{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T22:38:11Z","timestamp":1726180691260},"publisher-location":"Cham","reference-count":71,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031203978"},{"type":"electronic","value":"9783031203985"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20398-5_7","type":"book-chapter","created":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T09:12:17Z","timestamp":1669367537000},"page":"71-97","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Privacy-Preserving Data Aggregation Scheme Based on\u00a0Elliptic Curve Cryptography for\u00a0Smart Grid Communications"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2978-0517","authenticated-orcid":false,"given":"Thokozani Felix","family":"Vallent","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6290-1256","authenticated-orcid":false,"given":"Damien","family":"Hanyurwimfura","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6160-1374","authenticated-orcid":false,"given":"Jayavel","family":"Kayalvizhi","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7814-7454","authenticated-orcid":false,"given":"Hyunsung","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0163-8412","authenticated-orcid":false,"given":"Chomora","family":"Mikeka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,26]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.future.2018.02.034","volume":"84","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood, D., Nikooghadam, M.: Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Futur. Gener. Comput. Syst. 84, 47\u201357 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TSG.2016.2553647","volume":"9","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Shen, X.S.: A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans. Smart Grid 9(1), 396\u2013405 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"7_CR3","unstructured":"Akyol, B.A., Kirkham, H., Clements, S.L., Hadley, M.D.: A survey of wireless communications for the electric power system. Technical report, Pacific Northwest National Lab (PNNL), Richland, WA, United States (2010)"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.fcij.2017.11.004","volume":"3","author":"I Ali","year":"2018","unstructured":"Ali, I., Khan, E., Sabir, S.: Privacy-preserving data aggregation in resource-constrained sensor nodes in internet of things: a review. Future Comput. Inform. J. 3(1), 41\u201350 (2018)","journal-title":"Future Comput. Inform. J."},{"issue":"9","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1049\/iet-gtd.2019.1186","volume":"14","author":"MS Alvarez-Alvarado","year":"2020","unstructured":"Alvarez-Alvarado, M.S., Jayaweera, D.: Reliability-based smart-maintenance model for power system generators. IET Gener. Trans. Distrib. 14(9), 1770\u20131780 (2020)","journal-title":"IET Gener. Trans. Distrib."},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.adhoc.2017.05.011","volume":"64","author":"M Badra","year":"2017","unstructured":"Badra, M., Zeadally, S.: Lightweight and efficient privacy-preserving data aggregation approach for the smart grid. Ad Hoc Netw. 64, 32\u201340 (2017)","journal-title":"Ad Hoc Netw."},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.jnca.2015.07.005","volume":"59","author":"M Bae","year":"2016","unstructured":"Bae, M., Kim, K., Kim, H.: Preserving privacy and efficiency in data communication and aggregation for AMI network. J. Netw. Comput. Appl. 59, 333\u2013344 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"7_CR8","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TII.2015.2500882","volume":"12","author":"H Bao","year":"2015","unstructured":"Bao, H., Lu, R.: Comment on \u201cprivacy-enhanced data aggregation scheme against internal attackers in smart grid\u2019\u2019. IEEE Trans. Industr. Inf. 12(1), 2\u20135 (2015)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Bekara, C.: Security issues and challenges for the IoT-based smart grid. In: FNC\/MobiSPC, pp. 532\u2013537 (2014)","DOI":"10.1016\/j.procs.2014.07.064"},{"issue":"23","key":"7_CR10","doi-asserted-by":"publisher","first-page":"7750","DOI":"10.1109\/JSEN.2017.2720458","volume":"17","author":"ORM Boudia","year":"2017","unstructured":"Boudia, O.R.M., Senouci, S.M., Feham, M.: Elliptic curve-based secure multidimensional aggregation for smart grid communications. IEEE Sens. J. 17(23), 7750\u20137757 (2017)","journal-title":"IEEE Sens. J."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Chim, T.W., Yiu, S.M., Hui, L.C., Li, V.O.: Pass: privacy-preserving authentication scheme for smart grid network. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 196\u2013201. IEEE (2011)","DOI":"10.1109\/SmartGridComm.2011.6102316"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/TDSC.2014.2313861","volume":"12","author":"TW Chim","year":"2014","unstructured":"Chim, T.W., Yiu, S.M., Li, V.O., Hui, L.C., Zhong, J.: PRGA: privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid. IEEE Trans. Dependable Secure Comput. 12(1), 85\u201397 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"585","DOI":"10.4218\/etrij.2018-0446","volume":"42","author":"D Das","year":"2020","unstructured":"Das, D., Rout, D.K.: Adaptive algorithm for optimal real-time pricing in cognitive radio enabled smart grid network. ETRI J. 42, 585\u2013595 (2020)","journal-title":"ETRI J."},{"issue":"6","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1109\/TII.2015.2408455","volume":"11","author":"R Deng","year":"2015","unstructured":"Deng, R., Xiao, G., Lu, R., Chen, J.: Fast distributed demand response with spatially and temporally coupled constraints in smart grid. IEEE Trans. Industr. Inf. 11(6), 1597\u20131606 (2015)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10586-018-2820-9","volume":"22","author":"S Desai","year":"2019","unstructured":"Desai, S., Alhadad, R., Chilamkurti, N., Mahmood, A.: A survey of privacy preserving schemes in IoE enabled smart grid advanced metering infrastructure. Clust. Comput. 22(1), 43\u201369 (2019). https:\/\/doi.org\/10.1007\/s10586-018-2820-9","journal-title":"Clust. Comput."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Dong, X., Zhou, J., Alharbi, K., Lin, X., Cao, Z.: An elgamal-based efficient and privacy-preserving data aggregation scheme for smart grid. In: 2014 IEEE Global Communications Conference, pp. 4720\u20134725. IEEE (2014)","DOI":"10.1109\/GLOCOM.2014.7037553"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486\u2013503. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_29"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.ijepes.2017.11.014","volume":"97","author":"M Eissa","year":"2018","unstructured":"Eissa, M.: New protection principle for smart grid with renewable energy sources integration using WiMAX centralized scheduling technology. Int. J. Electr. Power Energy Syst. 97, 372\u2013384 (2018)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.epsr.2018.10.020","volume":"167","author":"M Eissa","year":"2019","unstructured":"Eissa, M., Ali, N.: Performance evaluation of IEEE 802.16 real time polling and unsolicited grant service scheduling for protecting transmission and sub-transmission systems with multi-terminals. Electric Power Syst. Res. 167, 48\u201357 (2019)","journal-title":"Electric Power Syst. Res."},{"key":"7_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/9781119968696","volume-title":"Smart Grid: Technology and Applications","author":"JB Ekanayake","year":"2012","unstructured":"Ekanayake, J.B., Jenkins, N., Liyanage, K., Wu, J., Yokoyama, A.: Smart Grid: Technology and Applications. Wiley, Hoboken (2012)"},{"issue":"2","key":"7_CR21","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2012.2228343","volume":"30","author":"Z Erkin","year":"2013","unstructured":"Erkin, Z., Troncoso-Pastoriza, J.R., Lagendijk, R.L., P\u00e9rez-Gonz\u00e1lez, F.: Privacy-preserving data aggregation in smart metering systems: an overview. IEEE Signal Process. Mag. 30(2), 75\u201386 (2013)","journal-title":"IEEE Signal Process. Mag."},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11227-014-1170-5","volume":"69","author":"MS Farash","year":"2014","unstructured":"Farash, M.S., Attari, M.A.: A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J. Supercomput. 69(1), 395\u2013411 (2014). https:\/\/doi.org\/10.1007\/s11227-014-1170-5","journal-title":"J. Supercomput."},{"issue":"4","key":"7_CR23","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s11235-017-0315-2","volume":"66","author":"MA Ferrag","year":"2017","unstructured":"Ferrag, M.A.: EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications. Telecommun. Syst. 66(4), 671\u2013688 (2017). https:\/\/doi.org\/10.1007\/s11235-017-0315-2","journal-title":"Telecommun. Syst."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Ahmim, A.: Security solutions and applied cryptography in smart grid communications. IGI Global (2016)","DOI":"10.4018\/978-1-5225-1829-7"},{"key":"7_CR25","first-page":"806","volume":"38","author":"MA Ferrag","year":"2018","unstructured":"Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustain. Urban Areas 38, 806\u2013835 (2018)","journal-title":"Sustain. Urban Areas"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"FitzPatrick, G.J., Wollman, D.A.: NIST interoperability framework and action plans. In: IEEE PES General Meeting, pp. 1\u20134. IEEE (2010)","DOI":"10.1109\/PES.2010.5589699"},{"issue":"1","key":"7_CR27","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.jcss.2016.06.005","volume":"83","author":"V Ford","year":"2017","unstructured":"Ford, V., Siraj, A., Rahman, M.A.: Secure and efficient protection of consumer privacy in advanced metering infrastructure supporting fine-grained data analysis. J. Comput. Syst. Sci. 83(1), 84\u2013100 (2017)","journal-title":"J. Comput. Syst. Sci."},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","volume-title":"Security and Trust Management","author":"FD Garcia","year":"2011","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 226\u2013238. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22444-7_15"},{"key":"7_CR29","series-title":"SpringerBriefs in Cybersecurity","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4471-6663-4_1","volume-title":"Smart Grid Security","author":"S Goel","year":"2015","unstructured":"Goel, S., Hong, Y.: Security challenges in smart grid implementation. In: Goel, S., Hong, Y. (eds.) Smart Grid Security. SC, pp. 1\u201339. Springer, London (2015). https:\/\/doi.org\/10.1007\/978-1-4471-6663-4_1"},{"issue":"3","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1109\/TSG.2015.2412091","volume":"7","author":"Y Gong","year":"2015","unstructured":"Gong, Y., Cai, Y., Guo, Y., Fang, Y.: A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans. Smart Grid 7(3), 1304\u20131313 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"6","key":"7_CR31","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.1109\/TIFS.2018.2881730","volume":"14","author":"P Gope","year":"2018","unstructured":"Gope, P., Sikdar, B.: Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids. IEEE Trans. Inf. Forensics Secur. 14(6), 1554\u20131566 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"7_CR32","doi-asserted-by":"publisher","first-page":"2411","DOI":"10.1109\/TSG.2017.2720159","volume":"8","author":"D He","year":"2017","unstructured":"He, D., Kumar, N., Zeadally, S., Vinel, A., Yang, L.T.: Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans. Smart Grid 8(5), 2411\u20132419 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"He, D., Zeadally, S., Wang, H., Liu, Q.: Lightweight data aggregation scheme against internal attackers in smart grid using elliptic curve cryptography. Wireless Communications and Mobile Computing 2017 (2017)","DOI":"10.1155\/2017\/3194845"},{"key":"7_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-319-60033-8_41","volume-title":"Wireless Algorithms, Systems, and Applications","author":"C Hu","year":"2017","unstructured":"Hu, C., Huo, Y., Ma, L., Liu, H., Deng, S., Feng, L.: An attribute-based secure and scalable scheme for data communications in smart grids. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds.) WASA 2017. LNCS, vol. 10251, pp. 469\u2013482. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60033-8_41"},{"issue":"6","key":"7_CR35","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security-a survey. IEEE Internet Things J. 4(6), 1802\u20131831 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"7_CR36","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.3390\/app5041503","volume":"5","author":"J Hur","year":"2015","unstructured":"Hur, J., Koo, D., Shin, Y.: Privacy-preserving smart metering with authentication in a smart grid. Appl. Sci. 5(4), 1503\u20131527 (2015)","journal-title":"Appl. Sci."},{"issue":"3","key":"7_CR37","doi-asserted-by":"publisher","first-page":"1732","DOI":"10.1109\/TSG.2015.2449278","volume":"7","author":"HJ Jo","year":"2015","unstructured":"Jo, H.J., Kim, I.S., Lee, D.H.: Efficient and privacy-preserving metering protocols for smart grid systems. IEEE Trans. Smart Grid 7(3), 1732\u20131742 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Koo, J., Lin, X., Bagchi, S.: RL-BLH: learning-based battery control for cost savings and privacy preservation for smart meters. In: 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 519\u2013530. IEEE (2017)","DOI":"10.1109\/DSN.2017.16"},{"issue":"5","key":"7_CR39","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/JIOT.2014.2358578","volume":"1","author":"D Li","year":"2014","unstructured":"Li, D., Aung, Z., Williams, J., Sanchez, A.: P3: privacy preservation protocol for automatic appliance control application in smart grid. IEEE Internet Things J. 1(5), 414\u2013429 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"7_CR40","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TII.2017.2721542","volume":"14","author":"S Li","year":"2017","unstructured":"Li, S., Xue, K., Yang, Q., Hong, P.: PPMA: privacy-preserving multisubset data aggregation in smart grid. IEEE Trans. Industr. Inf. 14(2), 462\u2013471 (2017)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"5","key":"7_CR41","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1016\/j.eswa.2013.10.003","volume":"41","author":"JK Liu","year":"2014","unstructured":"Liu, J.K., Yuen, T.H., Au, M.H., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5), 2559\u20132564 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"7_CR42","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/JSEN.2015.2489258","volume":"16","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Cheng, C., Gu, T., Jiang, T., Li, X.: A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 16(3), 836\u2013842 (2015)","journal-title":"IEEE Sens. J."},{"issue":"3","key":"7_CR43","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","volume":"15","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Guo, W., Fan, C.I., Chang, L., Cheng, C.: A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Industr. Inf. 15(3), 1767\u20131774 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Lu, R., Alharbi, K., Lin, X., Huang, C.: A novel privacy-preserving set aggregation scheme for smart grid communications. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/GLOCOM.2015.7417029"},{"key":"7_CR45","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302\u20133312 (2017)","journal-title":"IEEE Access"},{"issue":"9","key":"7_CR46","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R Lu","year":"2012","unstructured":"Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621\u20131631 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7_CR47","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur. Gener. Comput. Syst. 81, 557\u2013565 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"7_CR48","doi-asserted-by":"publisher","first-page":"32907","DOI":"10.1109\/ACCESS.2019.2903533","volume":"7","author":"Y Ming","year":"2019","unstructured":"Ming, Y., Zhang, X., Shen, X.: Efficient privacy-preserving multi-dimensional data aggregation scheme in smart grid. IEEE Access 7, 32907\u201332921 (2019)","journal-title":"IEEE Access"},{"key":"7_CR49","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems For Energy-efficiency in Building, pp. 61\u201366 (2010)","DOI":"10.1145\/1878431.1878446"},{"issue":"23","key":"7_CR50","doi-asserted-by":"publisher","first-page":"7596","DOI":"10.1109\/JSEN.2017.2735539","volume":"17","author":"R Morello","year":"2017","unstructured":"Morello, R., Mukhopadhyay, S.C., Liu, Z., Slomovitz, D., Samantaray, S.R.: Advances on sensing technologies for smart cities and power grids: a review. IEEE Sens. J. 17(23), 7596\u20137610 (2017)","journal-title":"IEEE Sens. J."},{"key":"7_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"issue":"1","key":"7_CR52","first-page":"289","volume":"3","author":"A Pawar","year":"2013","unstructured":"Pawar, A., Rahane, S.: Opportunities and challenges of wireless communication technologies for smart grid applications. Int. J. Comput. Netw. Wirel. Mobile Commun. (IJCNWMC) 3(1), 289\u2013296 (2013)","journal-title":"Int. J. Comput. Netw. Wirel. Mobile Commun. (IJCNWMC)"},{"key":"7_CR53","doi-asserted-by":"crossref","unstructured":"Phiri, K.K., Kim, H.: Linear secret sharing scheme with reduced number of polynomials. Secur. Commun. Netw. (2019)","DOI":"10.1155\/2019\/5134534"},{"key":"7_CR54","unstructured":"Qu, H., Shang, P., Lin, X.J., Sun, L.: Cryptanalysis of a privacy-preserving smart metering scheme using linkable anonymous credential. IACR Cryptol. ePrint Arch. 2015, 1066 (2015)"},{"key":"7_CR55","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: Cryptography. In: Algorithms and Complexity, pp. 717\u2013755. Elsevier (1990)","DOI":"10.1016\/B978-0-444-88071-0.50018-7"},{"key":"7_CR56","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.future.2019.09.016","volume":"102","author":"C Savaglio","year":"2020","unstructured":"Savaglio, C., Ganzha, M., Paprzycki, M., B\u0103dic\u0103, C., Ivanovi\u0107, M., Fortino, G.: Agent-based internet of things: State-of-the-art and research challenges. Futur. Gener. Comput. Syst. 102, 1038\u20131053 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"7_CR57","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1109\/TIFS.2015.2512525","volume":"11","author":"N Saxena","year":"2015","unstructured":"Saxena, N., Choi, B.J., Lu, R.: Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Trans. Inf. Forensics Secur. 11(5), 907\u2013921 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR58","unstructured":"Scott, M.: Multiprecision integer and rational arithmetic cryptographic library (2003)"},{"issue":"6","key":"7_CR59","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TIFS.2017.2656475","volume":"12","author":"H Shen","year":"2017","unstructured":"Shen, H., Zhang, M., Shen, J.: Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans. Inf. Forensics Secur. 12(6), 1369\u20131381 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR60","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cose.2019.03.014","volume":"84","author":"S Sultan","year":"2019","unstructured":"Sultan, S.: Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: a survey. Comput. Secur. 84, 148\u2013165 (2019)","journal-title":"Comput. Secur."},{"issue":"9\u201310","key":"7_CR61","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s12243-017-0602-7","volume":"72","author":"M Tahir","year":"2017","unstructured":"Tahir, M., Khan, A., Hameed, A., Alam, M., Khan, M.K., Jabeen, F.: Towards a set aggregation-based data integrity scheme for smart grids. Ann. Telecommun. 72(9\u201310), 551\u2013561 (2017). https:\/\/doi.org\/10.1007\/s12243-017-0602-7","journal-title":"Ann. Telecommun."},{"issue":"1","key":"7_CR62","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/COMST.2016.2616442","volume":"19","author":"S Tan","year":"2017","unstructured":"Tan, S., De, D., Song, W.Z., Yang, J., Das, S.K.: Survey of security advances in smart grid: a data driven approach. IEEE Commun. Surv. Tutor. 19(1), 397\u2013422 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"7_CR63","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.future.2017.04.031","volume":"78","author":"S Tonyali","year":"2018","unstructured":"Tonyali, S., Akkaya, K., Saputro, N., Uluagac, A.S., Nojoumian, M.: Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems. Futur. Gener. Comput. Syst. 78, 547\u2013557 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"7_CR64","doi-asserted-by":"crossref","unstructured":"Ustun, T.S., Khan, R.H., Hadbah, A., Kalam, A.: An adaptive microgrid protection scheme based on a wide-area smart grid communications network. In: 2013 IEEE Latin-America Conference on Communications, pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/LatinCom.2013.6759822"},{"key":"7_CR65","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.comnet.2017.08.025","volume":"129","author":"E Vahedi","year":"2017","unstructured":"Vahedi, E., Bayat, M., Pakravan, M.R., Aref, M.R.: A secure ECC-based privacy preserving data aggregation scheme for smart grids. Comput. Netw. 129, 28\u201336 (2017)","journal-title":"Comput. Netw."},{"key":"7_CR66","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., Mouftah, H.: Provisioning substation-level authentication in the smart grid networks. In: 2011-MILCOM 2011 Military Communications Conference, pp. 1189\u20131194. IEEE (2011)","DOI":"10.1109\/MILCOM.2011.6127461"},{"issue":"9","key":"7_CR67","doi-asserted-by":"publisher","first-page":"2900","DOI":"10.3390\/s21092900","volume":"21","author":"TF Vallent","year":"2021","unstructured":"Vallent, T.F., Hanyurwimfura, D., Mikeka, C.: Efficient certificate-less aggregate signature scheme with conditional privacy-preservation for vehicular ad hoc networks enhanced smart grid system. Sensors 21(9), 2900 (2021)","journal-title":"Sensors"},{"issue":"2","key":"7_CR68","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TSG.2011.2120634","volume":"2","author":"D Wu","year":"2011","unstructured":"Wu, D., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375\u2013381 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"7_CR69","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TSG.2012.2199141","volume":"3","author":"J Xia","year":"2012","unstructured":"Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437\u20131443 (2012)","journal-title":"IEEE Trans. Smart Grid"},{"key":"7_CR70","unstructured":"Yun, M., Yuxin, B.: Research on the architecture and key technology of internet of things (IoT) applied on smart grid. In: 2010 International Conference on Advances in Energy Engineering, pp. 69\u201372. IEEE (2010)"},{"issue":"1","key":"7_CR71","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2020.2994363","volume":"15","author":"X Zuo","year":"2020","unstructured":"Zuo, X., Li, L., Peng, H., Luo, S., Yang, Y.: Privacy-preserving multidimensional data aggregation scheme without trusted authority in smart grid. IEEE Syst. J. 15(1), 395\u2013406 (2020)","journal-title":"IEEE Syst. J."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Grid and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20398-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T19:46:03Z","timestamp":1701459963000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20398-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031203978","9783031203985"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20398-5_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SGIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Grid and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sgiot2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sgiot.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}