{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:38Z","timestamp":1773511058433,"version":"3.50.1"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100018532","name":"Major Scientific and Technological Innovation Project of Shandong Province","doi-asserted-by":"crossref","award":["2020CXGC010115"],"award-info":[{"award-number":["2020CXGC010115"]}],"id":[{"id":"10.13039\/501100018532","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772377, 61932016, 61972294 and U20A20177"],"award-info":[{"award-number":["61772377, 61932016, 61972294 and U20A20177"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Special Project on Science and Technology Program of Hubei Province","award":["2020AEA013"],"award-info":[{"award-number":["2020AEA013"]}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"crossref","award":["2020CFA052"],"award-info":[{"award-number":["2020CFA052"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Wuhan Municipal Science and Technology Project","award":["2020010601012187"],"award-info":[{"award-number":["2020010601012187"]}]},{"name":"the Science and Technology Planning Project of ShenZhen","award":["JCYJ20170818112550194"],"award-info":[{"award-number":["JCYJ20170818112550194"]}]},{"name":"Researchers Supporting Project","award":["RSP-2020\/12"],"award-info":[{"award-number":["RSP-2020\/12"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>Internet of Things (IoT)-enabled smart grids can achieve more reliable and high-frequency data collection and transmission compared with existing grids. However, this frequent data processing may consume a lot of bandwidth, and even put the user\u2019s privacy at risk. Although many privacy-preserving data aggregation schemes have been proposed to solve the problem, they still suffer from some security weaknesses or performance deficiency, such as lack of satisfactory data confidentiality and resistance to malicious data mining attack. To address these issues, we propose a novel privacy-preserving data aggregation scheme (called PDAM) for IoT-enabled smart grids, which can support efficient data source authentication and integrity checking, secure dynamic user join and exit. Unlike existing schemes, the PDAM is resilient to the malicious data mining attack launched by internal or external attackers and can achieve perfect data confidentiality against not only a malicious aggregator but also a curious control center for an authorized user. The detailed security and performance analysis show that our proposed PDAM can satisfy several well-known security properties and desirable efficiency for a smart grid system. Moreover, the comparative studies and experiments demonstrate that the PDAM is superior to other recently proposed works in terms of both security and performance.<\/jats:p>","DOI":"10.1145\/3440249","type":"journal-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T20:19:31Z","timestamp":1624306771000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid"],"prefix":"10.1145","volume":"17","author":[{"given":"Jing","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science, Wuhan University, China"}]},{"given":"Libing","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University and School of Cyber Science and Engineering, Wuhan University and Shenzhen Research Institute of Wuhan University, China"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"College of Communication and Information, University of Kentucky, USA"}]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia"}]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293537"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fcij.2017.11.004"},{"key":"e_1_2_1_4_1","unstructured":"D. F. Aranha et\u00a0al. 2020. RELIC is an Efficient LIbrary for Cryptography. Retrieved from https:\/\/github.com\/relic-toolkit\/relic. D. F. Aranha et\u00a0al. 2020. RELIC is an Efficient LIbrary for Cryptography. Retrieved from https:\/\/github.com\/relic-toolkit\/relic."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_15"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296441"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TII.2015.2500882","article-title":"Comment on \u201cprivacy-enhanced data aggregation scheme against internal attackers in smart grid","volume":"12","author":"Bao Haiyong","year":"2016","unstructured":"Haiyong Bao and Rongxing Lu . 2016 . Comment on \u201cprivacy-enhanced data aggregation scheme against internal attackers in smart grid .\u201d IEEE Trans. Industr. Inform. 12 , 1 (2016), 2 \u2013 5 . Haiyong Bao and Rongxing Lu. 2016. Comment on \u201cprivacy-enhanced data aggregation scheme against internal attackers in smart grid.\u201dIEEE Trans. Industr. Inform. 12, 1 (2016), 2\u20135.","journal-title":"IEEE Trans. Industr. Inform."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029829"},{"key":"e_1_2_1_9_1","volume-title":"Student Energy: Smart Grid.","author":"Brett Denny","year":"2019","unstructured":"Denny Brett . 2019 . Student Energy: Smart Grid. Retrieved from https:\/\/www.studentenergy.org\/topics\/smart-grid. Denny Brett. 2019. Student Energy: Smart Grid. Retrieved from https:\/\/www.studentenergy.org\/topics\/smart-grid."},{"key":"e_1_2_1_10_1","unstructured":"Smart Energy Consumer Collaborative. 2019. Four ways the smart grid benefits you. Retrieved from https:\/\/www.whatissmartgrid.org\/featured-article\/4-ways-the-smart-grid-benefits-you. Smart Energy Consumer Collaborative. 2019. Four ways the smart grid benefits you. Retrieved from https:\/\/www.whatissmartgrid.org\/featured-article\/4-ways-the-smart-grid-benefits-you."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2965578"},{"key":"e_1_2_1_12_1","unstructured":"Engerati. 2017. Western Europe invests heavily in smart grid infrastructure. Retrieved from https:\/\/www.engerati.com\/transmission-distribution\/western-europe-invests-heavily-in-smart-grid-infrastructure\/. Engerati. 2017. Western Europe invests heavily in smart grid infrastructure. Retrieved from https:\/\/www.engerati.com\/transmission-distribution\/western-europe-invests-heavily-in-smart-grid-infrastructure\/."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2277938"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/inventions4010022"},{"key":"e_1_2_1_15_1","unstructured":"Damien Giry. 2020. NIST Recommendation: Cryptographic Key Length Recommendation. Retrieved from https:\/\/www.keylength.com\/en\/4\/. Damien Giry. 2020. NIST Recommendation: Cryptographic Key Length Recommendation. Retrieved from https:\/\/www.keylength.com\/en\/4\/."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.019"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9451-y"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2949041"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2720159"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2834544"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2910171"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874473"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2969565"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2957400"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2803782"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977220"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321408.3321602"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812146"},{"key":"e_1_2_1_30_1","volume-title":"Haris Pervaiz, Hassan Malik, Masoom Alam, and Anish Jindal.","author":"Saleem Ahsan","year":"2019","unstructured":"Ahsan Saleem , Abid Khan , Saif Ur Rehman Malik , Haris Pervaiz, Hassan Malik, Masoom Alam, and Anish Jindal. 2019 . FESDA : Fog-enabled secure data aggregation in smart grid IoT network. IEEE Internet Things J. ( 2019). Ahsan Saleem, Abid Khan, Saif Ur Rehman Malik, Haris Pervaiz, Hassan Malik, Masoom Alam, and Anish Jindal. 2019. FESDA: Fog-enabled secure data aggregation in smart grid IoT network. IEEE Internet Things J. (2019)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913984"},{"key":"e_1_2_1_32_1","unstructured":"B. Shakila and T. Tuithung. 2019. Security enhancement in smart distribution grid with light-weight dynamic key encryption. http:\/\/nopr.niscair.res.in\/handle\/123456789\/52217. B. Shakila and T. Tuithung. 2019. Security enhancement in smart distribution grid with light-weight dynamic key encryption. http:\/\/nopr.niscair.res.in\/handle\/123456789\/52217."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.107"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2946935"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.007"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2912415"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2912415"},{"key":"e_1_2_1_38_1","unstructured":"Digiteum team. 2019. The Role of IoT in Smart Grid Technology. Retrieved from https:\/\/www.digiteum.com\/iot-smart-grid-technology. Digiteum team. 2019. The Role of IoT in Smart Grid Technology. Retrieved from https:\/\/www.digiteum.com\/iot-smart-grid-technology."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.031"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894573"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2899097"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2705218"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2892583"},{"key":"e_1_2_1_44_1","volume-title":"Anonymous and efficient message authentication scheme for smart grid. Secur. Commun. Netw. 2019","author":"Wu Libing","year":"2019","unstructured":"Libing Wu , Jing Wang , Sherali Zeadally , and Debiao He. 2019. Anonymous and efficient message authentication scheme for smart grid. Secur. Commun. Netw. 2019 ( 2019 ). https:\/\/doi.org\/10.1155\/2019\/4836016 10.1155\/2019 Libing Wu, Jing Wang, Sherali Zeadally, and Debiao He. 2019. Anonymous and efficient message authentication scheme for smart grid. Secur. Commun. Netw. 2019 (2019). https:\/\/doi.org\/10.1155\/2019\/4836016"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.021"},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","first-page":"e3900","DOI":"10.1002\/ett.3900","article-title":"Fog computing-based privacy preserving data aggregation protocols","volume":"31","author":"Okay Feyza Yildirim","year":"2020","unstructured":"Feyza Yildirim Okay , Suat Ozdemir , and Yang Xiao . 2020 . Fog computing-based privacy preserving data aggregation protocols . Trans. Emerg. Telecommun. Technol. 31 , 4 (2020), e3900 . Feyza Yildirim Okay, Suat Ozdemir, and Yang Xiao. 2020. Fog computing-based privacy preserving data aggregation protocols. Trans. Emerg. Telecommun. Technol. 31, 4 (2020), e3900.","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0939-1"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2978286"},{"key":"#cr-split#-e_1_2_1_49_1.1","doi-asserted-by":"crossref","unstructured":"Ouyang Zhao Xuchong Liu Xiong Li Pitam Singh and Fan Wu. 2020. Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. (2020). https:\/\/doi.org\/10.1002\/ett.3952 10.1002\/ett.3952","DOI":"10.1002\/ett.3952"},{"key":"#cr-split#-e_1_2_1_49_1.2","doi-asserted-by":"crossref","unstructured":"Ouyang Zhao Xuchong Liu Xiong Li Pitam Singh and Fan Wu. 2020. Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. (2020). https:\/\/doi.org\/10.1002\/ett.3952","DOI":"10.1002\/ett.3952"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1700859"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440249","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3440249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:18Z","timestamp":1750195698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3440249"],"URL":"https:\/\/doi.org\/10.1145\/3440249","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2020-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}