21 research outputs found

    Privacy Enforcement in a Cost-Effective Smart Grid

    Get PDF
    In this technical report we present the current state of the research conducted during the first part of the PhD period. The PhD thesis “Privacy Enforcement in a Cost-Effective Smart Grid” focuses on ensuring privacy when generating market for energy service providers that develop web services for the residential domain in the envisaged smart grid. The PhD project is funded and associated to the EU project “Energy Demand Aware Open Services for Smart Grid Intelligent Automation” (SmartHG) and therefore introduces the project on a system-level. Based on this, we present some of the integration, security and privacy challenges that emerge when designing a system architecture and infrastructure. The resulting architecture is a consumer-centric and agent-based design and uses open Internet-based communication protocols for enabling interoperability while being cost-effective. Finally, the PhD report presentthe envisaged future work and publications that will lead to completion of the PhD study

    Securing the Home Energy Management Platform

    Get PDF
    Energy management in households gets increasingly more attention in the struggle to integrate more sustainable energy sources. Especially in the electrical system, smart grid systems are envisioned to be part in the efforts towards a better utilisation of the energy production and distribution infrastructure. The Home Energy Management System (HEMS) is a critical infrastructure component in this endeavour. Its main goal is to enable energy services utilising smart devices in the households based on the interest of the residential consumers and external actors. With the role of being both an essential link in the communication infrastructure for balancing the electrical grid and a surveillance unit in private homes, security and privacy become essential to address. In this chapter, we identify and address potential threats Home Energy Management Platform (HEMP) developers should consider in the progress of designing architecture, selecting hardware and building software. Our approach starts with a general view of the involved stakeholders and the HEMS. Given the system overview, a threat model is constructed from the HEMP developer\u27s point of view. Based on the threats that have been detected, possible mitigation strategies are proposed taking into account the state of the art of technology for securing platforms

    Towards the use of Pairing-Based Cryptography for Resource-Constrained Home Area Networks

    Get PDF
    Abstract-In the prevailing smart grid, the Home Area Network (HAN) will become a critical infrastructure component at the consumer premises. The HAN provides the electricity infrastructure with a bi-directional communication infrastructure that allows monitoring and control of electrical appliances. HANs are typically equipped with wireless sensors and actuators, built from resource-constrained hardware devices, that communicate by using open standard protocols. This raises concerns on the security of these networked systems. Because of this, securing a HAN to a proper degree becomes an increasingly important task. In this paper, a security model, where an adversary may exploit the system both during HAN setup as well as during operations of the network, is considered. We propose a scheme for secure bootstrapping of wireless HAN devices based on IdentityBased Cryptography (IBC). The scheme minimizes the number of exchanged messages needed to establish a session key between HAN devices. The feasibility of the approach is demonstrated from a series of prototype experiments

    Medicinske fund og det retslige udfald hos seksuelt misbrugte børn

    Get PDF
    The association between the medical findings in cases regarding reported sexual abuse of children and the legal consequences of these cases has never been described in the Danish research literature. In total, 426 girls and 56 boys were examined at the request of the police at The Forensic Institute in Aarhus between 1996 and 2002. As many as 162 girls and 11 boys had positive anogenital findings and 165 perpetrators were convicted in court. There was no significant correlation between positive anogenital findings and legal outcome. The age of the child was significant
    corecore