Results 1 -
3 of
3
From technological networks to social networks
- IEEE J. SEL. AREAS COMMUN
, 2013
"... Social networks overlaid on technological networks account for a significant fraction of Internet use. Through graph theoretic and functionality models, this paper examines social network analysis and potential implications for the design of technological networks, and vice versa. Such interplay be ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
(Show Context)
Social networks overlaid on technological networks account for a significant fraction of Internet use. Through graph theoretic and functionality models, this paper examines social network analysis and potential implications for the design of technological networks, and vice versa. Such interplay between social networks and technological networks suggests new directions for future research in networking.
Privacy-Optimal Strategies for Smart Metering Systems with a Rechargeable Battery
"... In smart-metered systems, fine-grained power dmand data (load profile) is communicated from a user to the utility provider. The correlation of the load profile with a user’s private activities leaves open the possibility of inference attacks. Using a rechargeable battery, the user can partially obsc ..."
Abstract
- Add to MetaCart
In smart-metered systems, fine-grained power dmand data (load profile) is communicated from a user to the utility provider. The correlation of the load profile with a user’s private activities leaves open the possibility of inference attacks. Using a rechargeable battery, the user can partially obscure its load profile and provide some protection to the private information using various battery charging policies. Using the mutual information as the privacy metric we study a class of optimal battery charging policies. When the power demand is a first-order Markov process, we propose a series of reductions on the optimization problem and ultimately recast it as a Markov decision process. In the special case of i.i.d. demand, we explicitly characterize the optimal policy and show that the associated privacy-leakage can be expressed as a single-letter mutual information expression.