Documente Academic
Documente Profesional
Documente Cultură
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 1
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 2
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 3
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 4
area, as shown in Fig. 2(b). Each row of a plane represents one In our scheme, cube-data aggregation is implemented by
users l-dimensional data. We aim to make CC be able to obtain using the Paillier cryptosystem and Horners Rule. We only
the sum of each column of a plane without releasing any item in need two Horner parameters for this.
the cube, as shown in Fig. 2(d). Our model contains several areas and two-level gateways
AMij represents the sum of the j-th dimensional data of the that can realize large-scale user management, and obtain
i-th residential area. In Fig. 2(c), AMi1, AMi2, , AMil are the flexible scalability of user scales and electricity regulation.
sums of the first, the second, , the l-th columns of the i-th In most cases, our batch verification technology can attain
plane, respectively. The target outputs are (AM11, AM12, , good forgery-resisting effects.
cube data, our scheme should guarantee that these planes have calculate = (L(g mod N2))-1. The public key is pk = (N, g),
the same number of rows prior to aggregation. and the private key is sk = (, ).
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 5
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 6
report. The detailed process is as shown in Fig. 5. e( P, r ) e(Yir , H (Cir || ID _ RAGWi || ID _ Userir || T )) (8)
Step 2.1: Userik (i = 1, 2, , m; k = 1, 2, , ni) periodically Dr Seti1 Dr Seti1
collects own data dik = (dik1, dik2, , dikl), and integrates dik by e( P, r ) e(Yir , H (Cir || ID _ RAGWi || ID _ Userir || T )) (9)
computing Dr Seti 2 Dr Seti 2
M ik R2i R11 dik1 R12 dik 2 R1l dikl (4) Step 3.2: Create Ci , ni 1 , Ci , ni 2 , , Cin as
The user then chooses rik R N* and encrypts dik as Cik g Mik rikN mod N 2 g R2 ( R1 0 R1 0
i 1 2
R1l 0)
rikN mod N 2 (10)
Cik g r mod NM ik N
ik
2
(5) where rik R N* and k = ni + 1, ni + 2, , n.
Following this, Userik uses his/her private key xik to generate Step 3.3: Aggregate n ciphertexts as
signature ik as n
Step 3.1: After receiving Di1, Di2, , Di , ni , RAGWi Step 4.3: DGW uses its private key x to create signature
verifies whether these reports are from legal users. To improve as
processing efficiency, we use a batch verification method. It xH (SAMDD || ID _ CC || ID _ DGW || n1 || n2 || || nm || T ) (15)
randomly divides Seti = { Di1, Di2, , Di , ni } into two subsets, where ID_CC is the identity of CC. Then, DGW obtains the
transmitted secondary aggregation data by computing
Seti1 (|Seti1| = ni/2) and Seti2 (|Seti2| = ni/2). RAGWi verifies
the following equations:
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 7
rik ) N mod N 2
M1k
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 8
are not considered here. The results of feature comparisons are e( P, r ) e(Yr , H (Cr || ID _ INFORMATION || T )) (22)
summarized in Table II. rS2 rS2
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 9
common way. We focus on comparing the three schemes obtained by a scheme. The control flexibility indicator of the
scalability in online mode. scheme is defined as
1) User-level Scalability CFI C1Num _ grained CNum
2
_ grained CNum
Num _ grained
_ grained (25)
When a new user (Usernew) wants to join an area (the
According to Fig. 6, the control flexibility indicators of our
corresponding gateway is BGex) in EPPDR, BGex generates an
scheme, EPPA and EPPDR are
identity-based private key SKnewuser for Usernew, and computes a
session key shared with Usernew. These operations should be C C
CFI OurScheme Cl1
m
i 1
i
m l
2 m
i 1
Cmi Cll m
i 1
Cmi
C C
completed in the BANs (building area network) initialization l m
j i
phase. Therefore, EPPDR can not realize online user-level j 1 l i 1 m
(26)
extension. In EPPA, Usernews private key and public key are
l l! m!
j 1 i 1
m
generated by the user, because of which online user-level
extension is possible. EPPA and EPPDR are not affected by user j !(l j )! i !(m i)!
departures (such as smart meter failures). l!
Cll j 1 Cl j j 1
l l
In our scheme, when a new user wants to join the i-th area, CFI EPPA Cl1 Cl2 (27)
j !(l j )!
Usernew generates his/her own private and public keys, and sends
m!
Cmm i 1 Cmi i 1
m m
a registration request to RAGWi. RAGWi directly returns its area CFI EPPDR Cm1 Cm2 (28)
Number i to Usernew. Therefore, online user-level extension is i !(m i)!
feasible in our scheme. The aggregation of cube data (see Fig. 2) According to Eqs. (26), (27), and (28), we can obtain the
requires that every plane in the cube has the same scale. But in following inequalities:
most cases, because of the users joining or leaving, the number CFIOurScheme CFI EPPA , CFIOurScheme CFI EPPDR (29)
of users in each area may not be the same (i.e., these planes may Therefore, our scheme has better electricity control flexibility.
have different rows). In our scheme, the key issue in online
user-level system scalability is to guarantee that these planes
have the same number of rows. In order to solve this problem,
RAGWi computes n - ni zero l-dimensional vectors ciphertexts
before aggregating n ciphertexts, where ni is the given number
of users in the i-th area. Therefore, our scheme achieves online
user-level scalability. Note that there is an upper bound n on the
number of users in an area. If the number of users arrives the
designed bound, the area no longer allows any more user to join.
2) Area-level Scalability
There is only one gateway in EPPAs system model, EPPA
cannot attain area-level scalability. On the other hand, when a
new residential area is ready to join the system in EPPDR, it is
necessary to deploy BGnew, where the private and session keys
between BGnew and CC should be generated in the CC
initialization phase and the BAN initialization phase,
respectively. Hence, EPPDR can only realize offline area-level
Fig. 6. Electricity control flexibility
extension.
It is provided that there already exist m areas in our system.
When a new area joins the system, a corresponding new gateway
RAGWm+1 needs to be deployed and registered to CC. After VIII. PERFORMANCE EVALUATION
receiving the registration request from RAGW m+1, CC can In this section, we compare EPPA [27], EPPDR [8], and our
directly return the area Number m+1 to RAGWm+1 as long as scheme in terms of computational cost and communication
the length of the integer sequence (for area Number distribution) overhead.
is greater than m. Therefore, our scheme implements online A. Computational Cost
area-level extension.
Since the multiplication in N is considered negligibly 2
column represents the sum of the j-th dimension of the electricity multiplication operation in 1, and a pairing operation,
of the i-th area. respectively. Note that each users data is l-dimensional (in our
Definition 2 (Control Flexibility Indicator): Suppose scheme and EPPA), and there are n users in a residential area
Nummin_grained is the number of minimum grained aggregated data (EPPA and EPPDR), ni users in each i-th residential area, and
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 10
the upper bound of the number of users in an area is n (in our TotalCEPPDR > TotalCOurScheme. Therefore, our scheme has lower
scheme). There are m residential areas. The computational computational complexity. From Figs. 8 and 9, it can be seen
costs of our scheme, EPPA, and EPPDR are compared in Table that the growth of TotalCOurScheme is slower than TotalCEPPDR.
IV.
A 3-GHz Pentium IV processor with 512 MB memory is
used to estimate the operational costs. We choose a 1024-bit N
(|N2| = 2048) and a 160-bit 1. According to the MIRACL [38]
and PBC [39] libraries, Ce = 12.4 ms, Cm = 6.4 ms, and Cp = 20
ms.
1) Comparison of Computational Cost of Each User
User data is one-dimensional in EPPDR but
multi-dimensional in our scheme. Table IV shows that the
computational cost of a user in our scheme is more efficient
than EPPDR. User data is also multi-dimensional data in EPPA,
like in our scheme. Fig. 7 shows that in terms of the
computational cost of a user, our schemes advantage is
Fig. 8. Total computational cost of gateways in our scheme
remarkable.
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 11
Case 1: The total number of users in the two schemes is 2308 577
identical. In other words, in our scheme, there are m residential 160m(n 1) 2308 0 m (37)
160(n 1) 40(n 1)
areas and n/m (supposing m can divide n) users in each
because m 2; let
residential area. Usually, m is a very small integer. The
577 577
comparison of communication overhead is shown in Table V. 2 n 1 7 (38)
40(n 1) 80
TABLE V
COMPARISON OF COMMUNICATION OVERLOAD IN CASE 1 According Eqs. (37) and (38), it is obvious that our scheme
Our Scheme EPPA achieves better performance in terms of communication
User-to-RAGW / User-to-GW n/mL1 * m = nL1 nL1 overhead when n is not less than 7.
RAGW-to-DGW mL2
DGW-to- CC / GW-to-OA L2 L2 IX. CONCLUSION
In this paper, we proposed an efficient and
privacy-preserving scheme for the aggregation of electricity
The total communication cost of our scheme is nL1 + (m + consumption cube-data in smart grids. The scheme can
1)L2, and that of EPPA is nL1 + L2. Hence, the communication aggregate multiple users multi-dimensional data from multiple
cost of our scheme is approximately equal to that of EPPA. residential areas with various granularities. The control center
Case 2: The number of users of each residential area in our can obtain the sum of each dimension of electricity usage of
scheme is identical to that in EPPA. That is, in our scheme, the each residential area, attain flexible electricity regulation, and
total number of users reached mn. The results of the comparison regulate electricity for any residential area and any dimension
are shown in Table VI. of electricity usage. The security strength and
TABLE VI privacy-preserving ability of our scheme are demonstrated in
COMPARISON OF COMMUNICATION OVERLOAD IN CASE 2
security analysis. By comparing our scheme with EPPA and
Our Scheme EPPA
EPPDR, it is observed that our scheme can achieve higher
User-to-RAGW / User-to-GW nL1 * m = mnL1 nL1
efficiency in terms of both computation and communication
RAGW-to-DGW mL2
cost, and satisfies the application requirements of smart grids.
RGW-to-CC / GW-to-OA L2 L2
In future, we will study other security issues (e.g., differential
attacks), and develop effective schemes to resist more kinds of
attacks.
The total communication cost of our scheme is mnL1 + (m +
1)L2, and that of EPPA is nL1 + L2. Because n >> m (n is much
REFERENCES
greater than m), the communication cost of our scheme is
approximately the same as that of EPPA. [1] W. Y. Wang and Z. Lu. Cyber security in the smart grid: survey and
challenges, Computer Networks, vol. 57, no. 5, pp. 1344-1371, Jan.
2) Comparison between Our Scheme and EPPDR 2013.
In our scheme and EPPDR, the transmitted packet consists of [2] B. Samareah, M. Sudip and J.P.C.R. Joel. Cloud computing applications
three parts: the ciphertext of user data, other information for smart grid: a survey, IEEE Transaction on Parallel and Distributed
Systems, vol. 26, no. 5, pp. 1477-1494, May 2015.
(identity information and timestamp information), and a digital [3] L. Zhou and S.P. Chen. A survey of research on smart grid security, in
signature. Our scheme and EPPDR both use the Paillier Network Computing and Information Security, Berlin, Germany:
encryption algorithm to encrypt user data. Let |N| = 1024 bits; Springer-Verlag, 2011, pp. 395-405.
[4] J. Shen, H. W. Tan, J Wang, J. W. Wang and S. Lee. A novel routing
then, the length of the ciphertext is 2048 bits. In terms of digital protocol providing good transmission reliability in underwater sensor
signatures, our scheme utilizes BLS short signature and EPPDR networks, Journal of Internet Technology, vol. 16, no. 1, pp. 171-178,
uses identity-based signature. Let |1| = 160 bits. The length of Jan. 2015.
[5] M. P. Naran, D. Dipankar, S. Dipti and C. Marco. Infrastructure Security
signature in our scheme is 160 bits and the length of signature for Smart Electric Grids: A Survey, in Optimization and Security
in EPPDR is 160 bits + 160 bits = 320 bits. Let the length of the Challenges in Smart Power Grids, Berlin, Germany: Springer-Verlag,
other information be the same, such as 100 bits. The 2013, pp. 161-180.
[6] W. X. Meng, R. F. Ma and H. H. Chen. Smart grid neighborhood area
communication overhead is compared in Table VII. networks: a survey, IEEE Network, vol. 28, no. 1, pp. 24-32, Jan./Feb.
TABLE VII 2014.
COMPARISON OF COMMUNICATION OVERLOAD [7] R. L. Deng, Z. Y. Yang, M. Y. Chow and J. Chen. A survey on demand
Our Scheme EPPDR response in smart grids: mathematical models and approaches, IEEE
Transactions on Industrial Informatics, vol. 11, no. 3, pp. 570-582, June
User-to-RAGW / User-to-BG 2308mnbits 2468mnbits 2015.
RAGW-to-DGW 2308mbits [8] H. W. Li, X. D. Lin, H. M. Yang, X. H. Liang, R. X. Lu and X. M. Shen.
DGW-to-CC / BG-to-CC 2308bits 2468mbits EPPDR: an efficient privacy-preserving demand response scheme with
adaptive key evolution in smart grid, IEEE Transactions on Parallel and
Distributed Systems, vol. 25, no. 8, pp. 2053-2064, Aug. 2014.
[9] H. W. Li, R. X. Lu, X. D. Lin and X. M. Shen. EDR: An efficient
The total communication cost of our scheme is 2308(mn + m demand response scheme for achieving forward secrecy in smart grid, in
+ 1) bits and that of EPPDR is 2468m(n + 1) bits. The Proc. of IEEE GLOBECOM, 2012, pp. 929-934.
[10] N. Komninos, E. Philippou and A. Pitsillides. Survey in smart grid and
difference between two schemes is 160m(n + 1) 2308. Let smart home security: issues, challenges and countermeasures, IEEE
160m(n+1) 2308 0. Then, we can obtain:
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TIFS.2017.2656475, IEEE
Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, manuscript ID 12
Communication Surveys & Tutorials, vol. 16, no. 4, pp. 1933-1954, Apr. [31] A. Rial and G. Danezis. Privacy-preserving smart metering, in Proc.
2014. of 10th Annual ACM Workshop on Privacy in the Electronic Society
[11] Z. Erkin, J. R. Troncoso-Pastoriza, R.L. Lagendijk and F. Perez-Gonzalez. (WPES 11), 2011, pp. 4960.
Privacy-preserving data aggregation in smart metering systems: an [32] G. cs and C. Castelluccia. I have a dream! (differentially private smart
overview, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 75-86, metering), in International Workshop on Information Hiding, 2011, pp.
Mar. 2013. 118-132.
[12] Y. K. Chiang, N. C. Wang and C. H. Hsieh. A cycle-based data [33] E. Shi, T-H. H. Chan, E. G. Rieffel, R. Chow and D. Song.
aggregation scheme for grid-based wireless sensor networks, Sensors, Privacy-preserving aggregation of time-series data, in 18th Annual
vol. 14, no. 5, pp. 8447-8464, May 2014. Network & Distributed System Security Symposium (NDSS), 2011.
[13] Y. H. Lin, S. Y. Chang and H. M. Sun. CDAMA: concealed data [34] F. J. Li, B Luo and P. Liu. Secure information aggregation for smart
aggregation scheme for multiple applications in wireless sensor networks, grids using homomorphic encryption, in 2010 First IEEE International
IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 7, Conference on Smart Grid Communications (SmartGridComm), 2010, pp.
pp. 1471-1483, July 2015. 327-332.
[14] K. Manish, V. Shekhar and L. Kusum. (2014, Aug.). Secure data [35] C. Rottondi, G. Verticale and C. Krauss. Distributed privacy-preserving
aggregation in wireless sensor networks using homomorphic encryption, aggregation of metering data in smart grids, IEEE Journal on Selected
International Journal of Electronics. [online]. 102(4), pp. 690-702. Areas in Communications, vol. 31, no. 7, pp. 1342-1354, Jul. 2013.
Available: http://dx.doi.org/10.1080/00207217.2014.936524. [36] L. Anany. Transform-and-Conquer, in Introduction to the Design &
[15] K. A. Shim and C. M. Park. A secure data aggregation scheme based on Analysis of Algorithms, 3rd ed. Boston: Addison-Wesley Longman
appropriate cryptographic primitives in heterogeneous wireless sensor Publishing Co., Inc., 2002, pp. 225-228.
networks, IEEE Transactions on Parallel and Distributed Systems, vol. [37] B. Mihir and R. Phillip. Random oracles are practical: a paradigm for
26, no. 8, pp. 2128-2139, Aug. 2015. designing efficient protocols, in Proc. of the 1st ACM Conference on
[16] S. Ruj and A. Nayak. A decentralized security framework for data Computer and Communications Security (CCS93), 1993, pp. 62-73.
aggregation and access control in smart grids, IEEE Transaction on [38] Multiprecision integer and rational arithmetic c/c++ library,
Smart Grid, vol. 4, no. 1, pp. 196-205, Mar. 2013. http://www.shamus.ie/.
[17] B. Fbio and M. Mhlhuser. EPPP4SMS: efficient privacy-preserving [39] B. Lynn, PBC library, http://crypto.stanford.edu/pbc/.
protocol for smart metering systems and its simulation using real-world
data, IEEE Transactions on Smart Grid, vol. 5, no. 6, pp. 2701-2708,
Hua Shen received the M.S. and Ph.D.
Nov. 2014.
[18] T. W. Chim, S. M. Yiu, V. O. K. Li, L. C. K. Hui and J. Zhong. PRGA: degrees from Wuhan University, Wuhan,
Privacy-preserving recording & gateway-assisted authentication of power China, in 2007 and 2014, respectively. She
usage information for smart grid, IEEE Transactions on Dependable and is currently an Associate Professor with
Secure Computing, vol. 12, no. 1, pp. 85-97, Jan./Feb. 2015.
the School of Computer Scienc, Hubei
[19] L. Chen, R. X. Lu and Z. F. Cao. PDAFT: A privacy-preserving data
aggregation scheme with fault tolerance for smart grid communications, University of Technology. Her research
Peer-to-Peer Netw. Appl., vol. 8, no. 6, pp. 1122-1132, Nov. 2015. interests include privacy preserving,
[20] M. Bae, K. Kim and H. Kim. Preserving privacy and efficiency in data information security, and cloud
communication and aggregation for AMI network, Journal of Network
computing.
and Computer Applications, vol. 59, pp. 333-344, Jan. 2016.
[21] C. I. Fan, S. Y. Huang and Y. L. Lai. Privacy-enhanced data aggregation
scheme against internal attackers in smart grid, IEEE Transactions on Mingwu Zhang received the Ph.D. from
Industrial Informatics, vol. 10, no. 1, pp. 666-675, Feb. 2014. South China Agric University in 2009. He
[22] L. Chen, R. X. Lu, Z. F. Cao, K Alharbi and X. D. Lin. MuDA:
is a Professor with the School of Computer
multifunctional data aggregation in privacy-preserving smart grid
communications, Peer-to-Peer Netw. Appl., vol. 8, no. 5, pp. 777-792, Science in Hubei University of
Sept. 2015. Technology. From August 2010 to August
[23] K. Alharbi and X. D. Lin. LPDA: a lightweight privacy-preserving data 2012, he has been a JSPS Postdoctoral
aggregation scheme for smart grid, in Proc. Of the 2012 International
Fellow at Institute of Mathematics for
Conference on Wireless Communications & Signal Processing (WCSP),
2012, pp. 1-6. Industry in Kyushu University. From June
[24] Z. G. Shi, R. X. Sun, R. X. Lu, L. Chen, J. M. Chen and X. M. Shen. 2015 to June 2016, he has been a Senior
Diverse grouping-based aggregation protocol with error detection for Research Fellow with the Centre for Computer and Information
smart grid communications, IEEE Transactions on Smart Grid, vol. 6,
Security, University of Wollongong. His current research
no. 6, pp. 2856-2868, Nov. 2015.
[25] W. W. Jia, H. J. Zhu, Z. F. Cao, X. L. Dong and C. X. Xiao. interests include cryptography technology for networks, secure
Human-factor-aware privacy-preserving aggregation in smart grid, computations, and privacy preservation.
IEEE Systems Journal, vol. 8, no. 2, pp. 598-607, June 2014.
[26] C. Li, R. X. Lu, H. Li, L. Chen and J. Chen. PDA: a privacy-preserving
Jian Shen received the M.E. and Ph.D.
dual-functional aggregation scheme for smart grid communications,
Security and Communication Networks, vol. 8, no. 15, pp. 2494-2506, degrees in Computer Science from Chosun
Oct. 2015. University, Gwangju, Korea in 2009 and
[27] R. X. Lu, X. H. Liang, X. Li, X. D. Lin and X. M. Shen. EPPA: an 2012, respectively. Since late 2012, he has
efficient and privacy-preserving aggregation scheme for secure smart grid
been a full professor in the School of
communications, IEEE Transactions on Parallel and Distributed System,
vol. 23, no. 9, pp. 1621-1631, Sept. 2012. Computer and Software at Nanjing
[28] X. F. Liu, Y. Q. Zhang, B. Y. Wang and H. Q. Wang. An anonymous University of Information Science and
data aggregation scheme for smart grid systems, Security and Technology, Nanjing, China. His research
Communication Networks, vol. 7, no. 3, pp. 602-610, Mar. 2014.
interests include information security,
[29] C. Rottondi, G. Verticale and A. Capone. Privacy-preserving smart
metering with multiple data consumers, Computer Networks, vol. 57, no. public cryptography, security systems, and network security.
7, pp. 1699-1713, Mar. 2013.
[30] F. G. Mrmol, C. Sorge, O. Ugus and G. M. Prez. Do not snoop my
habits: preserving privacy in the smart grid, IEEE Communications
Magazine, vol. 50, no. 5, pp. 166-172, May 2012.
1556-6013 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.