Cyber-Resilient Transactive Energy System Design over Insecure Communication Links

08/01/2020
by   Yang Lu, et al.
0

In this paper, the privacy and security issues associated with transactive energy systems over insecure communications are addressed. In particular, it is ensured that, during market-based interactions: (1) each agent's bidding information remains private; and (2) any extraneous data injection attack can be easily detected. A unified cryptography-based approach that can simultaneously achieve both objectives is developed, where privacy preservation is realized by the Paillier encryption scheme, and attack detection is achieved by the Paillier digital signature scheme. Simulation results verify the effectiveness of the proposed cyber-resilient design for transactive energy systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/06/2022

Cyber-Resilient Privacy Preservation and Secure Billing Approach for Smart Energy Metering Devices

Most of the smart applications, such as smart energy metering devices, d...
research
10/13/2018

False Data Injection Cyber-Attack Detection

State estimation estimates the system condition in real-time and provide...
research
03/11/2020

Designing constraint-based False Data Injection attacks for unbalanced distribution smart grids

Smart grid is equipped with various kinds of smart devices such as meter...
research
04/03/2021

Private Computation of Polynomials over Networks

This study concentrates on preserving privacy in a network of agents whe...
research
03/22/2023

Resilient Output Containment Control of Heterogeneous Multiagent Systems Against Composite Attacks: A Digital Twin Approach

This paper studies the distributed resilient output containment control ...
research
04/07/2018

An attack on a NIST proposal: RankSign, a code-based signature in rank metric

RankSign is a code-based signature scheme proposed to the NIST competiti...
research
12/08/2022

A Novel Efficient Signcryption Scheme for Resource-Constrained Smart Terminals in Cyber-Physical Power Systems

Most of the existing signcryption schemes generate pseudonym by key gene...

Please sign up or login with your details

Forgot password? Click here to reset