{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:53:53Z","timestamp":1723038833924},"reference-count":23,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T00:00:00Z","timestamp":1384214400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The growing peak\u2010hour power demand has invoked an urgency to increase the peak\u2010hour supply. Although smart grid has been envisioned as the next generation power system due to its two\u2010way communication of information and power, the peak\u2010hour power shortage problem still exists. In this paper, we propose a credit\u2010based incentive tariff (CIT) scheme with fraud\u2010traceability for smart grid. Specifically, the CIT encourages retail customers to sell the power generated by their renewable resources back to the grid during peak hours via giving additional incentive rate to them based on their credits. If a fraud is detected during the power transaction, the malicious customer's identity can be traced out and his or her credit can be correspondingly reduced. The security analysis shows that the CIT resists various security threats and makes the incentive tariff fair and more secure. The performance evaluation demonstrates that the CIT can dramatically increase the peak\u2010hour supply and reduce the peak\u2010to\u2010average power demand ratio by up to 7%. Copyright \u00a9 2013 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.895","type":"journal-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T07:42:54Z","timestamp":1384242174000},"page":"823-832","source":"Crossref","is-referenced-by-count":5,"title":["CIT: A credit\u2010based incentive tariff scheme with fraud\u2010traceability for smart grid"],"prefix":"10.1002","volume":"9","author":[{"given":"Mi","family":"Wen","sequence":"first","affiliation":[{"name":"School of Computer Engineering Shanghai University of Electric Power  Shanghai 200090 China"},{"name":"Department of Electrical and Computer Engineering University of Waterloo  Waterloo ON N2L 3G1 Canada"}]},{"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering University of Waterloo  Waterloo ON N2L 3G1 Canada"}]},{"given":"Jingsheng","family":"Lei","sequence":"additional","affiliation":[{"name":"School of Computer Engineering Shanghai University of Electric Power  Shanghai 200090 China"}]},{"given":"Xiaohui","family":"Liang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering University of Waterloo  Waterloo ON N2L 3G1 Canada"}]},{"given":"Ruilong","family":"Deng","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering University of Waterloo  Waterloo ON N2L 3G1 Canada"},{"name":"State Key Laboratory of Industrial Control Technology Zhejiang University  Hangzhou 310027 China"}]},{"given":"Xuemin (Sherman)","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering University of Waterloo  Waterloo ON N2L 3G1 Canada"}]}],"member":"311","published-online":{"date-parts":[[2013,11,12]]},"reference":[{"key":"e_1_2_10_2_1","unstructured":"2012 India blackouts.http:\/\/en.wikipedia.org\/wiki\/2012\/_India\/_blackouts."},{"key":"e_1_2_10_3_1","unstructured":"SinghR K KatakeyR.\u201cWorst India Outage Highlights 60 Years of Missed Targets.\u201d Bloomberg News August 1 2012. Web.http:\/\/www.bloomberg.com\/news\/2012\u201008\u201001\/worst\u2010india\u2010outage\u2010highlights\u201060\u2010years\u2010of\u2010missed\u2010targets\u2010energy.html."},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2208658"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/59.867162"},{"key":"e_1_2_10_6_1","doi-asserted-by":"crossref","unstructured":"DeconinckG DecroixB.Smart metering tariff schemes combined with distributed energy resources Proc. Fourth International Conference on Critical Infrastructures (CRIS 2009) Linkoping Sweden 2009;1\u20138.","DOI":"10.1109\/CRIS.2009.5071483"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2045906"},{"key":"e_1_2_10_8_1","doi-asserted-by":"crossref","unstructured":"WangY GuD WenM XuJ LiH.Denial of service detection with hybrid fuzzy set based feed forward neural network Proc. Advances in Neural Networks (ISNN 2010) LNCS 6064 Shanghai China 2010;576\u2013585.","DOI":"10.1007\/978-3-642-13318-3_71"},{"key":"e_1_2_10_9_1","doi-asserted-by":"crossref","unstructured":"WangY RuanD XuJ WenM DengL.Computational intelligence algorithms analysis for smart grid cyber security Proc. Advances in Swarm Intelligence (ASI 2010) Brussels Belgium 2010;77\u201384.","DOI":"10.1007\/978-3-642-13498-2_11"},{"key":"e_1_2_10_10_1","doi-asserted-by":"crossref","unstructured":"LiangH ChoiB ZhuangW ShenX.Towards optimal energy store\u2010carry\u2010and\u2010deliver for PHEVs via V2G system Proc. The 31st IEEE International Conference on Computer Communications (INFOCOM\u201912) Orlando Florida USA 2012;1674\u20131682.","DOI":"10.1109\/INFCOM.2012.6195538"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2210058"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2089069"},{"key":"e_1_2_10_13_1","unstructured":"Ontario electricity time\u2010of\u2010use price.http:\/\/www.ontarioenergyboard.ca\/OEB\/_Documents\/For+Consumers\/TOU\/_prices\/_Winter.pdf."},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.699"},{"issue":"4","key":"e_1_2_10_16_1","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1109\/TSG.2011.2140343","article-title":"P2: Secure and privacy\u2010preserving communication and precise reward architecture for V2G networks in smart grid","volume":"2","author":"Yang Z","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2228240"},{"key":"e_1_2_10_18_1","doi-asserted-by":"crossref","unstructured":"BonehD FranklinM.Identity\u2010based encryption from the Weil pairing Proc. Advances in Cryptology(Crypto 2001) LNCS 2139 Santa Barbara California USA 2001;213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_2_10_19_1","doi-asserted-by":"crossref","unstructured":"ChowSM HuiCK YiuSM ChowKP.Two improved partially blind signature schemes from bilinear pairin Proc. The 8th Australasian Conference Information Security and Privacy (ACISP 2005) LNCS 3574 Brisbane Australia 2005;316\u2013328.","DOI":"10.1007\/11506157_27"},{"key":"e_1_2_10_20_1","doi-asserted-by":"crossref","unstructured":"ChenX ZhangF LiuS.ID\u2010based restrictive partially blind signatures and applications.http:\/\/eprint.iacr.org\/2005\/319\/.","DOI":"10.1007\/11596981_17"},{"key":"e_1_2_10_21_1","doi-asserted-by":"crossref","unstructured":"JiangL LowS.Multi\u2010period optimal energy procurement and demand response in smart grid with uncertain supply 50th IEEE Conference on Proc. Decision and Control and European Control Conference (CDC\u2010ECC 2011) Orlando FL USA 2011;4348\u20134353.","DOI":"10.1109\/CDC.2011.6161320"},{"key":"e_1_2_10_22_1","unstructured":"SakaiR OhgishiK KasaharaM.Cryptosystems based on pairing Proc. Symposium on Cryptography and Information Security Okinawa Japan 2000."},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546570.011"},{"key":"e_1_2_10_24_1","unstructured":"NREL Solar Radiation Research Laboratory (BMS) October2012. Solar Calendar http:\/\/www.nrel.gov\/midc\/apps\/calendar.pl?site=BMS;year=2012;month=10."}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.895","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.895","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:00:10Z","timestamp":1694624410000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.895"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,12]]},"references-count":23,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["10.1002\/sec.895"],"URL":"https:\/\/doi.org\/10.1002\/sec.895","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,12]]}}}