Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks

[1]  Hung-Min Sun,et al.  RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[2]  Steven B. Leeb,et al.  Power signature analysis , 2003 .

[3]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[4]  Yun Liu,et al.  High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks , 2013, Int. J. Commun. Syst..

[5]  Yacine Challal,et al.  Efficient data aggregation with in-network integrity control for WSN , 2012, J. Parallel Distributed Comput..

[6]  Devesh C. Jinwala,et al.  Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure , 2017, Wirel. Pers. Commun..

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Hung-Min Sun,et al.  SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN , 2013, J. Inf. Hiding Multim. Signal Process..

[9]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[10]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[11]  Sencun Zhu,et al.  SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks , 2008 .

[12]  Devesh C. Jinwala,et al.  Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[13]  Nadeem Javaid,et al.  A review of wireless communications for smart grid , 2015 .

[14]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[15]  Tatsuya Yamazaki,et al.  AERO: extraction of user's activities from electric power consumption data , 2010, IEEE Transactions on Consumer Electronics.

[16]  Chun-I Fan,et al.  Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid , 2014, IEEE Transactions on Industrial Informatics.

[17]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[18]  Armand M. Makowski,et al.  Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links , 2013, IEEE Transactions on Information Theory.

[19]  H. T. Mouftah,et al.  Energy-Efficient Information and Communication Infrastructures in the Smart Grid: A Survey on Interactions and Open Issues , 2015, IEEE Communications Surveys & Tutorials.

[20]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[21]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[22]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[23]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[24]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[25]  Kevin J. Henry,et al.  Resilient Aggregation in Simple Linear Sensor Networks , 2014, IACR Cryptol. ePrint Arch..

[26]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[27]  H. Y. Lam,et al.  A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.

[28]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[29]  Sushmita Ruj,et al.  A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids , 2013, IEEE Transactions on Smart Grid.

[30]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[31]  Roberto Di Pietro,et al.  Confidentiality and integrity for data aggregation in WSN using peer monitoring , 2009, Secur. Commun. Networks.

[32]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[33]  J. Ferrer A new privacy homomorphism and applications , 1996 .

[34]  G. W. Hart,et al.  Nonintrusive appliance load monitoring , 1992, Proc. IEEE.