Security and privacy schemes for demand response in smart grids:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Passau
2018
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext Inhaltsverzeichnis |
Beschreibung: | xx, 153 Blätter Illustrationen |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045249062 | ||
003 | DE-604 | ||
005 | 20190307 | ||
007 | t | ||
008 | 181024s2018 a||| m||| 00||| eng d | ||
035 | |a (OCoLC)1119012947 | ||
035 | |a (DE-599)BVBBV045249062 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-473 |a DE-703 |a DE-1051 |a DE-824 |a DE-29 |a DE-12 |a DE-91 |a DE-19 |a DE-1049 |a DE-92 |a DE-739 |a DE-898 |a DE-355 |a DE-706 |a DE-20 |a DE-1102 |a DE-860 |a DE-2174 | ||
084 | |a ZN 8500 |0 (DE-625)157626: |2 rvk | ||
100 | 1 | |a Sui, Zhiyuan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security and privacy schemes for demand response in smart grids |c Zhiyuan Sui |
264 | 1 | |a Passau |c 2018 | |
300 | |a xx, 153 Blätter |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Universität Passau |d 2018 | ||
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:739-opus4-5809 |
856 | 4 | 1 | |u https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-5809 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 1 | |u https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/580 |z kostenfrei |3 Volltext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030637110&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030637110 |
Datensatz im Suchindex
_version_ | 1804178991348711425 |
---|---|
adam_text | Contents List of Figures xiii List of Tables xvii List of Definitions xix 1 2 Introduction 1 1.1 Electrical Grids................................... . . . ................................................... 1 1.1.1 Traditional Electrical Grids........................................................................ 1 1.1.2 Smart Grids................................................................. 2 1.2 Security and PrivacyChallenges for Demand Response....................................... 3 1.3 Contributions ........................................................................................................... 6 1.4 Thesis Structure....................................................................................................... 9 Preliminaries and Related Work 11 2.1 Cryptography................ ............................................................. ............................ 11 2.1.1 Homomorphic Encryption Algorithms..................................................... 11 2.1.2 Anonymous Authentication Schemes ..................................................... 12 Security and Privacy Schemesin Smart Grids...................................................... 14 2.2 2.2.1 Model Taxonomy...................... ........................................................· · · 2.2.2 Secure Aggregation..................................................... 14 2.2.3 Concealed Aggregation.................. 18 2.2.4 Noisy Aggregation............................... 21 2.2.5
Pseudonym................................................................................................. 24 2.2.6 Anonymous Authentication 25 ..................................................................... vu ^
CONTENTS 3 Mandatory Incentive-Based Demand-Response Scheme 31 3.1 Motivational Background........................................................................................ 32 3.1.1 Interruptible/Curtailable........................................................................... 32 3.1.2 Capacity Market Programs........................................................................ 32 3.2 3.3 3.4 3.5 3.6 3.7 Consumption Model .............................................................................................. 33 3.2.1 Network Model........................................................................................... 34 3.2.2 Assumptions.............................................................................................. 35 3.2.3 Scenario....................................................................................................... 36 Preliminaries .......................................................................................................... 38 3.3.1 Bilinear Map.............................................................................................. 38 3.3.2 Mathematical Assumptions........................................................................ 39 Security Model....................................................................................................... 40 3.4.1 Definition.................................................................................................... 40 3.4.2 Security Requirements.............................................................................. 41 3.4.3 Zero-
Knowledge Proof.............................................................................. 44 3.4.4 The Forking Lemma................................................................................. 45 Proposed Scheme.................................................................................................... 45 3.5.1 Setup.......................................................................................................... 46 3.5.2 Joining....................................................................................................... 48 3.5.3 Report Generation..................................................................................... 48 3.5.4 Report Reading........................................................................................... 49 3.5.5 Instruction Generation.............................................................................. 50 3.5.6 Identification.............................................................................................. 50 Security Analysis.................................................................................................... 51 3.6.1 Privacy....................................................................................................... 51 3.6.2 Non-frameability........................................................................................ 53 3.6.3 Traceability................................................................................................. 54 3.6.4
Integrity....................................................................................................... 56 3.6.5 Comparison................................................................................................. 57 Performance Analysis.............................................................................................. 57 3.7.1 Communication Overhead........................................................................ 58 3.7.2 Computational Complexity........................................................................ 59 3.7.3 Comparison................................................................................................. 60 viii
CONTENTS 3.8 4 Summary................................................................................................................ 62 Voluntary Incentive-Based Demand-Response Scheme 65 4.1 Motivational Background....................................................................................... 66 4.1.1 Emergency Demand Response Programs............................................... 66 4.1.2 Direct Load Control 67 4.2 4.3 4.4 4.5 4.6 4.7 ................................................................................. A Privacy PreservationScheme Based on Conditionally Anonymous Authen tication Scheme 69 4.2.1 Consumption and Security Model........................................................... 69 4.2.2 Proposed Scheme....................................................................................... 69 4.2.3 Discussion on the AnonymousAuthentication Based Scheme ..................71 System Model........................................................................................................... 72 4.3.1 Design Goal ............................................................................................. 72 4.3.2 Entities....................................................................................................... 73 4.3.3 Tree Topologies in Smart Grids .............................................................. 74 4.3.4 Optimal Aggregation Tree........................................................................ 75 Security
Model....................................................................................................... 76 4.4.1 Range Proof .............................................................................................. 76 4.4.2 Definition.................................................................................................... 77 4.4.3 Time-Related Random OracleModel ...................................................... 79 4.4.4 Security Requirements.............................................................................. 79 Proposed Scheme.................................................................................................... 84 4.5.1 Setup.......................................................................................................... 86 4.5.2 Hop-by-Hop Aggregation ....................................................................... 88 4.5.3 Secure Report.............................................................................................. 89 4.5.4 Confirmation Proof.................................................................................... 89 Security Analysis.................................................................................................... 90 4.6.1 Authentication.......................................................................................... 91 4.6.2 Integrity....................................................................................................... 92 4.6.3 Privacy Preservation................................................................................. 94 4.6.4
Confidentiality.......................................................................................... 96 4.6.5 Traceability................................................................................................. 98 Performance Analysis.............................................................................................. 99 ix
CONTENTS 4.7.1 Computational Cost ................................................................................. 99 4.7.2 Communication Overhead...........................................................................100 4.7.3 Comparison....................................................................................................100 4.8 Summary.................................................................................................................... 103 5 Prepaid Systems 5.1 5.2 5.3 5.4 5.5 5.6 105 Motivational Background.......................................................................................... 106 5.1.1 Salt River Project.......................................................................................... 106 5.1.2 Security and Privacy in Prepaid Systems.....................................................107 5.1.3 Theft Detection............................................................................................. 107 The Framework..........................................................................................................108 5.2.1 Network Model............................................................................................. 108 5.2.2 Adversary Model.......................................................................................... 110 5.2.3 Security Requirements.................................................................................110 Privacy-Preserving Theft Detection Scheme...........................................................Ill 5.3.1
Setup.............................................................................................................Ill 5.3.2 Joining..........................................................................................................112 5.3.3 Power Purchasing.......................................................................................... 112 5.3.4 Power Requesting 5.3.5 Verification....................................................................................................114 5.3.6 Identification................................................................................................ 114 ....................................................................................... 113 Analysis and Discussion.......................................................................................... 115 5.4.1 Security Analysis.......................................................................................... 115 5.4.2 Performance Analysis .................................................................................117 5.4.3 Discussion....................................................................................................118 Network Model of Virtual Credential-Based Scheme ........................................... 119 5.5.1 Design Goal ................................................................................................ 119 5.5.2 Entities..........................................................................................................120 5.5.3 Blind
Signature............................................................................................. 121 An Efficient Virtual Credential-Based Scheme........................................................121 5.6.1 Setup............................................................................................................. 122 5.6.2 Joining..........................................................................................................122 5.6.3 Power Purchasing.......................................................................................... 123 x
CONTENTS 5.7 5.8 5.9 6 5.6.4 Power Requesting ....................................................................................... 123 5.6.5 Verification.......................................................................................... 5.6.6 Identification................................................................................................ 124 124 Security Analysis.......................................................................................................125 5.7.1 Authentication............................................................................................. 125 5.7.2 Unlinkability................................................................................................ 125 5.7.3 Anonymity....................................................................................................125 5.7.4 Traceability....................................................................................................128 Performance Analysis................................................................................................ 129 5.8.1 Storage Space and Communication Overhead........................ 129 5.8.2 Computation Time....................................................................................... 130 5.8.3 Comparison....................................................................................................130 5.8.4 Scenario..........................................................................................................131
Summary................................................................................................................... 133 Conclusions and Future Work 135 6.1 Main Contributions....................................................................................................135 6.2 Possible Extensions and Integration with Other Solutions..................................... 137 References 141 xi
|
any_adam_object | 1 |
author | Sui, Zhiyuan |
author_facet | Sui, Zhiyuan |
author_role | aut |
author_sort | Sui, Zhiyuan |
author_variant | z s zs |
building | Verbundindex |
bvnumber | BV045249062 |
classification_rvk | ZN 8500 |
collection | ebook |
ctrlnum | (OCoLC)1119012947 (DE-599)BVBBV045249062 |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01973nam a2200421 c 4500</leader><controlfield tag="001">BV045249062</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190307 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">181024s2018 a||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1119012947</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045249062</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-2174</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 8500</subfield><subfield code="0">(DE-625)157626:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sui, Zhiyuan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy schemes for demand response in smart grids</subfield><subfield code="c">Zhiyuan Sui</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Passau</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 153 Blätter</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Universität Passau</subfield><subfield code="d">2018</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:739-opus4-5809</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-5809</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/580</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030637110&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030637110</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV045249062 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:12:46Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030637110 |
oclc_num | 1119012947 |
open_access_boolean | 1 |
owner | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
owner_facet | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
physical | xx, 153 Blätter Illustrationen |
psigel | ebook |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
record_format | marc |
spelling | Sui, Zhiyuan Verfasser aut Security and privacy schemes for demand response in smart grids Zhiyuan Sui Passau 2018 xx, 153 Blätter Illustrationen txt rdacontent n rdamedia nc rdacarrier Dissertation Universität Passau 2018 Sicherheit (DE-588)4054790-5 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Intelligentes Stromnetz (DE-588)7708028-2 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Intelligentes Stromnetz (DE-588)7708028-2 s Sicherheit (DE-588)4054790-5 s Privatsphäre (DE-588)4123980-5 s DE-604 Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:739-opus4-5809 https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-5809 Resolving-System kostenfrei Volltext https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/580 kostenfrei Volltext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030637110&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Sui, Zhiyuan Security and privacy schemes for demand response in smart grids Sicherheit (DE-588)4054790-5 gnd Privatsphäre (DE-588)4123980-5 gnd Intelligentes Stromnetz (DE-588)7708028-2 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4123980-5 (DE-588)7708028-2 (DE-588)4113937-9 |
title | Security and privacy schemes for demand response in smart grids |
title_auth | Security and privacy schemes for demand response in smart grids |
title_exact_search | Security and privacy schemes for demand response in smart grids |
title_full | Security and privacy schemes for demand response in smart grids Zhiyuan Sui |
title_fullStr | Security and privacy schemes for demand response in smart grids Zhiyuan Sui |
title_full_unstemmed | Security and privacy schemes for demand response in smart grids Zhiyuan Sui |
title_short | Security and privacy schemes for demand response in smart grids |
title_sort | security and privacy schemes for demand response in smart grids |
topic | Sicherheit (DE-588)4054790-5 gnd Privatsphäre (DE-588)4123980-5 gnd Intelligentes Stromnetz (DE-588)7708028-2 gnd |
topic_facet | Sicherheit Privatsphäre Intelligentes Stromnetz Hochschulschrift |
url | https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-5809 https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/580 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030637110&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT suizhiyuan securityandprivacyschemesfordemandresponseinsmartgrids |