Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE.
Gaolei LiJun WuJianhua LiZhitao GuanLonghua GuoPublished in: IEEE Access (2018)
Keyphrases
- security mechanisms
- security threats
- security protocols
- security issues
- access control
- cryptographic protocols
- secure routing
- energy consumption
- stream cipher
- resource constrained
- security measures
- internet users
- chosen plaintext
- electrical energy
- standard model
- countermeasures
- smart card
- single image
- security flaws
- weather conditions
- watermarking scheme
- cryptographic algorithms
- consumer market