Abstract
The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS) matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.
Highlights
The concept of smart grid gained tremendous attention among researchers and utility providers in recent years
In order to decrypt a data block encrypted by smart meters with an access structure, data consumers need to process a proper set of secret keys
We focus on AttrGen() and we can generalize the performance of TRegister() from Table 5
Summary
Chunqiang Hu ,1,2,3 Hang Liu, Liran Ma, Yan Huo ,5 Arwa Alrawais, Xiuhua Li, Hong Li ,8 and Qingyu Xiong 1,2. The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. We present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS) matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have