W. Wang, and J. Ma, “An empirical study of communication infrastructures towards the smart grid: Design, implementation, and evaluation,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 170–183, 2013.
M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, “Sesa: An efficient searchable encryption scheme for auction in emerging smart grid marketing,” Security and Communication Networks, http://onlinelibrary.wiley.com/doi/10.1002/sec.699/full.
F. Rahimi and A. Ipakchi, “Demand response as a market resource under the smart grid paradigm,” IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 82–88, 2010.
X. Li, X. Liang, R. Lu, H. Zhu, X. Lin, and X. Shen, “Securing smart grid: Cyber attacks, countermeasures and challenges,” IEEE Communications Magazine, vol. 58, no. 8, pp. 38–45, 2012.
X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Udp: Usage-based dynamic pricing with privacy preservation for smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 141–150, 2013.
H.Li, R.Lu, L.Zhou, B.Yang, and X.Shen, “An efficient merkle tree based authentication scheme for smart grid,” IEEE Systems Journal, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6563123.
H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, “Edr: An efficient demand response scheme for achieving forward secrecy in smart grid,” in IEEE GLOBECOM, 2012, pp. 929–934.
J. Xia and Y. Wang, “Secure key distribution for the smart grid,” IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1437–1443, 2012.
R. Canetti, S. Halevi, and J. Katz, “A forward-secure public-key encryption scheme,” Advances in Eurocrypt 2003, pp. 646–646, 2003.
F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption,” in 2010 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010, pp. 327–332.
M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 675–685, 2011.
P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in EUROCRYPT, 1999, pp. 223–238.
D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001, pp. 213–229.
B. Libert, J. Quisquater, and M. Yung, “Key evolution systems in untrusted update environments,” ACM Transactions on Information and System Security, vol. 13, no. 4, p. 37, 2010.
B. Libert and J. Quisquater, “The exact security of an identity based signature and its applications,” Preprint available at http://eprint.iacr.org/2004/102, 2004.
D. Stinson, Cryptography: theory and practice. CRC press, 2006.
J. Kelsey, “Compression and information leakage of plaintext,” in Fast Software Encryption 2002. Springer, 2002, pp. 95–102.
S. Katti and A. Rao, “Handbook of the poisson distribution,” Technometrics, vol. 10, no. 2, pp. 412–412, 1968.
D. Seo, H. Lee, and A. Perrig, “Secure and efficient capability-based power management in the smart grid,” in IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011, pp. 119–126.
I. Blake, G. Seroussi, and N. Smart, “Pairings,” Advances in elliptic curve cryptography, pp. 183–213, chapter 9, Cambridge University Press, 2005.
W. Dai, “Crypto++ 5.6.0 benchmarks,” http://www.cryptopp.com/benchmarks.html, 2009.
“Miracl crypto,” https://certivox.com/solutions/miracl-crypto-sdk/.
B. Lynn, “Pbc library,” http://crypto.stanford.edu/pbc/.
A. Kate, G. Zaverucha, and I. Goldberg, “Pairing-based onion routing with improved forward secrecy,” ACM Transactions on Information and System Security, vol. 13, no. 4, p. 29, 2010.
C. Chen, S. Huang, and I. Lin, “Providing perfect forward secrecy for location-aware wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2012, no. 1, p. 241, 2012.
Z. Liu, J. Ma, Q. Pei, L. Pang, and Y. Park, “Key infection, secrecy transfer, and key evolution for sensor networks,” IEEE Transactions on Wireless Communications, vol. 9, no. 8, pp. 2643–2653, 2010.
J. Shi, R. Zhang, Y. Liu, and Y. Zhang, “Prisense: privacy-preserving data aggregation in people-centric urban sensing systems,” in INFOCOM, 2010, pp. 1–9.
X. Lin, R. Lu, and X. Shen, “Mdpa: multidimensional privacy-preserving aggregation scheme for wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 10, no. 6, pp. 843–856, 2010.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Li, H. (2014). Privacy-Preserving Demand Response in Smart Grids. In: Enabling Secure and Privacy Preserving Communications in Smart Grids. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04945-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-04945-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04944-1
Online ISBN: 978-3-319-04945-8
eBook Packages: Computer ScienceComputer Science (R0)