{"id":"https://openalex.org/W4390189373","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10360506","title":"Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids","display_name":"Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390189373","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10360506"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10360506","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111099880","display_name":"Congcong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Congcong Wang","raw_affiliation_strings":["School of Software, Nanjing University of Information Science & Technology,Nanjing,China,210044"],"affiliations":[{"raw_affiliation_string":"School of Software, Nanjing University of Information Science & Technology,Nanjing,China,210044","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100337560","display_name":"Chen Wang","orcid":"https://orcid.org/0000-0002-3119-4763"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Wang","raw_affiliation_strings":["School of Information Science and Engineering, Zhejiang Sci-Tech University,Hangzhou,China,310018"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Zhejiang Sci-Tech University,Hangzhou,China,310018","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["School of Information Science and Engineering, Zhejiang Sci-Tech University,Hangzhou,China,310018"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Zhejiang Sci-Tech University,Hangzhou,China,310018","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028044712","display_name":"Pandi Vijayakumar","orcid":"https://orcid.org/0000-0001-5451-8946"},"institutions":[],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pandi Vijayakumar","raw_affiliation_strings":["University College of Engineering Tindivanam,Department of Computer Science and Engineering,Tamilnadu,India,604001"],"affiliations":[{"raw_affiliation_string":"University College of Engineering Tindivanam,Department of Computer Science and Engineering,Tamilnadu,India,604001","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086666436","display_name":"Md Zakirul Alam Bhuiyan","orcid":"https://orcid.org/0000-0002-9513-9990"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zakirul Alam Bhuiyan","raw_affiliation_strings":["Fordham University,Department of Computer and Information Sciences,New York,USA,10458"],"affiliations":[{"raw_affiliation_string":"Fordham University,Department of Computer and Information Sciences,New York,USA,10458","institution_ids":["https://openalex.org/I164389053"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":69},"biblio":{"volume":null,"issue":null,"first_page":"0643","last_page":"0650"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Security Challenges in Smart Grid Systems","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain and Internet of Things Integration","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.73260176},{"id":"https://openalex.org/keywords/false-data-injection-attacks","display_name":"False Data Injection Attacks","score":0.500711},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4675967},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.4573353}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83691376},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.73260176},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5686128},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5270857},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.49979472},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47870114},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.46962383},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4675967},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.4573353},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4507952},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4167577},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31293976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29831788},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.21949545},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18390474},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15691781},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12228009},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10360506","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U21A20465,62302457,61922045"}],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1963538514","https://openalex.org/W2046998492","https://openalex.org/W2060328144","https://openalex.org/W2144576616","https://openalex.org/W2734490561","https://openalex.org/W2900854145","https://openalex.org/W3036075578","https://openalex.org/W3047624045","https://openalex.org/W3118241334","https://openalex.org/W3118755224","https://openalex.org/W3209583012","https://openalex.org/W3210385920","https://openalex.org/W4213444624","https://openalex.org/W4225637091","https://openalex.org/W4226296989","https://openalex.org/W4292566458","https://openalex.org/W4307111153"],"related_works":["https://openalex.org/W60586779","https://openalex.org/W2765119830","https://openalex.org/W2387292094","https://openalex.org/W2384950545","https://openalex.org/W2353417889","https://openalex.org/W2100707674","https://openalex.org/W2091654030","https://openalex.org/W2054331612","https://openalex.org/W1994220746","https://openalex.org/W1971103114"],"abstract_inverted_index":{"With":[0],"the":[1,16,56,97,103],"rapid":[2],"development":[3],"of":[4,36,87,105],"smart":[5,31,57],"grid":[6,32,58],"technology,":[7],"a":[8,27,80,122],"new":[9],"challenge":[10],"has":[11],"been":[12],"brought":[13],"about":[14],"by":[15],"massive":[17],"data":[18,38,59,70,107,125],"generated":[19],"from":[20],"distributed":[21],"devices.":[22],"Data":[23],"aggregation":[24,71,82],"technology":[25],"plays":[26],"crucial":[28],"role":[29],"in":[30,34,55,96],"schemes,":[33],"terms":[35],"energy":[37],"statistics":[39],"and":[40,47,108,114,130],"resource":[41],"allocation.":[42],"However,":[43],"achieving":[44],"fast":[45],"error-checking":[46,75,86],"improving":[48],"device":[49],"fault-tolerance":[50],"are":[51],"still":[52],"open":[53],"issues":[54],"aggregation.":[60],"To":[61],"address":[62],"these":[63],"issues,":[64],"this":[65,119],"paper":[66],"proposes":[67,79],"an":[68],"error-tolerant":[69],"scheme":[72,78,100,120],"integrated":[73],"with":[74,93],"mechanisms.":[76],"The":[77],"tree-based":[81],"structure,":[83],"facilitating":[84],"swift":[85],"data.":[88],"We":[89],"combine":[90],"masking":[91],"values":[92],"user":[94],"anonymity":[95],"ElGamal":[98],"cryptographic":[99],"to":[101],"ensure":[102],"security":[104],"sensitive":[106],"resist":[109],"collusion":[110],"attacks.":[111],"Both":[112],"theoretical":[113],"experimental":[115],"analyses":[116],"demonstrate":[117],"that":[118],"enables":[121],"lightweight,":[123],"secure":[124],"aggregation,":[126],"ensuring":[127],"enhanced":[128],"reliability":[129],"error-checking.":[131]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390189373","counts_by_year":[],"updated_date":"2024-11-26T14:31:24.214469","created_date":"2023-12-26"}