|
|
|
|
3 | (10) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (2) |
|
1.3.1 High Level Explanation of the Selected PPPs |
|
|
8 | (1) |
|
1.3.2 Summary of the Results |
|
|
9 | (1) |
|
|
9 | (4) |
|
|
11 | (2) |
|
|
13 | (12) |
|
2.1 Smart Grids Around the World |
|
|
13 | (4) |
|
2.2 Security and Privacy Models |
|
|
17 | (8) |
|
2.2.1 Terminology in PPPs |
|
|
17 | (1) |
|
|
18 | (3) |
|
|
21 | (2) |
|
|
23 | (2) |
|
|
25 | (14) |
|
3.1 Solutions with Restrictive Result |
|
|
25 | (2) |
|
3.1.1 Data Obfuscation by Means of Storage Banks |
|
|
25 | (1) |
|
3.1.2 Anonymization Via Pseudonymous |
|
|
26 | (1) |
|
3.1.3 Data Obfuscation by Means of Noise Injection |
|
|
26 | (1) |
|
3.2 Solutions Addressed in This Book: Anonymization Via Cryptographic Protocols |
|
|
27 | (12) |
|
3.2.1 Protocols Based on Homomorphic Encryption |
|
|
28 | (2) |
|
3.2.2 Protocols Based on DC-Nets |
|
|
30 | (2) |
|
3.2.3 Protocols Based on Commitment |
|
|
32 | (2) |
|
|
34 | (5) |
|
|
|
4 Reasons to Measure Frequently and Their Requirements |
|
|
39 | (10) |
|
4.1 Reasons for Frequent Measurements |
|
|
40 | (4) |
|
4.1.1 Fraud and Energy Loss |
|
|
40 | (1) |
|
4.1.2 Virtualization of the Supplier Commodity Network |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
44 | (5) |
|
|
46 | (3) |
|
5 Quantifying the Aggregation Size |
|
|
49 | (12) |
|
|
50 | (6) |
|
5.2 Probabilistic Properties |
|
|
56 | (5) |
|
|
59 | (2) |
|
6 Selected Privacy-Preserving Protocols |
|
|
61 | (40) |
|
|
62 | (1) |
|
|
63 | (3) |
|
|
65 | (1) |
|
|
65 | (1) |
|
6.2.3 Performance Analysis |
|
|
66 | (1) |
|
6.3 PPP2 Based on Commitments and ECC |
|
|
66 | (13) |
|
6.3.1 Cryptographic Primitives |
|
|
67 | (4) |
|
|
71 | (5) |
|
|
76 | (1) |
|
|
77 | (1) |
|
6.3.5 Performance Analysis |
|
|
78 | (1) |
|
6.4 PPP3 Based on Asymmetric DC-Nets |
|
|
79 | (13) |
|
6.4.1 Cryptographic Primitives |
|
|
80 | (4) |
|
|
84 | (1) |
|
|
85 | (1) |
|
6.4.4 Verification Property |
|
|
86 | (4) |
|
|
90 | (1) |
|
|
90 | (1) |
|
6.4.7 Performance Analysis |
|
|
91 | (1) |
|
6.5 PPP4 Based on Quantum Mechanics |
|
|
92 | (9) |
|
6.5.1 Cryptographic Primitives |
|
|
92 | (1) |
|
|
93 | (3) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (4) |
|
|
101 | (10) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
7.4 Verification Property |
|
|
105 | (1) |
|
|
105 | (2) |
|
|
107 | (4) |
|
|
108 | (3) |
|
8 Simulation and Validation |
|
|
111 | (16) |
|
|
111 | (7) |
|
|
112 | (1) |
|
|
113 | (1) |
|
8.1.3 Dataset Characteristics |
|
|
114 | (4) |
|
8.2 Implementation of the Core Algorithms |
|
|
118 | (1) |
|
8.3 Simulation Parameters |
|
|
118 | (1) |
|
|
119 | (8) |
|
8.4.1 Encryption Algorithms |
|
|
120 | (1) |
|
8.4.2 Aggregation Algorithms |
|
|
121 | (2) |
|
8.4.3 Decryption Algorithms |
|
|
123 | (1) |
|
8.4.4 Overall Performance |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
127 | (4) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (2) |
A Algorithms |
|
131 | (2) |
B Parameters for ECC |
|
133 | (2) |
C Mean Measurement by Meter |
|
135 | (2) |
Glossary |
|
137 | (2) |
Index |
|
139 | |