{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:24:40Z","timestamp":1765887880964,"version":"3.37.3"},"reference-count":34,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"],"award-info":[{"award-number":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"],"award-info":[{"award-number":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"],"award-info":[{"award-number":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"],"award-info":[{"award-number":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High-Tech Research and Development Program of China","award":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"],"award-info":[{"award-number":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"]}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"],"award-info":[{"award-number":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007472","name":"University of Kentucky","doi-asserted-by":"publisher","award":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"],"award-info":[{"award-number":["61572370","61501333","61572379","U1536204","2015AA016004","2015CFB257"]}],"id":[{"id":"10.13039\/100007472","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers\u2019 privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers\u2019 privacy because it can stop the leakage of a specific consumer\u2019s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the last several years. However, most of them suffer from security weaknesses or have poor performances. To reduce computation cost and achieve better security, we construct a lightweight data aggregation scheme against internal attackers in the smart grid environment using Elliptic Curve Cryptography (ECC). Security analysis of our proposed approach shows that it is provably secure and can provide confidentiality, authentication, and integrity. Performance analysis of the proposed scheme demonstrates that both computation and communication costs of the proposed scheme are much lower than the three previous schemes. As a result of these aforementioned benefits, the proposed lightweight data aggregation scheme is more practical for deployment in the smart grid environment.<\/jats:p>","DOI":"10.1155\/2017\/3194845","type":"journal-article","created":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T17:01:11Z","timestamp":1494349271000},"page":"1-11","source":"Crossref","is-referenced-by-count":29,"title":["Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":true,"given":"Debiao","family":"He","sequence":"first","affiliation":[{"name":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China"},{"name":"Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei, China"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"College of Communication and Information, University of Kentucky, Lexington, KY, USA"}]},{"given":"Huaqun","family":"Wang","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8979-5094","authenticated-orcid":true,"given":"Qin","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2011.5741147"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6201210"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0983-3"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.014"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.03.027"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166794"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2172454"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2120634"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2331014"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2015.2444238"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2258823"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440658"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0091"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224387"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2271537"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512525"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.2307\/2007884"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.2297110"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.206"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2544805"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.e98.b.190"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2596138"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2506573"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.180"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2366471"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/457325"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0255-5"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2277938"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2500882"},{"year":"2005","key":"38"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.10.003"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/S001450010003"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2017\/3194845.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2017\/3194845.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2017\/3194845.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T17:01:24Z","timestamp":1494349284000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2017\/3194845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":34,"alternative-id":["3194845","3194845"],"URL":"https:\/\/doi.org\/10.1155\/2017\/3194845","relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2017]]}}}