Advertisement

Overview of the Security and Privacy Issues in Smart Grids

  • Kianoosh G. Boroojeni
  • M. Hadi Amini
  • S. S. Iyengar
Chapter

Abstract

In recent years, there is an increasing trend in the power systems from a centralized fossil fuel-based grid toward a distributed green-based network. This requirement compels a new way of designing smart grids for a more reliable and secure power system performance. Involving the demand side in the power system management requires large-scale utilization of distributed communication networks.

Keywords

Power System Cloud Computing Smart Grid Power Flow Cloud Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    V.C. Gungor et al., Smart grid technologies: communication technologies and standards. IEEE Trans. Ind. Inf. 7 (4), 529–539 (2011)MathSciNetCrossRefGoogle Scholar
  2. 2.
    National Institute of Standards and Technology, NIST framework and roadmap for smart grid interoperability standards, release 1.0, Office of the National Coordinator for Smart Grid Interoperability-U.S. Department of Commerce, NIST Special Publication 1108, Jan 2010Google Scholar
  3. 3.
    S.M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory, 1st edn. (Prentice-Hall International Editions, Englewood Cliffs, 1993)zbMATHGoogle Scholar
  4. 4.
    R.E. Brown, Impact of smart grid on distribution system design, in Proceedings of IEEE Power and Energy Society General Meeting, Pittsburgh, PA, July 2008, pp. 1–4Google Scholar
  5. 5.
    A. Elmitwally, M. Elsaid, M. Elgamal, Z. Chen, A fuzzy-multiagent self-healing scheme for a distribution system with distributed generations. IEEE Trans. Power Syst. 99, 1–11 (2014)Google Scholar
  6. 6.
    F. Kamyab, M.H. Amini, S. Sheykhha, M. Hasanpour, M.M. Jalali, Demand response program in smart grid using supply function bidding mechanism, IEEE Transactions on Smart Grid 7 (2), 1277–1284 (2016)CrossRefGoogle Scholar
  7. 7.
    S. Mhanna, A.C. Chapman, G. Verbič, A fast distributed algorithm for large-scale demand response aggregation. IEEE Trans. Smart Grid 7 (4), 2094–2107 (2016)CrossRefGoogle Scholar
  8. 8.
    M.H. Amini et al., ARIMA-based demand forecasting method considering probabilistic model of electric vehicles’ parking lots, in Proceedings of IEEE Power and Energy Society General Meeting, 2015, pp. 1–5Google Scholar
  9. 9.
    M.H. Amini, R. Jaddivada, S. Mishra, O. Karabasoglu, Distributed security constrained economic dispatch, in IEEE PES Innovative Smart Grid Technologies Conference (ISGT-Asia 2015), Bangkok, 3–6 Nov 2015Google Scholar
  10. 10.
    A. Mohsenzadeh, M.-R. Haghifam, Simultananeus placement of conventional and renewable distributed generation using multi objective optimization, in Proceedings of IEEE, Integration of Renewables into Distributed Grid Workshop, CIRED, 2012Google Scholar
  11. 11.
    M.H. Amini, J. Frye, M.D. Ilic, O. Karabasoglu, Smart residential energy scheduling utilizing two stage mixed integer linear programming, in IEEE 47th North American Power Symposium (NAPS 2015), Charlotte, NC, 4–6 Oct 2015Google Scholar
  12. 12.
    A. Papavasiliou, S.S. Oren, Supplying renewable energy to deferrable loads: algorithms and economic analysis, in Proceedings of IEEE Power and Energy Society General Meeting, Minneapolis, Minnesota, July 2010, pp. 1–8Google Scholar
  13. 13.
    A.R. Di Fazio, G. Fusco, M. Russo, Enhancing distribution networks to evolve toward smart grids: The voltage control problem, in Proceedings of IEEE 52nd Annual Conference on Decision and Control (CDC), Firenze, Dec 2013, pp. 6940–6945Google Scholar
  14. 14.
    J.M. Morales et al., Integrating Renewables in Electricity Markets: Operational Problems. vol. 205 (Springer Science & Business Media, Berlin, 2013)Google Scholar
  15. 15.
    W. Tushar et al., Three-party energy management with distributed energy resources in smart grid. IEEE Trans. Ind. Electron. 62 (4), 2487–2498 (2015)CrossRefGoogle Scholar
  16. 16.
    V. Kekatos, G. Wang, A.J. Conejo, G.B. Giannakis, Stochastic reactive power management in microgrids with renewables. IEEE Trans. Power Syst. 99, 1–10 (2014)Google Scholar
  17. 17.
    S.E. Shafiei et al., A decentralized control method for direct smart grid control of refrigeration systems, in Proceedings of IEEE 52nd Annual Conference on Decision and Control (CDC), Firenze, Dec 2013, pp. 6934–6939Google Scholar
  18. 18.
    G. Cavraro, R. Carli, S. Zampieri, A distributed control algorithm for the minimization of the power generation cost in smart micro-grid, in Proceedings of IEEE 53rd Annual Conference on Decision and Control (CDC), Los Angeles, CA, Dec 2014, pp. 5642–5647Google Scholar
  19. 19.
    S. Bolognani, S. Zampieri, A distributed control strategy for reactive power compensation in smart microgrids. IEEE Trans. Autom. Control 58 (11), 2818–2833 (2013)MathSciNetCrossRefGoogle Scholar
  20. 20.
    S. Kar, G. Hug, J. Mohammadi, J.M.F. Moura, Distributed state estimation and energy management in smart grids: a consensus+innovations approach. IEEE J. Sel. Top. Sign. Proces. 99, 1–16 (2014)Google Scholar
  21. 21.
    M.J. Neely, A. Tehrani, A. Dimakis, Efficient algorithms for renewable energy allocation to delay tolerant consumers, in Proceedings of IEEE First International Conference on Smart Grid Comm. (SmartGridComm), Gaithersburg, MD, Oct 2010, pp. 549–554Google Scholar
  22. 22.
    S.S. Iyengar, K.G. Boroojeni, Oblivious Network Routing Algorithms and Applications (MIT Press, Cambridge, 2015)zbMATHGoogle Scholar
  23. 23.
    K.G. Boroojeni, S. Mokhtari, M.H. Amini, S.S. Iyengar, Optimal two-tier forecasting power generation model in smart grid. Int. J. Inf. Process. 8 (4), 1–10 (2014)Google Scholar
  24. 24.
    S.S. Iyengar, K.G. Boroojeni, N. Balakrishnan, Mathematical Theories of Distributed Sensor Networks (Springer Publishing Company, Incorporated, Berlin, 2014)zbMATHCrossRefGoogle Scholar
  25. 25.
    W. Su, H.R. Eichi, W. Zeng, M.-Y. Chow, A survey on the electrification of transportation in a smart grid environment. IEEE Trans. Ind. Inf. 8 (1), 1–10 (2012)CrossRefGoogle Scholar
  26. 26.
    M.H. Amini, A. Islam, Allocation of electric vehicles’ parking lots in distribution network, in Proceedings of IEEE Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, Feb 2014, pp. 1–5Google Scholar
  27. 27.
    M.H. Amini, A.I. Sarwat, Optimal reliability-based placement of plug-in electric vehicles in smart distribution network. Int. J. Eng. Sci. 4 (2), 43–49 (2014)Google Scholar
  28. 28.
    J.M. Carrasco et al., Power-electronic systems for the grid integration of renewable energy sources: a survey. IEEE Trans. Ind. Electron. 53 (4), 1002–1016 (2006)MathSciNetCrossRefGoogle Scholar
  29. 29.
    X. Yu, C. Cecati, T. Dilon, M.G. Simoes, The new frontier of smart grids. IEEE Ind. Electron. Mag. 5 (3), 49–63 (2011)CrossRefGoogle Scholar
  30. 30.
    T. Konstantin, et al. Local control of reactive power by distributed photovoltaic generators, in First IEEE International Conference on Smart Grid Communications (SmartGridComm) (2010)Google Scholar
  31. 31.
    R. Ghorani, M. Fotuhi-Firuzabad, P. Dehghanian, W. Li, Identifying critical component for reliability centered maintenance management of deregulated power systems. IET Gener. Transm. Distrib 9 (9), 828–837 (2015)Google Scholar
  32. 32.
    P. Dehghanian, T. Popovic, M. Kezunovic, Circuit breaker operational health assessment via condition monitoring data, in 46th North American Power Symposium, (NAPS), Sep 2014 (Washington State University, Pullman, Washington, 2014)Google Scholar
  33. 33.
    P. Dehghanian, M. Moeini-Aghtaie, M. Fotuhi-Firuzabad, R. Billinton, A practical application of the Delphi method in maintenance-targeted resource allocation of distribution utilities, in 13th International Conference on Probabilistic Methods Applied to Power Systems, PMAPS, July 2014 (Durham University, Durham, 2014)Google Scholar
  34. 34.
    P. Dehghanian, M. Fotuhi-Firuzabad, F. Aminifar, R. Billinton, A comprehensive scheme for reliability centered maintenance implementation in power distribution systems- Part I: methodology. IEEE Trans. Power Delivery 28 (2), 761–770 (2013)CrossRefGoogle Scholar
  35. 35.
    P. Dehghanian, M. Fotuhi-Firuzabad, S. Bagheri-Shouraki, A.A. Razi Kazemi, Critical component identification in reliability centered asset management of distribution power systems via fuzzy AHP. IEEE Syst. J. 6 (4), 593–602 (2012)CrossRefGoogle Scholar
  36. 36.
    S. Bahrami, M. Parniani, A. Vafaeimehr, A modified approach for residential load scheduling using smart meters, in IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), Berlin, 2012Google Scholar
  37. 37.
    S. Bahrami, V.W.S. Wong, An autonomous demand response program in smart grid with foresighted users, in Proceedings of IEEE SmartGridComm, Miami, FL, 2015Google Scholar
  38. 38.
    S. Bahrami, F. Khazaeli, M. Parniani, Industrial load scheduling in smart power grids, in 22nd International Conference and Exhibition on Electricity Distribution (CIRED 2013), Stockholm 2013, pp. 1–4Google Scholar
  39. 39.
    P. Samadi, H. Mohsenian-Rad, V.W.S. Wong, R. Schober, Real-time pricing for demand response based on stochastic approximation. IEEE Trans. Smart Grid 5 (2), 789–798 (2014)CrossRefGoogle Scholar
  40. 40.
    S. Bahrami, M. Parniani, Game theoretic based charging strategy for plug-in hybrid electric vehicles. IEEE Trans. Smart Grid 5 (5), 2368–2375 (2014)CrossRefGoogle Scholar
  41. 41.
    K.G. Boroojeni, M.H. Amini, S. Bahrami, S.S. Iyengar, A.I. Sarwat, O. Karabasoglu, A novel multi-time-scale modeling for electric power demand forecasting: from short-term to medium-term horizon. Electr. Power Syst. Res. 142, 58–73 (2017)CrossRefGoogle Scholar
  42. 42.
    M.H. Amini, A.I. Sarwat, S.S. Iyengar, I. Guvenc, Determination of the minimum-variance unbiased estimator for dc power-flow estimation, in 40th IEEE Industrial Electronics Conference (IECON 2014) (Dallas, 2014)Google Scholar
  43. 43.
    P. Samadi, S. Bahrami, V.W.S. Wong, R. Schober, Power dispatch and load control with generation uncertainty, in 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Orlando, FL 2015, pp. 1126–1130Google Scholar
  44. 44.
    A. Ameli et al., A multiobjective particle swarm optimization for sizing and placement of DGs from DG owner’s and distribution company’s viewpoints. IEEE Trans. Power Delivery 29 (4), 1831–1840 (2014)CrossRefGoogle Scholar
  45. 45.
    H. Kim, N. Feamster, Improving network management with software defined networking. IEEE Commun. Mag. 51 (2), 114–119 (2013)CrossRefGoogle Scholar
  46. 46a.
    H. Arasteh, et al., SoS-based multiobjective distribution system expansion planning. Electr. Power Syst. Res. 141, 392–406 (2016)CrossRefGoogle Scholar
  47. 46b.
    S. Parhizi, A. Khodaei, Investigating the necessity of distribution markets in accommodating high penetration microgrids, in IEEE PES Transmission & Distribution Conference & Exposition (Dallas, 2016)Google Scholar
  48. 46c.
    H. Arasteh, M.S. Sepasian, V. Vahidinasab, An aggregated model for coordinated planning and reconfiguration of electric distribution networks. Energy 94, 786–798 (2016)CrossRefGoogle Scholar
  49. 47.
    Y. Yan, Y. Qian, H. Sharif, D. Tipper, A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutorials 14 (4), 998–1010 (2012)CrossRefGoogle Scholar
  50. 48.
    M. Rahman, P. Bera, E. Al-Shaer, Smartanalyzer: a noninvasive security threat analyzer for AMI smart grid, in Proceedings of IEEE INFOCOM, Orlando, FL, 2012Google Scholar
  51. 49.
    M.H. Amini, M. Parsa Moghaddam, Probabilistic modelling of electric vehicles’ parking lots charging demand, in 21th Iranian Conference on Electrical Engineering ICEE2013, Ferdowsi University of Mashhad, 14–16 May 2013Google Scholar
  52. 50.
    A. Zidan, E.F. El-Saadany, A cooperative multi-agent framework for self-healing mechanisms in distribution systems. IEEE Trans. Smart Grid 3 (3), 1525–1539 (2012)CrossRefGoogle Scholar
  53. 51.
    M.H. Amini, B. Nabi, M.-R. Haghifam, Load management using multi-agent systems in smart distribution network, in Proceedings of IEEE Power and Energy Society General Meeting, Vancouver, BC, July 2013, pp. 1–5Google Scholar
  54. 52.
    P. Dehghanian, Y. Wang, G. Gurrala, E. Moreno, M. Kezunovic, Flexible implementation of power system corrective topology control. Electr. Power Syst. Res. 128, 79–89 (2015)CrossRefGoogle Scholar
  55. 53.
    M. Kezunovic, T. Popovic, G. Gurrala, P. Dehghanian, A. Esmaeilian, M. Tasdighi, Reliable implementation of robust adaptive topology control, in The 47th Hawaii International Conference on System Science, HICSS, Big Island, 6–9 Jan 2014Google Scholar
  56. 54.
    P. Dehghanian, M. Kezunovic, Probabilistic impact of transmission line switching on power system operating states, in IEEE Power and Energy Systems (PES) Transmission and Distribution (T&D) Conference and Exposition, Dallas, 2–5 May 2016Google Scholar
  57. 55.
    P. Dehghanian, M. Kezunovic, Impact assessment of power system topology control on system reliability, in IEEE Conference on Intelligent System Applications to Power Systems, Porto, 11–16 Sept 2015Google Scholar
  58. 56.
    P. Dehghanian, M. Kezunovic, Probabilistic decision making for the bulk power system optimal topology control. IEEE Trans. Smart Grid 7 (4), 2071–2081 (2016)CrossRefGoogle Scholar
  59. 57.
    Y. Shoham, K. Leyton-Brown, Multi-agent Systems: Algorithmic. Game Theoretic and Logical Foundations (Cambridge University Press, Cambridge, 2009–2010)Google Scholar
  60. 58.
    F. Bellifemine, G. Caire, D. Greenwood, Developing Multi-Agent Systems with JADE (Wiley, New York, 2007)CrossRefGoogle Scholar
  61. 59.
    M. Wooldridge, G. Weiss, Intelligent agents, in Multi-Agent Systems (MIT Press, Cambridge, MA, 1999), pp. 3–51Google Scholar
  62. 60.
    P. Siano, C. Cecati, H. Yu, J. Kolbusz, Real time operation of smart grids via FCN networks and optimal power flow. IEEE Trans. Ind. Inf. 8 (4), 944–952 (2012)CrossRefGoogle Scholar
  63. 61.
    A.I. Sarwat, M.H. Amini, A. Domijan Jr., A. Damnjanovic, F. Kaleem, Weather-based interruption prediction in the smart grid utilizing chronological data. J. Modern Power Syst. Clean Energy 4 (2), 308–315 (2016)CrossRefGoogle Scholar
  64. 62.
    J.D. Glover, M.S. Sarma, Power System Analysis and Design, 3rd edn. (Brooks/Cole, Pacific Grove, CA, 2002)Google Scholar
  65. 63.
    B. Stott, Review of load-flow calculation methods. Proc. IEEE 62, 916–929 (1974)CrossRefGoogle Scholar
  66. 64.
    A.J. Wood, B.F. Wollenberg, Power Generation, Operation and Control, 2nd edn. (Wiley, New York, 1996)Google Scholar
  67. 65.
    G. Giannakis, V. Kekatos, N. Gatsis, S.-J. Kim, H. Zhu, B. Wollenberg, Monitoring and optimization for power grids: a signal processing perspective. IEEE Signal Process. Mag. 30 (5), 107–128 (2013)CrossRefGoogle Scholar
  68. 66.
    L. Powell, DC load flow, Chap. 11, in Power System Load Flow Analysis. McGrawHill Professional Series (McGrawHill, New York, 2004)Google Scholar
  69. 67.
    B. Stott, J. Jardim, O. Alsac, DC power flow revisited. IEEE Trans. Power Syst. 24 (3), 1290–1300 (2009)CrossRefGoogle Scholar
  70. 68.
    R.J. Kane, F.F. Wu, Flow approximations for steady-state security assessment. IEEE Trans. Circuits Syst. CAS-31 (7), 623–636 (1984)Google Scholar
  71. 69.
    R. Baldick, Variation of distribution factors with loading. IEEE Trans. Power Syst. 18 (4), 1316–1323 (2003)CrossRefGoogle Scholar
  72. 70.
    L. Xiong, W. Peng, L. Pohchiang, A hybrid AC/DC microgrid and its coordination control. IEEE Trans. Smart Grid 2 (2), 278–286 (2011)CrossRefGoogle Scholar
  73. 71.
    S. Bera, S. Misra, P.C. Rodriguez Cloud computing applications for smart grid: a survey. IEEE Trans. Parallel Distrib. Syst. 99, 1–18 (2014)Google Scholar
  74. 72.
    C.-T. Yang, W.-S. Chen, K.-L. Huang, J.-C. Liu, W.-H. Hsu, C.-H. Hsu, Implementation of smart power management and service system on cloud computing, in Proceedings of IEEE International Conference on UIC/ATC, 2012, pp. 924–929Google Scholar
  75. 73.
    S. Rusitschka, E. Kolja, C. Gerdes, Smart grid data cloud: a model for utilizing cloud computing in the smart grid domain, in First IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, 2010Google Scholar
  76. 74.
    M. Kezunovic, L. Xie, S. Grijalva, The role of big data in improving power system operation and protection, IREP Symposium IEEE, Bulk Power System Dynamics and Control-IX Optimization, Security and Control of the Emerging Power Grid (IREP), 2013Google Scholar
  77. 75.
    C. Almond, A practical guide to cloud computing security, Aug 2009Google Scholar
  78. 76.
    B. Joshi, A. Santhana Vijayan, B. Kumar Joshi, Securing cloud computing environment against DDoS attacks, in 2012 International Conference on Computer Communication and Informatics (ICCCI-2012), Coimbatore, 10–12 Jan 2012Google Scholar
  79. 77.
    S. Yu, W. Zhou, R. Doss, Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun. Lett. 12 (4), 318–321 (2008)CrossRefGoogle Scholar
  80. 78.
    Y. Shui, W. Zhou, Entropy-based collaborative detection of DDoS attacks on community networks, in Sixth Annual IEEE International Conference on Pervasive Computing and Communications, Piscataway, NJ, 2008, pp. 566–571Google Scholar
  81. 79.
    J.J.B. Krishnamurthy, M. Rabinovich, Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites, in Proceedings of International WWW Conferences, 2002Google Scholar
  82. 80.
    Y. Chen, K. Hwang, Collaborative change detection of DDoS attacks on community and ISP networks, in Proceedings of IEEE CTS, 2006Google Scholar
  83. 81.
    R.B.G. Carl, G. Kesidis, S. Rai, Denial of service attack detection techniques. IEEE Internet Comput. 10 (1), 82–89 (2006)CrossRefGoogle Scholar
  84. 82.
    B. Wang, Y. Zheng, W. Lou, Y.T. Hou, DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308–319 (2015)CrossRefGoogle Scholar
  85. 83.
    A. Mishra, R. Mathur, S. Jain, J.S. Rathore, Cloud computing security. Int. J. Recent Innov. Trends Comput. Commun. 1 (1), 36–39 (2013)Google Scholar
  86. 84.
    A. Gupta, M.T. Hajiaghayi, H. Racke, Oblivious network design, in SODA ’06: Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithm (ACM, New York, 2006), pp. 970–979CrossRefGoogle Scholar
  87. 85.
    R. Dewri, Location privacy and attacker knowl- edge: who are we fighting against? in Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 96 (Springer, Berlin, 2012), pp. 96–115Google Scholar
  88. 86.
    M. Li, S. Salinas, A. Thapa, P. Li, n-CD: a geometric approach to preserving location privacy in location-based services, in Proceedings of IEEE INFOCOM, 2013Google Scholar
  89. 87.
    S.S. Iyengar, K.G. Boroojeni, N. Balakrishnan, Mathematical Theories of Distributed Sensor Networks (Springer, Berlin, 2014), pp. 111–145zbMATHCrossRefGoogle Scholar
  90. 88.
    R. Shi, M. Goswami, J. Gao, X.- feng Gu, Is random walk truly memory-less - traffic analysis and source location privacy under random walks, in 2013 Proceedings IEEE INFOCOM, Turin, 2013, pp. 3021–3029Google Scholar
  91. 89.
    M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in ACM Mobisys’03, May 2003Google Scholar
  92. 90.
    B. Gedik, L. Liu, Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7 (1), 1–18 (2008)CrossRefGoogle Scholar
  93. 91.
    J. Meyerowitz, R.R. Choudhury, Hiding stars with fireworks: location privacy through camouflage, in Proceedings of ACM MobiCom, Beijing, Sept 2009CrossRefGoogle Scholar
  94. 92.
    M. F. Mokbel, C.Y. Chow, W.G. Aref, The new casper: query processing for location services without compromising privacy, in Proceedings of VLDB, 2006Google Scholar
  95. 93.
    P. Kalnis, G. Ghinita, K. Mouratidis, D. Papadias, Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19 (12), 1719–1733 (2007)CrossRefGoogle Scholar
  96. 94.
    B. Gedik, L. Liu, Location privacy in mobile systems: a personalized anonymization model, in Proceedings of IEEE ICDCS, Columbus, OH, June 2005Google Scholar
  97. 95.
    C.-Y. Chow, M.F. Mokbel, X. Liu, A peer-to-peer spatial cloaking algorithm for anonymous location-based service, in Proceedings of ACM GIS, Arlington, VA, Nov 2006Google Scholar
  98. 96.
    A. Beresford, F. Stajano, Location privacy in pervasive computing. IEEE Pervasive Comput. 2 (1), 46–55 (2003)CrossRefGoogle Scholar
  99. 97.
    B. Hoh, M. Gruteser, H. Xiong, A. Alrabady, Preserving privacy in GPS traces via uncertainty-aware path cloaking, in Proceedings of ACM CCS 2007, Alexandria, VA, Jan 2007Google Scholar
  100. 98.
    H. Kido, Y. Yanagisawa, T. Satoh, An anonymous communication technique using dummies for location-based services, in Proceedings of IEEE ICPS, Santorini, July 2006Google Scholar
  101. 99.
    H. Lu, C.S. Jensen, M.L. Yiu, Pad: privacy-area aware, dummy based location privacy in mobile services, in Proceedings of ACM MobiDE, Vancouver, June 2008CrossRefGoogle Scholar
  102. 100.
    M. Duckham, L. Kulik, A formal model of obfuscation and negotiation for location privacy, in Proceedings of International Conference on Pervasive Computing, Munich, May 2005Google Scholar
  103. 101.
    C.A. Ardagna, M. Cremonini, S.D.C. di Vimercati, P. Samarati, An obfuscation-based approach for protecting location privacy. IEEE Trans. Dependable Secure Comput. 8 (1), 13–27 (2011)CrossRefGoogle Scholar
  104. 102.
    A. Pingley, W. Yu, N. Zhang, X. Fu, W. Zhao, Cap: a contextaware privacy protection system for location-based services, in Proceedings of IEEE ICDCS, Montreal, June 2009Google Scholar
  105. 103.
    M. Damiani, E. Bertino, C. Silvestri, Probe: an obfuscation system for the protection of sensitive location information in LBS. Technical Report 2001-145, CERIAS, 2008Google Scholar
  106. 104.
    R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, J.-Y. Le Boudec, Protecting location privacy: optimal strategy against localization attacks, in CCS ‘12 Proceedings of the 2012 ACM Conference on Computer and Communications Security, New York, NY, 2012, pp. 617–627Google Scholar
  107. 105.
    R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, J.-P. Hubaux, Quantifying location privacy, in 2011 IEEE Symposium on Security and Privacy (SP), Berkeley, CA, May 2011, pp. 247–262Google Scholar
  108. 106.
    Z. Gong, G.-Z. Sun, X. Xie, protecting privacy in location-based services using K-anonymity without cloaked region, in Eleventh International Conference on Mobile Data Management, Kansas City, MO, 2010Google Scholar
  109. 107.
    R. Shokri, G. Theodorakopoulos, G. Danezis, J.-P. Hubaux, J.-Y. Le Boudec, Quantifying location privacy: the case of sporadic location exposure, in Privacy Enhancing Technologies, ed. by S. Fischer-Hubner, N. Hopper. Lecture Notes in Computer Science, vol. 6794 (Springer, Berlin, 2011), pp. 57–76Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  • Kianoosh G. Boroojeni
    • 1
  • M. Hadi Amini
    • 2
    • 3
  • S. S. Iyengar
    • 1
  1. 1.School of Computing and Information SciencesFlorida International UniversityMiamiUSA
  2. 2.SYSU-CMU Joint Institute of Engineering School of Electronics and Information TechnologySun Yat-sen UniversityGuangzhouChina
  3. 3.Department of Electrical and Computer EngineeringCarnegie Mellon UniversityPittsburghUSA

Personalised recommendations