Secure Data Collection in Constrained Tree-Based Smart Grid Environments
dc.contributor.author | Uludag, Suleyman | |
dc.contributor.author | Jin, Haiming | |
dc.contributor.author | Lui, King-Shan | |
dc.contributor.author | Nahrstedt, Klara | |
dc.date.accessioned | 2015-05-18T06:36:20Z | |
dc.date.available | 2015-05-18T06:36:20Z | |
dc.date.issued | 2014-11 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/111643 | |
dc.description.abstract | To facilitate more efficient control, massive amounts of sensors or measurement devices will be deployed in the Smart Grid. Data collection then becomes non-trivial. In this paper, we study the scenario where a data collector is responsible for collecting data from multiple measurement devices, but only some of them can communicate with the data collector directly. Others have to rely on other devices to relay the data. We first develop a communication protocol so that the data reported by each device is protected again honest-but-curious data collector and devices. To reduce the time to collect data from all devices within a certain security level, we formulate our approach as an integer linear programming problem. As the problem is NP-hard, obtaining the optimal solution in a large network is not very feasible. We thus develop an approximation algorithm to solve the problem. We test the performance of our algorithm using real topologies. The results show that our algorithm successfully identifies good solutions within reasonable amount of time. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.subject | approximation theory;computational complexity;integer programming;linear programming;power system measurement;power system security;smart power grids;trees (mathematics);NP-hard problem;approximation algorithm;communication protocol;integer linear programming problem;multiple measurement devices;secure data collection;tree-based smart grid environments;Approximation algorithms;Approximation methods;Cryptography;DH-HEMTs;Data collection;Topology | en_US |
dc.title | Secure Data Collection in Constrained Tree-Based Smart Grid Environments | en_US |
dc.type | Article | en_US |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.contributor.affiliationum | CSEP, UM-Flint | en_US |
dc.contributor.affiliationother | Department of Electrical and Electronic Engineering, The University of Hong Kong | en_US |
dc.contributor.affiliationother | Department of Computer Science, University of Illinois at Urbana-Champaign, IL, USA | en_US |
dc.contributor.affiliationumcampus | Flint | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/111643/1/Uludag_IEEE_SGC_14.pdf | |
dc.identifier.source | IEEE International Conference on Smart Grid Communications (SmartGridComm 2014) | en_US |
dc.identifier.orcid | orcid.org/0000-0002-7207-6683 | en_US |
dc.identifier.name-orcid | Uludag, Suleyman; 0000-0002-7207-6683 | en_US |
dc.owningcollname | Innovation and Technology, College of (UM-Flint) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.