TY - CONF
T1 - Secure data aggregation mechanism for water distribution system using blockchain
AU - Mahmoud, Haitham
AU - Wu, Wenyan
AU - Wang, Yonghao
PY - 2019
Y1 - 2019
N2 - Development of intelligent systems in particular Water Distribution Systems (WDS) increases the demand of implementing a secure scheme that can preserve user's identification and data consumption through maintaining confidentiality, authentication and integrity. Decentralization topology has investigated a lot recently in the literature with the development of bitcoins and Ethereum networks in different IoT disciplines such as power systems and healthcare systems. In this paper, feasibility and uses cases studies on the integration WDS with Blockchain Technology are discussed. Moreover, the customer's data and identity anonymity techniques that can be integrated with the network are discussed. Furthermore, a data aggregation mechanism of the smart meters in Water Distribution System (WDS) based on distributed ledger and Blockchain technologies is proposed. Further, the customer's identity using bloom filter is simulated and optimal parameters of the bloom filter are suggested.
AB - Development of intelligent systems in particular Water Distribution Systems (WDS) increases the demand of implementing a secure scheme that can preserve user's identification and data consumption through maintaining confidentiality, authentication and integrity. Decentralization topology has investigated a lot recently in the literature with the development of bitcoins and Ethereum networks in different IoT disciplines such as power systems and healthcare systems. In this paper, feasibility and uses cases studies on the integration WDS with Blockchain Technology are discussed. Moreover, the customer's data and identity anonymity techniques that can be integrated with the network are discussed. Furthermore, a data aggregation mechanism of the smart meters in Water Distribution System (WDS) based on distributed ledger and Blockchain technologies is proposed. Further, the customer's identity using bloom filter is simulated and optimal parameters of the bloom filter are suggested.
M3 - Paper
SP - 1
EP - 6
T2 - 25th IEEE International Conference on Automation and Computing, ICAC 2019
Y2 - 5 September 2019 through 7 September 2019
ER -