Secure and Privacy-Preserving AMI-Utility Communications via LTE-A Networks

被引:0
|
作者
Haddad, Zaher [1 ,2 ,3 ]
Mahmoud, Mohamed [1 ]
Taha, Sanaa [2 ,3 ]
Saroit, Imane Aly [2 ,3 ]
机构
[1] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[2] Cairo Univ, Dept Informat Technol, Cairo, Egypt
[3] Alaqsa Univ, Dept Elect & Comp Engn, Gaza, Israel
关键词
Smart grid AMI; LTE security and privacy preservation; Data Aggregation; Key Management; PROTOCOL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In smart grid Automatic Metering Infrastructure (AMI) networks, smart meters should send consumption data to the utility company (UC) for grid state estimation. Creating a new infrastructure to support this communication is costly and may take long time which may delay the deployment of the AMI networks. The Long Term Evolution-Advanced (LTE-A) networks can be used to support the communications between the AMI networks and the UC. However, since these networks are owned and operated by private companies, the UC cannot ensure the security and privacy of the communications. Moreover, the data sent by the AMI networks have different characteristics and requirements than most of the existing applications in LTE-A networks. For example, there is a strict data delay requirement, data is short and transmitted every short time, data is sent at known/predefined time slots, and there is no handover. In this paper, we study enabling secure and privacy preserving AMI-UC communications via LTE-A networks. The proposed scheme aims to achieve essential security requirements such as authentication, confidentiality, key agreement and data integrity without trusting the LTE-A networks. Furthermore, an aggregation scheme is used to protect the privacy of the electricity consumers. It can also reduce the amount of required bandwidth which can reduce the communication cost. Our evaluations have demonstrated that our proposals are secure and require low communication/computational overhead.
引用
收藏
页码:748 / 755
页数:8
相关论文
共 50 条
  • [1] A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
    Garima Singh
    Deepti Shrimankar
    [J]. Sādhanā, 2018, 43
  • [2] A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
    Singh, Garima
    Shrimankar, Deepti
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (08):
  • [3] Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks
    Saxena, Neetesh
    Choi, Bong Jun
    Grijalva, Santiago
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [4] A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks
    Fu, Anmin
    Song, Jianye
    Li, Shuai
    Zhang, Gongxuan
    Zhang, Yuqing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2002 - 2014
  • [5] Privacy-Preserving Intra-MME Group Handover Via MRN in LTE-A Networks for Repeated Trips
    Haddad, Zaher
    Alsharif, Ahmad
    Sherif, Ahmed
    Mahmoud, Mohamed
    [J]. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [6] Secure and privacy-preserving, timed vehicular communications
    Burmester, Mike
    Magkos, Emmanouil
    Chrissikopoulos, Vassilis
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 10 (04) : 219 - 229
  • [7] Secure and Privacy-Preserving Federated Learning via Co-Utility
    Domingo-Ferrer, Josep
    Blanco-Justicia, Alberto
    Manjon, Jesus
    Sanchez, David
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05): : 3988 - 4000
  • [8] GSTS: A secure and privacy-preserving protocol for vehicular communications
    Lin, Xiaodong
    Sun, Xiaoting
    Ho, Pin-Han
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (06) : 3442 - 3456
  • [9] Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications
    Guo, Song
    Zeng, Deze
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (11) : 2794 - 2803
  • [10] Secure and privacy-preserving structure in opportunistic networks
    Rashidibajgan, Samaneh
    Hupperich, Thomas
    Doss, Robin
    Foerster, Anna
    [J]. COMPUTERS & SECURITY, 2021, 104