SEARCH

SEARCH BY CITATION

References

  • 1
    National Institute of Standards and Technology (NIST). Guidelines for smart grid cyber security, NIST Interagency Report 7628, National Institute of Standards and Technology, Information Technology Laboratory, 2010. http://www.nist.gov.
  • 2
    Beitollahi H, Deconinck G. Peer-to-peer networks applied to power grid, 2007.
  • 3
    Rogers J, Wang A. Peer to Peer Electricity: Beyond the Smart Grid. AXL, Incorporated: 2012.
  • 4
    Rusitschka S, Gerdes C, Eger K. A low-cost alternative to smart metering infrastructure based on peer-to-peer technologies, 6th International Conference on the European Energy Market, 2009. EEM 2009, Leuven, Belgium,2009;16.
  • 5
    Khelil A, Jeckel S, Germanus D, Suri N. Towards benchmarking of P2P technologies from a SCADA systems protection perspective, MOBILIGHT 2010: Inproceedings of the 2nd International Conference on Mobile Lightweight Wireless Systems, 2010;400414.
  • 6
    Rottondi C, Verticale G, Krauss C. Distributed privacy-preserving aggregation of metering data in smart grids. IEEE Journal on Selected Areas in Communications 2013; 31 (7): 13421354, DOI: 10.1109/JSAC.2013.130716.
  • 7
    Stoica I, Morris R, Liben-Nowell D, Karger D, Kaashoek M, Dabek F, Balakrishnan H. Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking2003; 11(1): 149160.
  • 8
    Jawurek M, Kerschbaum F, Danezis G. SoK: Privacy technologies for smart grids – a survey of options, 2012. http://www.research.microsoft.com/pubs/178055/paper.pdf.
  • 9
    Li H, Lin X, Yang H, Liang X, Lu R, Shen X. EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Transactions on Parallel and Distributed Systems2013; PP (99): 11, DOI: 10.1109/TPDS.2013.124.
  • 10
    Zhang J, Liu L, Cui Y, Chen Z. SP 2DAS: self-certified pkc-based privacy-preserving data aggregation scheme in smart grid. International Journal of Distributed Sensor Networks 2013; 2013: Article ID 457325, 11 pages, DOI: 10.1155/2013/457325.
  • 11
    Ruj S, Nayak A. A decentralized security framework for data aggregation and access control in smart grids. IEEE Transactions on Smart Grid 2013; 4 (1): 196205, DOI: 10.1109/TSG.2012.2224389.
  • 12
    Dimitriou T, Karame G. Privacy-friendly tasking and trading of energy in smart grids, Proceedings of ACM SAC 13, 28th Symposium on Applied Computing, Coimbra, Portugal, 2013; 652659.
  • 13
    Kursawe K, Danezis G, Kohlweiss M. Privacy-friendly aggregation for the smart-grid. In Privacy Enhancing Technologies, Vol. 6794. Springer-Verlag: Berlin, Heidelberg, 2011; 175191.
  • 14
    Pedersen TP. Non-interactive and information-theoretic secure verifiable secret sharing, Proceedings of the 11th Annual International Cryptology Conference on Advances In Cryptology, CRYPTO ’91, Springer-Verlag: London, UK, UK, 1992; 129140. http://dl.acm.org/citation.cfm?id=646756.705507 [Accessed on January 2013].
  • 15
    Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’99, Springer-Verlag: London, UK, UK, 1999; 148164. http://dl.acm.org/citation.cfm?id=646764.703956 [Accessed on January 2013].
  • 16
    Danezis G, Kohlweiss M, Rial A. Differentially private billing with rebates, 2011. http://www.research.microsoft.com/pubs/144654/main.pdf [Accessed on January 2013].
  • 17
    Backes M, Datta A, Kate A. Asynchronous computational vss with reduced communication complexity. In Topics in Cryptology - CT-RSA 2013, vol. 7779, Dawson Ed (ed), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg, 2013; 259276. DOI: 10.1007/978-3-642-36095-4_17. http://dx.doi.org/10.1007/978-3-642-36095-4_17 [Accessed on January 2013].
  • 18
    Chaum D, Van Heyst E. Group signatures, Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT’91, Springer-Verlag: Berlin, Heidelberg, 1991; 257265. http://dl.acm.org/citation.cfm?id=1754868.1754897 [Accessed on January 2013].
  • 19
    Boneh D, Boyen X, Shacham H. Short group signatures. In Proceedings of CRYPTO 04, LNCS series. Springer-Verlag: Berlin, Heidelberg, 2004; 4155.
  • 20
    Boneh D, Shacham H. Group signatures with verifier-local revocation, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS ’04, ACM: New York, NY, USA, 2004; 168177. http://doi.acm.org/10.1145/1030083.1030106 [Accessed on January 2013].
  • 21
    Wei L, Liu J. Shorter verifier-local revocation group signature with backward unlinkability, Proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing’10, Springer-Verlag: Berlin, Heidelberg,2010;136146. http://dl.acm.org/citation.cfm?id=1948966.1948979 [Accessed on January 2013].
  • 22
    Ratnasamy S, Francis P, Handley M, Karp R, Shenker S. A scalable content-addressable network. SIGCOMM Computer Communication Review 2001-08; 31 (4): 161172, http://doi.acm.org/10.1145/964723.383072 [Accessed on January 2013].
  • 23
    Zhao BY, Kubiatowicz JD, Joseph AD. Tapestry: an infrastructure for fault-tolerant wide-area location and routing. UCB/CSD-01-1141, EECS Department, University of California, Berkeley, 2001. http://www.eecs.berkeley.edu/Pubs/TechRpts/2001/5213.html [Accessed on January 2013].
  • 24
    Rowstron AIT, Druschel P. Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Middleware ’01, Springer-Verlag: London, UK, UK, 2001; 329350. http://dl.acm.org/citation.cfm?id=646591.697650 [Accessed on January 2013].
  • 25
    Douceur J. The Sybil attack. In Peer-to-Peer Systems, vol. 2429, Druschel P, Kaashoek F, Rowstron A (eds), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg, 2002; 251260.
  • 26
    Singh A, Ngan T, Druschel P, Wallach D. Eclipse attacks on overlay networks: threats and defenses, Proc IEEE INFOCOM, Barcelona, Spain, 2006; 112.
  • 27
    Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS. Secure routing for structured peer-to-peer overlay networks. SIGOPS Operating Systems Review 2002-12; 36 (SI): 299314, DOI: 10.1145/844128.844156. http://doi.acm.org/10.1145/844128.844156 [Accessed on January 2013].
  • 28
    Zhang R, Zhang J, Chen Y, Qin N, Liu B, Zhang Y. Making eclipse attacks computationally infeasible in large-scale DHTS, 2011 IEEE 30th International Performance Computing and Communications Conference (IPCCC), Orlando, Florida, USA, 2011; 18. DOI: 10.1109/PCCC.2011.6108091.
  • 29
    Smart N. Cryptography: An Introduction. McGraw-Hill: New York, 2004.
  • 30
    Rottondi C, Verticale G, Capone A. Privacy-preserving smart metering with multiple data consumers. Computer Networks 2013; 57 (7): 16991713, http://www.sciencedirect.com/science/article/pii/S1389128613000364 [Accessed on January 2013].
  • 31
    Varga A, Hornig R. An overview of the OMNeT++ simulation environment, Simutools ’08: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems Workshops, Marseille, France, 2008; 110.
  • 32
    OverSim: the overlay simulation framework. http://www.oversim.org/ [Accessed on January 2013].
  • 33
    Rottondi C, Panzeri A, Yagne C, Verticale G. Detection and mitigation of the eclipse attack in Chord overlays, To appear in International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS-2014), Hasselt, Belgium, June 2014.