Abstract

Using fine-grained data analysis, non-invasive load monitoring (NILM) can reveal the detail of electricity customers’ habits, which is helpful in the improvement of refined management and better user experience. However, the possibility of electricity customers’ privacy leak is also gradually increasing, and the security of NILM data has become a priority problem to be solved. To protect the privacy disclosure of NILM data, this paper analyzes the NILM privacy leak problems and ways in which information leak occurs faced by NILM data. On the basis of the comprehensive survey of cryptographic algorithms to choose the most appropriate data security method for NILM, a hybrid cryptography scheme was proposed to protect the data security. In the scheme, symmetric algorithm AES (Advanced Encryption Standard) was used to encrypt data for high efficiency, and asymmetric algorithm RSA (Rivest-Shamir-Adleman) was used to encrypt AES key for identity authentication. The classical algorithm HMAC-SHA1 (Hash Message Authentication Codes-Secure Hash Algorithm 1) was further developed to guarantee the integrity of data. By transplanting the algorithm into STM32 MCU (STMicroelectronics 32 bit Micro Controller Unit) for performance test and using Visual studio 2017 + QT tools to develop the test interface, one optimal operation mode was selected for the scheme. At the same time, the effectiveness of the scheme was verified, and the scheme computing cost depended on the efficiency of encryption and decryption, or signature and verification of the RSA algorithm.

Highlights

  • Non-invasive load monitoring (NILM) was first proposed by Hart in the 1980s, and it only needs to install one monitoring equipment at the power entrance, which can analyze the operation state of all connected electrical devices

  • Aiming at the fact that non-invasive load monitoring (NILM) technology is faced with a greater possibility of power consumption information disclosure, this paper used a cryptographic algorithm to implement the data privacy protection scheme suitable for NILM [21,22]

  • Considering the requirements of efficiency, key management, and integrity of NILM system, a new privacy protection scheme of NILM data based on hybrid cipher algorithm was proposed

Read more

Summary

Introduction

Non-invasive load monitoring (NILM) was first proposed by Hart in the 1980s, and it only needs to install one monitoring equipment at the power entrance, which can analyze the operation state of all connected electrical devices. In reference [20], an NILM system is designed for real-time remote monitoring of load operation status and identification of load types These NILM studies on the communication and information processing do not provide complete research on NILM information security. Aiming at the fact that NILM technology is faced with a greater possibility of power consumption information disclosure, this paper used a cryptographic algorithm to implement the data privacy protection scheme suitable for NILM [21,22]. NILM technology mostly focuses on the research of power load identification and decomposition, without public literature study on the NILM data security method.

Technology of Non-Intrusive Load Monitoring
Non-intrusive
NILM Data Privacy Protection Scheme Based on Hybrid Cipher Algorithm
Hybrid
Electricity
Conclusion
Conclusion encryption
Hybrid Cryptography Scheme Test
Conclusions
Five working modes ofofAES
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call