Abstract

We propose a privacy-preserving aggregation scheme under a malicious attacks model, in which the aggregator may forge householders’ billing, or a neighborhood aggregation data, or collude with compromised smart meters to reveal object householders’ fine-grained data. The scheme can generate spatially total consumption in a neighborhood at a timestamp and temporally a householder’s billing in a series of timestamps. The proposed encryption scheme of imposing masking keys from pseudo-random function (PRF) between pairwise nodes on partitioned data ensures the confidentiality of individual fine-grained data, and fends off the power theft of n-2 smart meters at most (n is the group size of smart meters in a neighborhood). Compared with the afore-mentioned methods of public key encryption in most related literatures, the simple and lightweight combination of PRF with modular addition not only is customized to the specific needs of smart grid, but also facilitates any node’s verification for local aggregation or global aggregation with low cost overhead. The publicly verifiable scenarios are very important for self-sufficient, remote places, which can only afford renewable energy and can manage its own energy price according to the energy consumption circumstance in a neighborhood.

Highlights

  • With the development of Advanced Metering Infrastructure (AMI), Smart Metering as an important research subject in Smart Grid (SG) plays an increasingly important role and is closely associated with people’s daily life [1,2]

  • In SG systems, one of the challenges faced by power big data is how to design one aggregation mechanism to balance the use of power data and individual privacy protection [2]

  • There are four types of actors involved in the meter data reporting process: the ith user, other users in the same neighborhood (BAN), the GW, and the control center (CC)

Read more

Summary

Introduction

With the development of Advanced Metering Infrastructure (AMI), Smart Metering as an important research subject in Smart Grid (SG) plays an increasingly important role and is closely associated with people’s daily life [1,2]. For resisting against internal attackers possessing private keys, Xiao [8] introduced a spatial and temporal aggregation and authentication scheme by randomizing Paillier encryption with Lagrange interpolation. Their protocol requires O(n2 ) bytes of inter-action between the individual meters as well as relatively expensive cryptography on the meters (public key encryption). The proposed encryption scheme minimizes the computation and communication overhead by replacing the costly public key cryptography adopted in most literatures with a combination of modular addition and PRF.

Preliminaries and Models
Additively Homomorphic Encryption Based on The Keystream
Pseudo-Random Keystream Generator—RC4
System Model
Communication Model
Data Model
Security Requirement and Attack Model
Initializing Pairwise Number k and Session Key
Modular Addition
Encryption and Aggregation
Communication betweenthe thepairwise pairwise nodes
Correctness Analysis
Temporal Aggregation
Security Proof
Security Analysis
Publicly Verifiable Property
Temporal Verification
Performance Evaluation
Computation Overhead
Communication Overhead
Spatial Communication Overhead Per Node
Temporal Communication Overhead Per Node
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call