|
1 Introduction to Smart Grids |
|
|
1 | (10) |
|
|
1 | (3) |
|
1.1.1 Communication Network Architecture |
|
|
1 | (1) |
|
1.1.2 Characteristics of Smart Grids |
|
|
2 | (2) |
|
1.2 Research Topics in Smart Grids |
|
|
4 | (2) |
|
|
6 | (2) |
|
1.3.1 Homomorphic Encryption |
|
|
6 | (1) |
|
|
7 | (1) |
|
1.3.3 Identity-Based Signature |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (3) |
|
|
9 | (2) |
|
2 Privacy-Preserving Demand Response in Smart Grids |
|
|
11 | (20) |
|
|
11 | (1) |
|
2.2 Models and Design Goal |
|
|
12 | (2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (6) |
|
2.3.1 System Initialization |
|
|
14 | (1) |
|
|
15 | (2) |
|
2.3.3 Demand Processing and Response |
|
|
17 | (1) |
|
|
18 | (2) |
|
|
20 | (5) |
|
2.4.1 Authenticity, Data Integrity and Confidentiality |
|
|
20 | (1) |
|
2.4.2 Privacy Preservation of Electricity Demand |
|
|
21 | (1) |
|
2.4.3 Forward Secrecy of Users' Session Keys |
|
|
22 | (2) |
|
2.4.4 Evolution of Users' Private Keys |
|
|
24 | (1) |
|
2.5 Performance Evaluation |
|
|
25 | (2) |
|
2.5.1 Communication Overhead |
|
|
25 | (1) |
|
2.5.2 Computation Overhead |
|
|
26 | (1) |
|
|
27 | (2) |
|
|
29 | (2) |
|
|
29 | (2) |
|
3 An Efficient Authentication Scheme in Smart Grids |
|
|
31 | (16) |
|
|
31 | (2) |
|
3.2 Models and Design Goal |
|
|
33 | (2) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (4) |
|
3.3.1 System Initialization |
|
|
35 | (2) |
|
|
37 | (1) |
|
3.3.3 Neighborhood Gateway Authentication |
|
|
37 | (2) |
|
|
39 | (2) |
|
3.4.1 Resist the Message Analysis Attack |
|
|
39 | (1) |
|
3.4.2 Resist the Message Modification Attack |
|
|
39 | (1) |
|
3.4.3 Resist the Replay Attack |
|
|
40 | (1) |
|
3.4.4 Resist the Message Injection Attack |
|
|
40 | (1) |
|
3.5 Performance Evaluation |
|
|
41 | (2) |
|
3.5.1 Communication Overhead |
|
|
41 | (1) |
|
3.5.2 Computation Complexity |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (3) |
|
|
45 | (2) |
|
4 An Efficient Fine-Grained Keywords Comparison Scheme in the Smart Grid Auction Market |
|
|
47 | (14) |
|
|
47 | (1) |
|
4.2 System Model, Security Requirements, and Design Goals |
|
|
48 | (2) |
|
|
48 | (1) |
|
4.2.2 Security Requirements |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (4) |
|
4.3.1 System Initialization |
|
|
50 | (1) |
|
4.3.2 Auction Message Creating |
|
|
51 | (1) |
|
|
52 | (2) |
|
|
54 | (2) |
|
4.4.1 Secure Fine-Grained Keywords Comparison Between Tag and Trapdoor |
|
|
55 | (1) |
|
4.4.2 Privacy Preservation of Auction Messages |
|
|
55 | (1) |
|
4.4.3 Encrypted Messages' Authentication and Data Integrity |
|
|
55 | (1) |
|
4.4.4 Private Messages' Authentication, Data Integrity and Confidentiality |
|
|
56 | (1) |
|
4.5 Performance Evaluation |
|
|
56 | (3) |
|
4.5.1 Computation Overhead |
|
|
56 | (2) |
|
4.5.2 Communication Overhead |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (2) |
|
|
59 | (2) |
|
5 Conclusions and Future Directions |
|
|
61 | |
|
|
61 | (1) |
|
|
62 | |