References
- https://crypto.stanford.edu/pbc/notes/numbertheory/crt.html, 31st march, 2018
- Abdallah, A., & Shen, X. (2018). A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Transactions on Smart Grid, 9(1), 396–405. https://doi.org/https://doi.org/10.1109/TSG.2016.2553647
- Alharbi, K., & Lin, X. (2012, October). LPDA: A ligthweight privacy-preserving data aggregation scheme for smart grid. In Proc. Int. Conf. Wireless Commun. Signal Process (pp. 1–6). WCSP), Huangshan.
- Almalki, F. A., & Soufiene, B. O. (2021). EPPDA: An efficient and privacy-preserving data aggregation scheme with authentication and authorization for IoT-Based healthcare applications. Wireless Communications and Mobile Computing, 2021, 1–18. https://doi.org/https://doi.org/10.1155/2021/5594159. Article ID 5594159.
- Bekiaris, E., & Nakanishi, Y. J. (2004). Economic impacts of intelligent transportation systems. Research in Transportation Economics 8, 1–640.
- Boneh, D., Goh, E., & Nissim, K. (2005) 2-DNF formular on ciphertexts. In Proceedings of second theory of cryptography conference, TCC, Cambridge, MA, pp. 325–341.
- Chen, S., Yang, L., Zhao, C., Varadarajan, V., & Wang, K. (2020). Double-blockchain assisted secure and anonymous data aggregation for fog-enabled smart grid. Engineering. https://doi.org/https://doi.org/10.1016/j.eng.2020.06.018
- Dong, X., Zhou, J., Alharbi, K., Lin, X., & Cao, Z. (2014) An elgamal-based efficient and privacy-preserving data aggregation scheme for smart grid. In Proc. 2014 IEEE Global Communications Conference, Austin, TX, USA (IEEE), pp. 4720–4725.
- Erkin, Z., & Tsudik, G. (2012). Private computation of spatial and temporal power consumption with smart meters. In Applied cryptography and network security (pp. 561–577). Springer.
- Garcia, F. O., & Jacobs, B. (2010). Privacy-Friendly Energy-Metering via Homomorphic Encryption. In: Cuellar, J., Lopez , J., Barthe, G., and Pretschner , A. (eds) Security and Trust Management. STM 2010. Lecture Notes in Computer Science, vol 6710. (Berlin, Heidelberg: Springer). pp. 226–238. https://doi.org/https://doi.org/10.1007/978-3-642-22444-7_15.
- Guo, C., Jiang, X., Raymond Choo, K. R., Tang, X., & Zhang, J. (2020). Lightweight privacy preserving data aggregation with batch verification for smart grid. Future Generation Computer Systems, 112, 512–523. https://doi.org/https://doi.org/10.1016/j.future.2020.06.001
- Hu, S., Liu, L., Fang, L., Zhou, F., & Ye, R. (2020). A novel energy-efficient and privacy-preserving data aggregation for WSNs. IEEE ACCESS, 8, 802–813. https://doi.org/https://doi.org/10.1109/ACCESS.2019.2961512
- Jo, H. J., Kim, I. S., & Lee, D. H. (2016). Efficient and privacy-preserving metering protocols for smart grid systems. IEEE Transactions on Smart Grid, 7(3), 1732–1742. https://doi.org/https://doi.org/10.1109/TSG.2015.2449278
- Juan, Z., Wu, J., & McDonald, M. (2006). Socio-economic impact assessment of intelligent transportation systems. Tsinghua Science of Technology, 11(3), 339–350. https://doi.org/https://doi.org/10.1016/S1007-0214(06)70198-5
- Junejo, M. H., Rahman, A. A. A., Shaikh, R. A., Yusof, K. M., Memon, I., Fazal, H., & Kumar, D. (2020). A privacy-preserving attack-resistant trust model for Internet of vehicles ad hoc networks. Scientific Programming, 2020, 1–21. https://doi.org/https://doi.org/10.1155/2020/8831611. Article ID 8831611.
- Kamil, I. A., & Ogundoyin, S. O. (2019). An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of Information Security and Applications, 44, 184–200. https://doi.org/https://doi.org/10.1016/j.jisa.2018.12.004
- Kamil, I., Olakanmi, O., & Ogundoyin, S. O. (2017). Secure and privacy-preserving lightweight authentication protocol for wireless communications. Information Security Journal: A Global Perspective, 26(6), 287–304 https://doi.org/http://dx.doi.org/10.1080/19393555.2017.1385116.
- LeFevre, K., DeWitt, D. J., & Ramakrishnan, R. (2005) Incognito: Efficient full-domain k-anonymity. Proceedings of the 2005 ACM SIGMOD international conference on management of data, ACM, pp. 49–60. https://doi.org/https://doi.org/10.1145/1066157.1066164.
- Li, C., Lu, R., Li, H., Chen, L., & Chen, J. (2015). PDA: A privacy-preserving dual-functional aggregation scheme for smart grid communications. Security and Communication Networks, 8(5), 2494–2506. https://doi.org/https://doi.org/10.1002/sec.1191
- Li, F., Luo, B., & Liu, P. (2010) Secure information aggregation for smart grids using homomorphic encryption. In Proceedings of the 1st IEEE international conference on smart grid communications (smartgridcomm ’10). (IEEE), pp. 327–332.
- Li, S., Xue, K., Yang, Q., & Hong, P. (2018). PPMA: Privacy-preserving multisubset data aggregation in smart grid. IEEE Transactions on Industrial Informatics, 14(2), 462–471. https://doi.org/https://doi.org/10.1109/TII.2017.2721542
- Lin, Y., Wang, P., & Ma, M. (2017) Intelligent transportation system (ITS): Concept, challenge, and opportunity. 2017 IEEE 3rd International Conference on Big Data Security on Cloud. (IEEE), pp. 167–171.
- Liu, Y., Guo, W., Fan, C., Chang, L., & Cheng, C. (2019) A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. To be published. IEEE transactions on industrial informatics. (IEEE). https://doi.org/https://doi.org/10.1109/TII.2018.2809672.
- Lu, R., Liang, X., Li, X., Lin, X., & Shen, X. (2012). EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1621–1631. https://doi.org/https://doi.org/10.1109/TPDS.2012.86
- Mahmoud, M., Saputro, N., Akula, P., & Akkaya, K. (2016). Privacy-preserving power injection over a hybrid AMI/LTE smart grid network. IEEE Internet of Things Journal, 4(4), 870–880. https://doi.org/https://doi.org/10.1109/JIOT.2016.2593453
- Memon, I., Hasan, M. K., Shaikh, R. A., Nebhen, J., Nebhen, K. A. A., Hossain, E., & Tunio, M. H. (2021a). Energy-efficient fuzzy management system for internet of things connected vehicular ad hoc networks. Electronics, 10(9), 1068. https://doi.org/https://doi.org/10.3390/electronics10091068
- Memon, I., Memon, H., & Arain, Q. A. (2021b). Pseudonym changing strategy with mix zones based authentication protocol for location privacy in road networks. Wireless Personal Communications, 116, 3309–3329. https://doi.org/https://doi.org/10.1007/s11277-020-07854-6
- Memon, I., Shaikh, R. A., Hasan, M. K., Hassan, R., Haq, A. U., & Zainol, K. A. (2020). Protect mobile travelers information in sensitive region based on fuzzy logic in IoT technology. Security and Communication Networks, 2020, 1–12. https://doi.org/https://doi.org/10.1155/2020/8897098. Article ID 8897098.
- Mohammed, H., Tonyali, S., Rabieh, K., Mahmoud, M., & Akkaya, K. (2016) Efficient privacy-preserving data collection scheme for smart grid AMI networks. In Proc. of IEEE Globecom 2016, Washington DC, USA. (IEEE), December.
- Ogundoyin, S. O. (2018). An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks. International Journal of Computers and Applications 42(2), 196–211. https://doi.org/https://doi.org/10.1080/1206212X.2018.1477320
- Ogundoyin, S. O., & Awoyemi, S. O. (2018). EDAS: Efficient data aggregation scheme for Internet of Things. Journal of Applied Security Research, 13(3), 347–375. https://doi.org/https://doi.org/10.1080/19361610.2018.1463139
- Ogundoyin, S. O., & Kamil, I. A. (2021a). An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy. Vehicular Communications, 31, 100384. https://doi.org/https://doi.org/10.1016/j.vehcom.2021.100384
- Ogundoyin, S. O., & Kamil, I. A. (2021b). A trust management system for fog computing services. Internet of Things, 14, 100382. https://doi.org/https://doi.org/10.1016/j.iot.2021.100382
- Paillier, P. (1999) Public-key cryptosystems based on composite degree residuosity classes. In Proceedings: International conference on the theory and applications of cryptographic techniques: advances in cryptology (EUROCRYPT ’99), Prague, Czech Republic. (Springer), May, pp. 223–238.
- Rabieh, K., Mahmoud, M., Akkaya, K., & Tonyali, S. (2015). Scalable certificate revocation schemes for smart grid AMI networks using bloom filters. IEEE Transactions on Dependable and Secure Computing, 14(4), 420–432. https://doi.org/https://doi.org/10.1109/TDSC.2015.2467385
- Rahman, F. H., Au, T., Newaz, S. H. S., Suhaili, W. S., & Lee, G. M. (2020). Find my trustworthy fogs: A fuzzy-based trust evaluation framework. Future Generation Computer Systems, 109, 562?572. https://doi.org/https://doi.org/10.1016/j.future.2018.05.061
- Ruj, S., & Nayak, A. (2013). A decentralized security framework for data aggregation and access control in smart grids. IEEE Transactions on Smart Grid, 4(1), 196–205. https://doi.org/https://doi.org/10.1109/TSG.2012.2224389
- Sacasas, V., Mantas, G., Saghezchi, F. B., Radwan, A., & Rodriguez, J. (2016). An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Computers & Security, 60, 193–205. https://doi.org/https://doi.org/10.1016/j.cose.2016.04.006
- Shen, H., Liu, Y., Xia, Z., & Zhang, M. (2020). An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Information Sciences, 526, 289–300. https://doi.org/https://doi.org/10.1016/j.ins.2020.03.107
- song, J., Liu, Y., Shao, J., & Tang, C. (2020). A dynamic membership data aggregation (DMDA) protocol for smart grid. IEEE Systems Journal, 14(1), 900–908. https://doi.org/https://doi.org/10.1109/JSYST.2019.2912415
- Sumalee, A., & Ho, H. W. (2018). Smarter and more connected: Future intelligent transportation system. IATSS Research, 42(2), 67–71. https://doi.org/https://doi.org/10.1016/j.iatssr.2018.05.005
- Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 10(5), 557–570. https://doi.org/https://doi.org/10.1142/S0218488502001648
- Tonyali, S., Cakmak, O., Akkaya, K., Mahmoud, M. M., & Guvenc, I. (2015). Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks. IEEE Internet of Things Journal, 3(5), 709–719. https://doi.org/https://doi.org/10.1109/JIOT.2015.2510504
- Vahedi, E., Bayat, M., Pakravan, M. R., & Aref, M. R. (2017). A secure ECC-based privacy preserving data agggregation scheme for smart grids. Computer Networks, 129, 28–36. https://doi.org/https://doi.org/10.1016/j.comnet.2017.08.025
- Wang, X., Meng, W., & Liu, Y. (2020). Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid. Journal of Information Security and Applications, 55, 102628. https://doi.org/https://doi.org/10.1016/j.jisa.2020.102628
- Wen, M., Zhang, X., Li, H., & Li, J. (2017) A data aggregation scheme with fine-grained access control for smart grid. In Proceedings: 2017 IEEE 86th vehicular technology conference (VTC-Fall), Toronto, ON, Canada. (IEEE), 24-27 September, 2017.
- Zhang, Y., Li, J., Zheng, D., Li, P., & Tian, Y. (2018). Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. Journal of Network and Computer Applications, 122, 50–60. https://doi.org/https://doi.org/10.1016/j.jnca.2018.07.017
- Zhang, J., Liu, L., Cui, Y., & Chen, Z. (2013). SP2 DAS: Self-certified PKC-based privacy-preserving data aggregation scheme in smart grid. International Journal of Distributed Sensor Networks 9(1), 1–11. https://doi.org/https://doi.org/10.1155/2013/457325
- Zhang, Y., Zheng, D., Zhao, Q., Lai, C., & Ren, F. (2017) PADA: Privacy-aware data aggregation with efficient communication for power injection in 5G smart grid slice. In Proc. 2017 international conference on networking and network applications, Kathmandu, Nepal. (IEEE), 16-19 October, 2017, pp. 11–16.
- Zhu, H., He, X., Liu, X., & Li, H. (2016). PTFA: A secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system. International Journal of Embedded Systems, 8(1), 78–86. https://doi.org/https://doi.org/10.1504/IJES.2016.073749