Privacy Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning

被引:16
|
作者
Ibrahem, Mohamed I. [1 ,2 ]
Mahmoud, Mohamed [1 ]
Fouda, Mostafa M. [2 ,3 ]
Alsolami, Fawaz [4 ]
Alasmary, Waleed [5 ]
Shen, Xuemin [6 ]
机构
[1] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[2] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11672, Egypt
[3] Idaho State Univ, Coll Sci & Engn, Dept Elect & Comp Engn, Pocatello, ID 83209 USA
[4] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21341, Saudi Arabia
[5] Umm Al Qura Univ, Dept Comp Engn, Mecca 21421, Saudi Arabia
[6] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cats; Privacy; Power demand; Load modeling; Encryption; Deep learning; Smart grids; Advanced metering infrastructure (AMI) networks; privacy preservation; smart grid; traffic analysis attack;
D O I
10.1109/JIOT.2021.3077897
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In advanced metering infrastructure, smart meters (SMs) send fine-grained power consumption readings periodically to the utility for load monitoring and energy management. Change and transmit (CAT) is an efficient approach to collect these readings, where the readings are not transmitted when there is no enough change in consumption. However, this approach causes a privacy problem, that is, by analyzing the transmission pattern of an SM, sensitive information on the house dwellers can be inferred. For instance, since the transmission pattern is distinguishable when dwellers are on travel, attackers may analyze the pattern to launch a presence-privacy attack (PPA) to infer whether the dwellers are absent from home. In this article, we propose a scheme, called "STDL," for efficient collection of power consumption readings in advanced metering infrastructure (AMI) networks while preserving the consumers' privacy by sending spoofing transmissions using a deep-learning approach. We first use a clustering technique and real power consumption readings to create a data set for transmission patterns using the CAT approach. Then, we train a deep-learning-based attacker model, and our evaluations indicate that the attacker's success rate is about 91%. Finally, we train a deep-learning-based defense model to send spoofing transmissions efficiently to thwart the PPA. Extensive evaluations are conducted, and the results indicate that our scheme can reduce the attacker's success rate to 3.15%, while still achieving high efficiency in terms of the number of readings that should be transmitted. Our measurements indicate that the proposed scheme can increase efficiency by about 41% compared to continuously transmitting readings.
引用
收藏
页码:17131 / 17146
页数:16
相关论文
共 50 条
  • [21] Privacy-preserving Deep-learning Models for Fingerprint Data Using Differential Privacy
    Mohammadi, Maryam
    Sabry, Farida
    Labda, Wadha
    Malluhi, Qutaibah
    PROCEEDINGS OF THE 9TH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2023, 2023, : 45 - 53
  • [22] An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    Zia, Tanveer A.
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (11) : 1205 - 1207
  • [23] An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things
    Jiang, Changsong
    Xu, Chunxiang
    Chen, Kefei
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 389 - 393
  • [24] Efficient Data Collection Scheme for Multi-Modal Underwater Sensor Networks Based on Deep Reinforcement Learning
    Song, Shanshan
    Liu, Jun
    Guo, Jiani
    Lin, Bin
    Ye, Qiang
    Cui, Junhong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (05) : 6558 - 6570
  • [25] Towards Efficient and Privacy-preserving Federated Deep Learning
    Hao, Meng
    Li, Hongwei
    Xu, Guowen
    Liu, Sen
    Yang, Haomiao
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [26] EPDL: An efficient and privacy-preserving deep learning for crowdsensing
    Chang Xu
    Guoxie Jin
    Liehuang Zhu
    Chuan Zhang
    Yu Jia
    Peer-to-Peer Networking and Applications, 2022, 15 : 2529 - 2541
  • [27] EPDL: An efficient and privacy-preserving deep learning for crowdsensing
    Xu, Chang
    Jin, Guoxie
    Zhu, Liehuang
    Zhang, Chuan
    Jia, Yu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (06) : 2529 - 2541
  • [28] Federated learning scheme for privacy-preserving of medical data
    Bo W.
    Hongtao L.
    Jie W.
    Yina G.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (05): : 166 - 177
  • [29] A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation
    Sun, Jinyuan
    Zhu, Xiaoyan
    Fang, Yuguang
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [30] EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks
    Zhao, Baokang
    Su, Xiangyu
    Su, Jinshu
    Song, Ziming
    Sun, Yipin
    Tao, Jing
    Tang, Yong
    Chen, Shuhui
    Zhao, Guohong
    Chen, Yijiao
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, VOLS I-III, 2010, 1281 : 306 - 309