Secure and Privacy-Preserving AMI-Utility Communications via LTE-A Networks

被引:0
|
作者
Haddad, Zaher [1 ,2 ,3 ]
Mahmoud, Mohamed [1 ]
Taha, Sanaa [2 ,3 ]
Saroit, Imane Aly [2 ,3 ]
机构
[1] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[2] Cairo Univ, Dept Informat Technol, Cairo, Egypt
[3] Alaqsa Univ, Dept Elect & Comp Engn, Gaza, Israel
关键词
Smart grid AMI; LTE security and privacy preservation; Data Aggregation; Key Management; PROTOCOL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In smart grid Automatic Metering Infrastructure (AMI) networks, smart meters should send consumption data to the utility company (UC) for grid state estimation. Creating a new infrastructure to support this communication is costly and may take long time which may delay the deployment of the AMI networks. The Long Term Evolution-Advanced (LTE-A) networks can be used to support the communications between the AMI networks and the UC. However, since these networks are owned and operated by private companies, the UC cannot ensure the security and privacy of the communications. Moreover, the data sent by the AMI networks have different characteristics and requirements than most of the existing applications in LTE-A networks. For example, there is a strict data delay requirement, data is short and transmitted every short time, data is sent at known/predefined time slots, and there is no handover. In this paper, we study enabling secure and privacy preserving AMI-UC communications via LTE-A networks. The proposed scheme aims to achieve essential security requirements such as authentication, confidentiality, key agreement and data integrity without trusting the LTE-A networks. Furthermore, an aggregation scheme is used to protect the privacy of the electricity consumers. It can also reduce the amount of required bandwidth which can reduce the communication cost. Our evaluations have demonstrated that our proposals are secure and require low communication/computational overhead.
引用
收藏
页码:748 / 755
页数:8
相关论文
共 50 条
  • [31] A realistic performance evaluation of privacy-preserving protocols for smart grid AMI networks
    Tonyali, Samet
    Munoz, Ruben
    Akkaya, Kemal
    Ozgur, Utku
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 119 : 24 - 41
  • [32] Privacy-preserving authentication framework using bloom filter for secure vehicular communications
    Malhi, Avleen
    Batra, Shalini
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (04) : 433 - 453
  • [33] A Lightweight Privacy-Preserving Protocol using Chameleon Hashing for Secure Vehicular Communications
    Shen, An-Ni
    Guo, Song
    Zeng, Deze
    Guizani, Mohsen
    [J]. 2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [34] MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks
    Alsharif, Ahmad
    Nabil, Mahmoud
    Sherif, Ahmed
    Mahmoud, Mohamed
    Song, Min
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10363 - 10374
  • [35] Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks
    Mohammed, Hawzhin
    Tonyali, Samet
    Rabieh, Khaled
    Mahmoud, Mohamed
    Akkaya, Kemal
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [36] Secure Compression of Privacy-Preserving Witnesses in Vehicular Ad Hoc Networks
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Domingo-Ferrer, Josep
    [J]. 2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 541 - 547
  • [37] Special Issue on Secure and privacy-preserving Autonomous Vehicle Networks (AVNs)
    Ho, Pin-Han
    Peng, Limei
    Jiang, Xiaohong
    Haque, Anwar
    [J]. VEHICULAR COMMUNICATIONS, 2018, 11 : 32 - 32
  • [38] Quantum privacy-preserving service for secure lane change in vehicular networks
    Rahmani, Zeinab
    Barbosa, Luis S.
    Pinto, Armando N.
    [J]. IET QUANTUM COMMUNICATION, 2023, 4 (03): : 103 - 111
  • [39] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jian-Feng
    Sun, Cong
    Xi, Ning
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 943 - 960
  • [40] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jianfeng
    Sun, Cong
    Wei, Dawei
    Xi, Ning
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 5 - 10