59 research outputs found

    Power Theft Identification Using Embedded System

    Get PDF
    Today, power theft plays the key role in transmission losses of electricity from the generating station to the consumer end. About 30% of power produced is being theft. Though the electricity boards know that there is power theft in the area under their vigilance, they are not able to locate the area or location of theft. So, to identify the power theft and to communicate to the EB there needs a system to be developed. Here comes the system developed by us which will find the power theft if it happens and sends the information about the place of the theft to the nearby Electricity Board

    Privacy-Friendly Mobility Analytics using Aggregate Location Data

    Get PDF
    Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes. At the same time, however, the fine-grained collection of user locations raises serious privacy concerns, as this can reveal sensitive information about the users, such as, life style, political and religious inclinations, or even identities. In this paper, we study the feasibility of crowd-sourced mobility analytics over aggregate location information: users periodically report their location, using a privacy-preserving aggregation protocol, so that the server can only recover aggregates -- i.e., how many, but not which, users are in a region at a given time. We experiment with real-world mobility datasets obtained from the Transport For London authority and the San Francisco Cabs network, and present a novel methodology based on time series modeling that is geared to forecast traffic volumes in regions of interest and to detect mobility anomalies in them. In the presence of anomalies, we also make enhanced traffic volume predictions by feeding our model with additional information from correlated regions. Finally, we present and evaluate a mobile app prototype, called Mobility Data Donors (MDD), in terms of computation, communication, and energy overhead, demonstrating the real-world deployability of our techniques.Comment: Published at ACM SIGSPATIAL 201

    Still Wrong Use of Pairings in Cryptography

    Get PDF
    Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies. There have been however a wide range of incorrect use of these primitives. The paper of Galbraith, Paterson, and Smart (2006) pointed out most of the issues related to the incorrect use of pairing-based cryptography. However, we noticed that some recently proposed applications still do not use these primitives correctly. This leads to unrealizable, insecure or too inefficient designs of pairing-based protocols. We observed that one reason is not being aware of the recent advancements on solving the discrete logarithm problems in some groups. The main purpose of this article is to give an understandable, informative, and the most up-to-date criteria for the correct use of pairing-based cryptography. We thereby deliberately avoid most of the technical details and rather give special emphasis on the importance of the correct use of bilinear maps by realizing secure cryptographic protocols. We list a collection of some recent papers having wrong security assumptions or realizability/efficiency issues. Finally, we give a compact and an up-to-date recipe of the correct use of pairings.Comment: 25 page

    A game theory model for electricity theft detection and privacy-aware control in AMI systems

    Get PDF
    We introduce a model for the operational costs of an electric distribution utility. The model focuses on two of the new services that are enabled by the Advanced Metering Infrastructure (AMI): (1) the fine-grained anomaly detection that is possible thanks to the frequent smart meter sampling rates (e.g., 15 minute sampling intervals of some smart meter deployments versus monthly-readings from old meters), and (2) the ability to shape the load thanks to advanced demand-response mechanisms that leverage AMI networks, such as direct-load control. We then study two security problems in this context. (1) In the first part of the paper we formulate the problem of electricity theft detection (one of the use-cases of anomaly detection) as a game between the electric utility and the electricity thief. The goal of the electricity thief is to steal a predefined amount of electricity while minimizing the likelihood of being detected, while the electric utility wants to maximize the probability of detection and the degree of operational cost it will incur for managing this anomaly detection mechanism. (2) In the second part of the paper we formulate the problem of privacy-preserving demand response as a control theory problem, and show how to select the maximum sampling interval for smart meters in order to protect the privacy of consumers while maintaining the desired load shaping properties of demand-response programs

    Het slimme elektriciteitsnetwerk en de noodzaak tot het uitwisselen van persoonsgegevens

    Get PDF
    Het slimme elektriciteitsnetwerk en de slimme meter zijn geen onomstreden onderwerpen en kennen vooral in Nederland een bewogen geschiedenis die zelfs in de internationale literatuur wordt aangehaald.2 In dit artikel wordt eerst kort ingegaan op de Nederlandse en EU regelgeving die ten grondslag ligt aan het slimme elektriciteitsnetwerk. Daarna wordt gekeken welke rol privacy hierin is toebedeeld. De kern van het artikel is een analyse van de verschillende functies van de slimme meter, alsmede de noodzaak om hierbij gedetailleerde gegevens3 te verwerken. Deze functies worden vervolgens getoetst aan de EU privacywetgeving en de ontwikkeling van het recht op gegevensbescherming wordt kritisch geëvalueerd. Tenslotte zal worden toegelicht welke benadering door de Commissie wordt gekozen in vraagstukken waar de implementatie van technologie leidt tot een spanningsveld tussen belangen van burgers bij privacy en belangen van de collectieven (industrie en overheid) bij het vrije verkeer van persoonsgegevens. Daarbij wordt gekeken of deze benadering recht doet aan de privacy van de Europese burger
    corecore