Picture of athlete cycling

Open Access research with a real impact on health...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by Strathclyde researchers, including by researchers from the Physical Activity for Health Group based within the School of Psychological Sciences & Health. Research here seeks to better understand how and why physical activity improves health, gain a better understanding of the amount, intensity, and type of physical activity needed for health benefits, and evaluate the effect of interventions to promote physical activity.

Explore open research content by Physical Activity for Health...

Combined network coding and paillier homomorphic encryption for ensuring consumer data privacy in smart grid networks

Murray, D. and Zhao, B. and Elafoudi, G. and Liao, J. and Stankovic, L. and Stankovic, V. (2014) Combined network coding and paillier homomorphic encryption for ensuring consumer data privacy in smart grid networks. In: Algebra, Codes and Networks 2014, 2014-06-16 - 2014-06-20.

[img] PDF (Murray-et-al-ACN2014-consumer-data-privacy-in-smart-grid-networks)
Murray_et_al_ACN2014_consumer_data_privacy_in_smart_grid_networks.pdf - Accepted Author Manuscript

Download (1MB)

Abstract

Network coding (NC), which combines packets into linear combinations, has been shown to increase the capacity of a network, allocate resources more efficiently, reduce transmission power, and improve transmission reliability. NC can be combined with encryption to enhance the security of transmissions. We use Paillier Homorophic Encryption paired with NC (NCPHE) to provide additional protection against eavesdropping and packet analysis attacks while maintaining bandwidth efficiency and erasure protection. In this talk we will assess the suitability of NCPHE in a smart grid network to carry sensitive control and user information. Based on the latest UK DECC smart meter program and our own deployment we analyse the theoretical performance and practicality of our NCPHE scheme under different attack types.