Download presentation
Presentation is loading. Please wait.
Published byJason Wells Modified over 8 years ago
1
Co-PIs: Dr. I-En Liao, CSE Department, National Chung Hsing University Dr. Gwoboa Horng, CSE Department, National Chung Hsing University Dr. Chung-Ming Wang, CSE Department, National Chung Hsing University Dr. Pi-chung Wang, CSE Department, National Chung Hsing University Dr. Huan Chen, CSE Department, National Chung Hsing University Dr. Yao-Chung Fan, CSE Department, National Chung Hsing University Dr. Wei-Chih Hong, Department of Information Engineering and Computer Science, Feng Chia University
2
Privacy is the interest that individuals have in sustaining a 'personal space', free from interference by other people and organizations. Privacy of the Person Privacy of Personal Behavior Privacy of Personal Communications Privacy of Data 2
3
3 The activity pattern of a user can be detected by analyzing the power meter data. Furthermore, using some statistical method, one can even deduct about what devices were in use at any given time
4
4 Meter 2 Meter 1 Meter m …… V 1 (t) V 2 (t) V m (t) Constraints The network communication is not secure, and we do not wish the individual power reading V i (t) to be known by third party. Due to device hardware limitation, the powerful secure communication protocols are prohibited. For the power management and load monitoring needs, the administrator node needs only the aggregated value for all t. Aggregated Value
5
Side Channel Analysis Types of side channels
7
Meter 2 Meter 1 Meter m …… V 1 (t) V 2 (t) V m (t) Sink Lightweight Cryptographic and Steganographic Schemes Concealed and Disguised Data Aggregation Data Center
8
Efficient mapping of SCA resistance validation for smart meters Intermediate values Side-channel traces statistical significance
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.