Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks

被引:0
|
作者
Saxena, Neetesh [1 ]
Choi, Bong Jun [2 ,3 ]
Grijalva, Santiago [4 ]
机构
[1] Bournemouth Univ, Dept Comp & Informat, Poole, Dorset, England
[2] State Univ New York, Dept Comp Sci, Incheon, South Korea
[3] SUNY Stony Brook, Stony Brook, NY 11794 USA
[4] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
关键词
SMART; AGGREGATION; SCHEME;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The industry has recognized the risk of cyberattacks targeting to the advanced metering infrastructure (AMI). A potential adversary can modify or inject malicious data, and can perform security attacks over an insecure network. Also, the network operators at intermediate devices can reveal private information, such as the identity of the individual home and metering data units, to the third-party. Existing schemes generate large overheads and also do not ensure the secure delivery of correct and accurate metering data to all AMI entities, including data concentrator at the utility and the billing center. In this paper, we propose a secure and privacy-preserving data aggregation scheme based on additive homomorphic encryption and proxy re-encryption operations in the Paillier cryptosystem. The scheme can aggregate metering data without revealing the actual individual information (identity and energy usage) to intermediate entities or to any third-party, hence, resolves identity and related data theft attacks. Moreover, we propose a scalable algorithm to detect malicious metering data injected by the adversary. The proposed scheme protects the system against man-in-the-middle, replay, and impersonation attacks, and also maintains message integrity and undeniability. Our performance analysis shows that the scheme generates manageable computation, communication, and storage overheads and has efficient execution time suitable for AMI networks.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] A realistic performance evaluation of privacy-preserving protocols for smart grid AMI networks
    Tonyali, Samet
    Munoz, Ruben
    Akkaya, Kemal
    Ozgur, Utku
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 119 : 24 - 41
  • [42] Secure Data Storage Structure and Privacy-Preserving Mobile Search Scheme for Public Safety Networks
    Ghafghazi, Hamidreza
    ElMougy, Amr
    Mouftah, Hussein T.
    Adams, Carlisle
    [J]. 2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [43] High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks
    Liu, Chen-Xu
    Liu, Yun
    Zhang, Zhen-Jiang
    Cheng, Zi-Yao
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (03) : 380 - 394
  • [44] Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities
    Huang, Qinlong
    Wang, Licheng
    Yang, Yixian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [45] Secure Compression of Privacy-Preserving Witnesses in Vehicular Ad Hoc Networks
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Domingo-Ferrer, Josep
    [J]. 2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 541 - 547
  • [46] Special Issue on Secure and privacy-preserving Autonomous Vehicle Networks (AVNs)
    Ho, Pin-Han
    Peng, Limei
    Jiang, Xiaohong
    Haque, Anwar
    [J]. VEHICULAR COMMUNICATIONS, 2018, 11 : 32 - 32
  • [47] Quantum privacy-preserving service for secure lane change in vehicular networks
    Rahmani, Zeinab
    Barbosa, Luis S.
    Pinto, Armando N.
    [J]. IET QUANTUM COMMUNICATION, 2023, 4 (03): : 103 - 111
  • [48] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jian-Feng
    Sun, Cong
    Xi, Ning
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 943 - 960
  • [49] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jianfeng
    Sun, Cong
    Wei, Dawei
    Xi, Ning
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 5 - 10
  • [50] An Analysis of Query Forwarding Strategies for Secure and Privacy-Preserving Social Networks
    Duerr, Michael
    Maier, Marco
    Wiesner, Kevin
    [J]. 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 535 - 542