Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy

被引:57
作者
Badra, Mohamad [1 ]
Zeadally, Sherali [2 ]
机构
[1] Zayed Univ, Abu Dhabi 144534, U Arab Emirates
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
基金
美国国家科学基金会;
关键词
Privacy protection; security; man-in-the-middle attack; smart grid; advanced metering infrastructure;
D O I
10.1109/TIFS.2013.2296441
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The traditional electrical grid has become inadequate in meeting the needs and demands of electricity users in the 21st century. To address this challenge, smart grid technologies have emerged, which promise more efficient production and usage of electricity through bidirectional interactions between the consumer and the utility provider. This two-way interaction allows electricity to be generated in real time based on the actual needs of the consumers. However, this two-way interaction also raises concerns related to the privacy and the personal habits of consumers. To protect sensitive energy usage information of consumers, we propose a virtual ring architecture that can provide a privacy protection solution using symmetric or asymmetric encryptions of customers' requests belonging to the same group. We compare the efficiency of our proposed approach with two recently proposed smart grid privacy approaches namely, one based on blind signature and other based on a homomorphic encryption solution. We show that our approach maintains the privacy of customers while reducing the performance overhead of cryptographic computations by more than a factor of 2 when compared with the aforementioned past solutions. We further demonstrate that our smart grid privacy solution is simple, scalable, cost-effective, and incurs minimal computational processing overheads.
引用
收藏
页码:321 / 329
页数:9
相关论文
共 20 条
  • [1] Abdul-Elminaam D., 2009, COMMUN IBIMA, V8, P1
  • [2] [Anonymous], IEEE GLOB WORKSH
  • [3] [Anonymous], 2013, 6 JOINT IFIP WIR MOB
  • [4] [Anonymous], 2002, LECT NOTES
  • [5] Benaloh J., 1987, Verifiable secret-ballot elections
  • [6] Cheung J.C., 2011, Global Telecommu- nications Conference (GLOBECOM 2011), 2011 IEEE, P1, DOI DOI 10.1109/GLOCOM.2011.6134566
  • [7] Efthymiou C, 2010, INT CONF SMART GRID, P238, DOI 10.1109/SMARTGRID.2010.5622050
  • [8] Towards a Holistic Privacy Engineering Approach for Smart Grid Systems
    Fhom, Hervais Simo
    Bayarou, Kpatcha M.
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 234 - 241
  • [9] Gallagher P. D., 2010, 7628 NISTIR
  • [10] IETF Standard Track, 2008, 5246 RFC