Protected bidding against compromised information injection in IoT-based smart grid

The smart grid is regarded as one of the important application field of the Internet of Things (IoT) composed of embedded sensors, which sense and control the behavior of the energy world. IoT is attractive for features of grid catastrophe prevention and decrease of grid transmission line and reliab...

Full description

Saved in:
Bibliographic Details
Main Authors: Bhuiyan, Md Zakirul Alam, Zaman, M., Wang, Guojun, Wang, Tian, Rahman, Md. Arafatur, Tao, Hai
Format: Conference or Workshop Item
Language:en
Published: Springer, Cham 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/24973/1/Protected%20bidding%20against%20compromised%20information%20injection%20in%20IoT.pdf
http://umpir.ump.edu.my/id/eprint/24973/
https://doi.org/10.1007/978-3-030-05928-6_8
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1831526404502585344
author Bhuiyan, Md Zakirul Alam
Zaman, M.
Wang, Guojun
Wang, Tian
Rahman, Md. Arafatur
Tao, Hai
author_facet Bhuiyan, Md Zakirul Alam
Zaman, M.
Wang, Guojun
Wang, Tian
Rahman, Md. Arafatur
Tao, Hai
author_sort Bhuiyan, Md Zakirul Alam
building UMPSA Library
collection Institutional Repository
content_provider Universiti Malaysia Pahang Al-Sultan Abdullah
content_source UMPSA Institutional Repository
continent Asia
country Malaysia
description The smart grid is regarded as one of the important application field of the Internet of Things (IoT) composed of embedded sensors, which sense and control the behavior of the energy world. IoT is attractive for features of grid catastrophe prevention and decrease of grid transmission line and reliable load fluctuation control. Automated Demand Response (ADR) in smart grids maintain demand-supply stability and in regulating customer side electric energy charges. An important goal of IoT-based demand-response using IoT is to enable a type of DR approach called automatic demand bidding (ADR-DB). However, compromised information board can be injected into during the DR process that influences the data privacy and security in the ADR-DB bidding process, while protecting privacy oriented consumer data is in the bidding process is must. In this work, we present a bidding approach that is secure and private for incentive-based ADR system. We use cryptography method instead of using any trusted third-party for the security and privacy. We show that proposed ADR bidding are computationally practical through simulations performed in three simulation environments.
format Conference or Workshop Item
id my.ump.umpir.24973
institution Universiti Malaysia Pahang
language en
publishDate 2019
publisher Springer, Cham
record_format eprints
spelling my.ump.umpir.249732019-10-24T03:57:36Z http://umpir.ump.edu.my/id/eprint/24973/ Protected bidding against compromised information injection in IoT-based smart grid Bhuiyan, Md Zakirul Alam Zaman, M. Wang, Guojun Wang, Tian Rahman, Md. Arafatur Tao, Hai QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering The smart grid is regarded as one of the important application field of the Internet of Things (IoT) composed of embedded sensors, which sense and control the behavior of the energy world. IoT is attractive for features of grid catastrophe prevention and decrease of grid transmission line and reliable load fluctuation control. Automated Demand Response (ADR) in smart grids maintain demand-supply stability and in regulating customer side electric energy charges. An important goal of IoT-based demand-response using IoT is to enable a type of DR approach called automatic demand bidding (ADR-DB). However, compromised information board can be injected into during the DR process that influences the data privacy and security in the ADR-DB bidding process, while protecting privacy oriented consumer data is in the bidding process is must. In this work, we present a bidding approach that is secure and private for incentive-based ADR system. We use cryptography method instead of using any trusted third-party for the security and privacy. We show that proposed ADR bidding are computationally practical through simulations performed in three simulation environments. Springer, Cham 2019 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/24973/1/Protected%20bidding%20against%20compromised%20information%20injection%20in%20IoT.pdf Bhuiyan, Md Zakirul Alam and Zaman, M. and Wang, Guojun and Wang, Tian and Rahman, Md. Arafatur and Tao, Hai (2019) Protected bidding against compromised information injection in IoT-based smart grid. In: 2nd EAI International Conference on Smart Grid and Internet of Things, SGIoT 2018 , 11 July 2018 , Niagara Falls, Canada. pp. 78-84., 256. ISSN 1867-8211 ISBN 978-303005927-9 (Published) https://doi.org/10.1007/978-3-030-05928-6_8
spellingShingle QA76 Computer software
TK Electrical engineering. Electronics Nuclear engineering
Bhuiyan, Md Zakirul Alam
Zaman, M.
Wang, Guojun
Wang, Tian
Rahman, Md. Arafatur
Tao, Hai
Protected bidding against compromised information injection in IoT-based smart grid
title Protected bidding against compromised information injection in IoT-based smart grid
title_full Protected bidding against compromised information injection in IoT-based smart grid
title_fullStr Protected bidding against compromised information injection in IoT-based smart grid
title_full_unstemmed Protected bidding against compromised information injection in IoT-based smart grid
title_short Protected bidding against compromised information injection in IoT-based smart grid
title_sort protected bidding against compromised information injection in iot-based smart grid
topic QA76 Computer software
TK Electrical engineering. Electronics Nuclear engineering
url http://umpir.ump.edu.my/id/eprint/24973/1/Protected%20bidding%20against%20compromised%20information%20injection%20in%20IoT.pdf
http://umpir.ump.edu.my/id/eprint/24973/
https://doi.org/10.1007/978-3-030-05928-6_8
url_provider http://umpir.ump.edu.my/