An Identity-Based Data Aggregation Protocol for the Smart Grid

被引:60
|
作者
Wang, Zhiwei [1 ,2 ,3 ,4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Jiangsu, Peoples R China
[2] Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Jiangsu, Peoples R China
[3] Guangzhou Univ, Sch Math & Informat Sci, Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
[4] Shanghai Key Lab Informat Secur Integrated Manage, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Data aggregation protocol; Edison platform; identity based; smart grid; TO-MACHINE COMMUNICATIONS; SCHEME; POWER;
D O I
10.1109/TII.2017.2705218
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The smart grid significantly improves the reliability, efficiency, security, and sustainability of electricity services. It plays an important role in modern energy infrastructure. A drawback of this new technique, however, is that the fine-grained metering data may leak private customer information. Thus, various public-key based data aggregation protocols for privacy protection have been proposed. However, the National Institute of Standards and Technology has recommended not using public-key based cryptography in the smart grid, since maintaining the public-key infrastructure is a heavy cost. In this paper, we propose an identity-based data aggregation protocol for the smart grid, which cannot only prevent unauthorized reading and fine-grained analyzing but can also protect against unintentional errors and maliciously altered messages. The basic building block of our protocol is an identity-based encryption and signature scheme in which an identity-based encryption scheme is combined with an identity-based signature scheme. They share the same private/public parameters, which greatly reduces the complexity of the protocol in the smart grid. Security analysis demonstrates the effectiveness of our protocol in the context of six typical attacks against the smart grid. A prototype implementation based on the Intel Edison platform shows that our protocol is efficient enough for physically constrained smart grid operators, such as smart meters.
引用
收藏
页码:2428 / 2435
页数:8
相关论文
共 50 条
  • [21] A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid
    Mohammadali, Amin
    Haghighi, Mohammad Sayad
    Tadayon, Mohammad Hesam
    Mohammadi-Nodooshan, Alireza
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 2834 - 2842
  • [22] An Identity-Based Encryption Scheme with Performance Optimization for Privacy Preservation in Smart Grid Communication
    Baloglu, Ulas Baran
    Demir, Yakup
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL TELECOMMUNICATIONS (ICDT 2017), 2017, : 18 - 21
  • [23] Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
    Hunag, Cheng-Ta
    Yang, Cheng-Yu
    Weng, Chi-Yao
    Chen, Yen -Wen
    Wang, Shiuh-Jeng
    [J]. 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 327 - 331
  • [24] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    [J]. 2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [25] Deterministic identity-based signatures for partial aggregation
    Herranz, J
    [J]. COMPUTER JOURNAL, 2006, 49 (03): : 322 - 330
  • [26] An identity-based grid security infrastructure model
    Huang, XQ
    Chen, L
    Huang, LP
    Li, ML
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 314 - 325
  • [27] An identity-based model for grid security infrastructure
    Huang, XQ
    Chen, L
    Huang, LP
    Li, ML
    [J]. ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 258 - 266
  • [28] An Identity-based Restricted Deniable Authentication Protocol
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478
  • [29] An Identity-Based Authentication Protocol for Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    [J]. 2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP 2014), 2014,
  • [30] An Improvement of an Identity-Based Key Issuing Protocol
    Shi, Weimin
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4518 - 4521