{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:17Z","timestamp":1740141797743,"version":"3.37.3"},"reference-count":15,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61102056","61201132","K5051301013"],"award-info":[{"award-number":["61102056","61201132","K5051301013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61102056","61201132","K5051301013"],"award-info":[{"award-number":["61102056","61201132","K5051301013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["61102056","61201132","K5051301013"],"award-info":[{"award-number":["61102056","61201132","K5051301013"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,5,1]]},"abstract":"<jats:p> Different from the traditional grid, smart grid builds a real-time connection network between the user and the grid company by smart terminals, which can achieve bidirectional data transmission and information control. In smart grid, the smart meters send various information to the power generators and substations. Frequent data collection meets real-time management, but it tends to raise privacy concerns from the users about privacy information leakage. Based on the blind signature and the key distribution scheme, an efficient and privacy-preserving data collection (EPPDC) scheme is proposed for smart grid to cope with the above problems. In EPPDC scheme, the users' data information is transmitted to the local aggregator by building gateway with privacy preserving. In addition, the security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys. Furthermore, performance analysis shows that EPPDC scheme has less computation cost than existing scheme. <\/jats:p>","DOI":"10.1155\/2015\/656219","type":"journal-article","created":{"date-parts":[[2015,5,20]],"date-time":"2015-05-20T21:04:43Z","timestamp":1432155883000},"page":"656219","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid"],"prefix":"10.1177","volume":"11","author":[{"given":"Jie","family":"Chen","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China"}]},{"given":"Junping","family":"Shi","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6837-1794","authenticated-orcid":false,"given":"Yueyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China"}]}],"member":"179","published-online":{"date-parts":[[2015,5,20]]},"reference":[{"volume-title":"The Smart Grid: An Introduction","year":"2008","author":"U.S. Department of Energy","key":"B3-2015-656219"},{"first-page":"205","volume-title":"Proceedings of the 9th Symposium on Industrial Electronics (INDEL '12)","author":"Bojani\u0107 S.","key":"B4-2015-656219"},{"key":"B6-2015-656219","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.02.018"},{"key":"B7-2015-656219","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"B8-2015-656219","doi-asserted-by":"publisher","DOI":"10.1002\/sec.706"},{"key":"B9-2015-656219","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"first-page":"321","volume-title":"Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm '10)","author":"So H. K.-H.","key":"B10-2015-656219"},{"key":"B11-2015-656219","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.960-961.832"},{"key":"B12-2015-656219","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.02.018"},{"key":"B13-2015-656219","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130716"},{"key":"B14-2015-656219","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260937"},{"key":"B15-2015-656219","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2212730"},{"first-page":"231","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)","author":"Liu D.","key":"B17-2015-656219"},{"key":"B18-2015-656219","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053458"},{"volume-title":"Modern Cryptography: Theory and Practice","year":"2003","author":"Mao W.","key":"B19-2015-656219"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/656219","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/656219","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/656219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T21:49:10Z","timestamp":1620251350000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/656219"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,1]]},"references-count":15,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5,1]]}},"alternative-id":["10.1155\/2015\/656219"],"URL":"https:\/\/doi.org\/10.1155\/2015\/656219","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,5,1]]}}}