Muutke küpsiste eelistusi

E-raamat: Enabling Secure and Privacy Preserving Communications in Smart Grids

  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in smart grids. The brief is designed for researchers and professionals working with computer communication networks and smart grids. Graduate students interested in networks and communication engineering will also find the brief an essential resource.
1 Introduction to Smart Grids
1(10)
1.1 Smart Grids
1(3)
1.1.1 Communication Network Architecture
1(1)
1.1.2 Characteristics of Smart Grids
2(2)
1.2 Research Topics in Smart Grids
4(2)
1.3 Security Primitives
6(2)
1.3.1 Homomorphic Encryption
6(1)
1.3.2 Bilinear Pairing
7(1)
1.3.3 Identity-Based Signature
7(1)
1.3.4 Merkle Hash Tree
7(1)
1.4 Summary
8(3)
References
9(2)
2 Privacy-Preserving Demand Response in Smart Grids
11(20)
2.1 Introduction
11(1)
2.2 Models and Design Goal
12(2)
2.2.1 Network Model
12(1)
2.2.2 Security Model
13(1)
2.2.3 Design Goal
14(1)
2.3 Methodologies
14(6)
2.3.1 System Initialization
14(1)
2.3.2 Demand Aggregation
15(2)
2.3.3 Demand Processing and Response
17(1)
2.3.4 Key Evolution
18(2)
2.4 Security Analysis
20(5)
2.4.1 Authenticity, Data Integrity and Confidentiality
20(1)
2.4.2 Privacy Preservation of Electricity Demand
21(1)
2.4.3 Forward Secrecy of Users' Session Keys
22(2)
2.4.4 Evolution of Users' Private Keys
24(1)
2.5 Performance Evaluation
25(2)
2.5.1 Communication Overhead
25(1)
2.5.2 Computation Overhead
26(1)
2.6 Related Works
27(2)
2.7 Summary
29(2)
References
29(2)
3 An Efficient Authentication Scheme in Smart Grids
31(16)
3.1 Introduction
31(2)
3.2 Models and Design Goal
33(2)
3.2.1 Network Model
33(1)
3.2.2 Threat Model
33(1)
3.2.3 Design Goal
34(1)
3.3 Methodologies
35(4)
3.3.1 System Initialization
35(2)
3.3.2 Reports Generation
37(1)
3.3.3 Neighborhood Gateway Authentication
37(2)
3.4 Security Analysis
39(2)
3.4.1 Resist the Message Analysis Attack
39(1)
3.4.2 Resist the Message Modification Attack
39(1)
3.4.3 Resist the Replay Attack
40(1)
3.4.4 Resist the Message Injection Attack
40(1)
3.5 Performance Evaluation
41(2)
3.5.1 Communication Overhead
41(1)
3.5.2 Computation Complexity
42(1)
3.6 Related Works
43(1)
3.7 Summary
44(3)
References
45(2)
4 An Efficient Fine-Grained Keywords Comparison Scheme in the Smart Grid Auction Market
47(14)
4.1 Introduction
47(1)
4.2 System Model, Security Requirements, and Design Goals
48(2)
4.2.1 System Model
48(1)
4.2.2 Security Requirements
49(1)
4.2.3 Design Goals
49(1)
4.3 Methodologies
50(4)
4.3.1 System Initialization
50(1)
4.3.2 Auction Message Creating
51(1)
4.3.3 Filtering
52(2)
4.4 Security Analysis
54(2)
4.4.1 Secure Fine-Grained Keywords Comparison Between Tag and Trapdoor
55(1)
4.4.2 Privacy Preservation of Auction Messages
55(1)
4.4.3 Encrypted Messages' Authentication and Data Integrity
55(1)
4.4.4 Private Messages' Authentication, Data Integrity and Confidentiality
56(1)
4.5 Performance Evaluation
56(3)
4.5.1 Computation Overhead
56(2)
4.5.2 Communication Overhead
58(1)
4.6 Related Works
59(1)
4.7 Summary
59(2)
References
59(2)
5 Conclusions and Future Directions
61
5.1 Research Conclusions
61(1)
5.2 Future Extensions
62