Learn More
Recently, an intrusion detection system which named CONFIDANT was proposed, which utilized file integrity analyzers and mobile agent for intrusion detection and aimed to detection of malicious activity by insiders. But CONFIDANT has vulnerabilities in security aspect, the sensor agents in the lowest echelon are easily compromised by malicious platforms.(More)
—The vehicle-to-grid (V2G) system enables energy flow from the electric vehicles (EVs) to the grid. The distributed power of the EVs can either be sold to the grid or be used to provide frequency regulation service when V2G is implemented. A V2G control algorithm is necessary to decide whether the EV should be charged, discharged, or provide frequency(More)
—Demand response (DR) enables customers to adjust their electricity usage to balance supply and demand. Most previous works on DR consider the supply–demand matching in an abstract way without taking into account the underlying power distribution network and the associated power flow and system operational constraints. As a result, the schemes proposed by(More)
In this paper, we present an improved biometric identity based encryption scheme which is based on Baek et al's scheme. By using fuzzy extractor to construct the public key of a user, we reduce the number of exponentiations of encryption algorithm, the number of MaptoPoint hash function and the length of ciphertext from O(n) to O(1). Furthermore, we proved(More)
—Energy management in microgrids is typically formulated as a non-linear optimization problem. Solving it in a centralized manner does not only require high computational capabilities at the microgrid central controller (MGCC) but may also infringe customer privacy. Existing distributed approaches, on the other hand, assume that all generations and loads(More)
With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients’ privacy and medial data’s security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic(More)
Data sharing and information exchange have grown exponentially with the information explosion in the last few years. More and more data are being shared among different type of users residing in different places, performing different kinds of tasks for different kinds of services. However, these technological advances pose a serious risk on individuals(More)