Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems  [PDF]
Ali Alqazzaz, Ibrahim Alrashdi, Esam Aloufi, Mohamed Zohdy, Hua Ming
Journal of Information Security (JIS) , 2018, DOI: 10.4236/jis.2018.94020
Abstract: Smart parking systems are a crucial component of the “smart city” concept, especially in the age of the Internet of Things (IoT). They aim to take the stress out of finding a vacant parking spot in city centers, due to the increasing number of cars, especially during peak hours. To realize the concept of smart parking, IoT-enabling technologies must be utilized, as the traditional way of developing smart parking solutions entails a lack of scalability, compatibility with IoT-constrained devices, security, and privacy awareness. In this paper, we propose a secure and privacy-preserving framework for smart parking systems. The framework relies on the publish/subscribe communication model for exchanging a huge volume of data with a large number of clients. On one hand, it provides functional services, including parking vacancy detection, real-time information for drivers about parking availability, driver guidance, and parking reservation. On the other hand, it provides security approaches on both the network and application layers. In addition, it supports mutual authentication mechanisms between entities to ensure device/ data authenticity, and provide security protection for users. That makes our proposed framework resilient to various types of security attacks, such as replay, phishing, and man-in-the-middle attacks. Finally, we analyze the performance of our framework, which is suitable for IoT devices, in terms of computation and network overhead.
Security and Privacy-Preserving Metering Service in the Smart Grid  [PDF]
Zhongwei Sun, Chuqi Song
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2017, DOI: 10.4236/ijcns.2017.108B033
The deployment of smart metering provides an immense amount of data for power grid operators and energy providers. By using this data, a more efficient and flexible power grid can be realized. However, this data also raises privacy concerns since it contains very sensitive information about customers. In this paper, we present a security and privacy-preserving metering scheme for the community customers, by utilizing the password authenticated key exchange (PAKE) protocol and Elliptic Curve Cryptosystem (ECC). The proposed scheme will protect the community network from possible malicious behavior, and security analysis is also given in the paper.
Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid  [PDF]
Depeng Li, Zeyar Aung, Srinivas Sampalli, John Williams, Abel Sanchez
Smart Grid and Renewable Energy (SGRE) , 2013, DOI: 10.4236/sgre.2013.44038
Abstract: Privacy preservation is a crucial issue for smart buildings where all kinds of messages, e.g., power usage data, control commands, events, alarms, etc. are transmitted to accomplish the management of power. Without appropriate privacy protection schemes, electricity customers are faced with various privacy risks. Meanwhile, the natures of smart grids and smart buildings—such as having limited computation power of smart devices and constraints in communication network capabilities, while requiring being highly reliable—make privacy preservation a challenging task. In this paper, we propose a group key scheme to safeguard multicast privacy with the provisions of availability, fault-tolerance, and efficiency in the context of smart buildings as a part the smart grid. In particular, hybrid architecture accommodating both centralized and contributory modes is constructed in order to achieve both fault-tolerance and efficiency with only one set of group key installed. Key trees are sophisticatedly managed to reduce the number of exponentiation operations. In addition, an individual rekeying scheme is introduced for occasional joining and leaving of member smart meters. Experimental results, on a simulation platform, show that our scheme is able to provide significant performance gains over state-of-the-art methods while effectively preserving the participants’ privacy.
Privacy-Preserving Verifiable Incentive Mechanism for Crowdsourcing Market Applications  [PDF]
Jiajun Sun
Computer Science , 2013,
Abstract: Recently, a novel class of incentive mechanisms is proposed to attract extensive users to truthfully participate in crowd sensing applications with a given budget constraint. The class mechanisms also bring good service quality for the requesters in crowd sensing applications. Although it is so important, there still exists many verification and privacy challenges, including users' bids and subtask information privacy and identification privacy, winners' set privacy of the platform, and the security of the payment outcomes. In this paper, we present a privacy-preserving verifiable incentive mechanism for crowd sensing applications with the budget constraint, not only to explore how to protect the privacies of users and the platform, but also to make the verifiable payment correct between the platform and users for crowd sensing applications. Results indicate that our privacy-preserving verifiable incentive mechanism achieves the same results as the generic one without privacy preservation.
Enable Portrait Privacy Protection in Photo Capturing and Sharing  [PDF]
Lan Zhang,Kebin Liu,Xiang-Yang Li,Puchun Feng,Cihang Liu,Yunhao Liu
Computer Science , 2014,
Abstract: The wide adoption of wearable smart devices with onboard cameras greatly increases people's concern on privacy infringement. Here we explore the possibility of easing persons from photos captured by smart devices according to their privacy protection requirements. To make this work, we need to address two challenges: 1) how to let users explicitly express their privacy protection intention, and 2) how to associate the privacy requirements with persons in captured photos accurately and efficiently. Furthermore, the association process itself should not cause portrait information leakage and should be accomplished in a privacy-preserving way. In this work, we design, develop, and evaluate a protocol, that enables a user to flexibly express her privacy requirement and empowers the photo service provider (or image taker) to exert the privacy protection policy.Leveraging the visual distinguishability of people in the field-of-view and the dimension-order-independent property of vector similarity measurement, we achieves high accuracy and low overhead. We implement a prototype system, and our evaluation results on both the trace-driven and real-life experiments confirm the feasibility and efficiency of our system.
A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature  [cached]
V.K. Narendira Kumar,B. Srinivasan
International Journal of Computer Network and Information Security , 2013,
Abstract: Voting is regarded as one of the most effective methods for individuals to express their opinions to select their democratic leader in the public elections. As the computing, communicating, and cryptographic techniques progress rapidly, increasing emphasis has been placed on developing electronic voting schemes capable of providing more efficient voting services than conventional paper-based voting methods. A receipt-free e-voting scheme based on the virtual voting booth that can be implemented with a smart card. Receipt-freeness is achieved by distributing the voting procedure between the voter and the smart card. By using smart cards to randomize part of content of the ballot, the voter cannot construct a receipt. The voter and the smart card jointly contribute randomness for the encryption of the ballot. To provide convenience to voters, sufficient voting facilities are supplied in sufficient public voting booths.
Smart Meter Privacy: A Utility-Privacy Framework  [PDF]
S. Raj Rajagopalan,Lalitha Sankar,Soheil Mohajer,H. Vincent Poor
Mathematics , 2011,
Abstract: End-user privacy in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far have been tied to specific technologies such as batteries or assumptions on data usage. Existing solutions have also not quantified the loss of benefit (utility) that results from any such privacy-preserving approach. Using tools from information theory, a new framework is presented that abstracts both the privacy and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem with minimal assumptions that is tractable. Specifically for a stationary Gaussian Markov model of the electricity load, it is shown that the optimal utility-and-privacy preserving solution requires filtering out frequency components that are low in power, and this approach appears to encompass most of the proposed privacy approaches.
Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management  [cached]
Sherin M. Moussa,Gul A. Agha
Journal of Software , 2010, DOI: 10.4304/jsw.5.6.630-636
Abstract: The existence of advanced smart devices and related technologies such as pervasive computing, mobile wireless communications, sensor networks and agent technologies have supported the proliferation of smart spaces. In this paper, we present the design of “Bosthan”, a multi-agent-based simulation tool that manages resources consumption in multi-inhabitants smart spaces. Bosthan is built on the top of ActorNet mobile agent platform to simulate different smart space topologies with varying numbers of residents. It allows strategies for resolution of conflicts between mobile agents, and for preserving inhabitants’ anonymity and untraceability inside the smart spaces, to be studied. Bosthan will help us compare the efficiency of using mobile agents to allow smart spaces to act pro-actively and maintain anonymity and data privacy in multi-inhabitants environments
Plug-in privacy for Smart Metering billing  [PDF]
Marek Jawurek,Martin Johns,Florian Kerschbaum
Computer Science , 2010,
Abstract: Traditional electricity meters are replaced by Smart Meters in customers' households. Smart Meters collects fine-grained utility consumption profiles from customers, which in turn enables the introduction of dynamic, time-of-use tariffs. However, the fine-grained usage data that is compiled in this process also allows to infer the inhabitant's personal schedules and habits. We propose a privacy-preserving protocol that enables billing with time-of-use tariffs without disclosing the actual consumption profile to the supplier. Our approach relies on a zero-knowledge proof based on Pedersen Commitments performed by a plug-in privacy component that is put into the communication link between Smart Meter and supplier's back-end system. We require no changes to the Smart Meter hardware and only small changes to the software of Smart Meter and back-end system. In this paper we describe the functional and privacy requirements, the specification and security proof of our solution and give a performance evaluation of a prototypical implementation.
Auction-based Incentive Mechanisms for Dynamic Mobile Ad-Hoc Crowd Service  [PDF]
Honggang Zhang,Benyuan Liu,Hengky Susanto,Guoliang Xue
Computer Science , 2015,
Abstract: We investigate a type of emerging user-assisted mobile applications or services, referred to as Dynamic Mobile Ad-hoc Crowd Service (DMACS), such as collaborative streaming via smartphones or location privacy protection through a crowd of smartphone users. Such services are provided and consumed by users carrying smart mobile devices (e.g., smartphones) who are in close proximity of each other (e.g., within Bluetooth range). Users in a DMACS system dynamically arrive and depart over time, and are divided into multiple possibly overlapping groups according to radio range constraints. Crucial to the success of such systems is a mechanism that incentivizes users' participation and ensures fair trading. In this paper, we design a multi-market, dynamic double auction mechanism, referred to as M-CHAIN, and show that it is truthful, feasible, individual-rational, no-deficit, and computationally efficient. The novelty and significance of M-CHAIN is that it addresses and solves the fair trading problem in a multi-group or multi-market dynamic double auction problem which naturally occurs in a mobile wireless environment. We demonstrate its efficiency via simulations based on generated user patterns (stochastic arrivals, random market clustering of users) and real-world traces.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.