Secure and privacy-preserving information aggregation for smart grids

被引:72
作者
Li F. [1 ]
Luo B. [2 ]
Liu P. [1 ]
机构
[1] College of IST, Pennsylvania State University, University Park
[2] Department of EECS, University of Kansas, Lawrence
关键词
Information aggregation; Privacy-preserving; Security; Smart grids;
D O I
10.1504/IJSN.2011.039631
中图分类号
学科分类号
摘要
In this paper, we present a distributed incremental data aggregation approach, in which data aggregation is performed at all smart metres involved in routing the data from the source metre to the collector unit. With a carefully constructed aggregation tree, the aggregation route covers the entire local neighbourhood or any arbitrary set of designated nodes with minimum overhead. To protect user privacy, homomorphic encryption is used to secure the data enroute. Therefore, all the metres participate in the aggregation, without seeing any intermediate or final result. In this way, our approach supports efficient data aggregation in smart grids, while fully protecting user privacy. This approach is especially suitable for smart grids with repetitive routine data aggregation tasks. Copyright © 2011 Inderscience Enterprises Ltd.
引用
收藏
页码:28 / 39
页数:11
相关论文
共 43 条
[1]  
Aggarwal A., Kunta S., Verma P.K., A proposed communications infrastructure for the smart grid, Innovative Smart Grid Technologies, pp. 1-5, (2010)
[2]  
Boneh D., Goh E.-J., Nissim K., Evaluating 2-DNF formulas on ciphertexts, Lecture Notes in Computer Science, 3378, pp. 325-341, (2005)
[3]  
Bose A., Smart transmission grid applications and their supporting infrastructure, IEEE Transactions on Smart Grid, 1, 1, pp. 11-19, (2010)
[4]  
Brown R.E., Impact of smart grid on distribution system design, IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1-4, (2008)
[5]  
Castelluccia C., Mykletun E., Tsudik G., Efficient aggregation of encrypted data in wireless sensor networks, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services, pp. 109-117, (2005)
[6]  
Chan H., Perrig A., Song D., Secure hierarchical in-network aggregation in sensor networks, Proceedings of the ACM Conference on Computer and Communications Security, pp. 278-287, (2006)
[7]  
Frikken K.B., Dougherty IV J.A., An efficient integrity-preserving scheme for hierarchical sensor aggregation, Proceedings of the First ACM Conference on Wireless Network Security, pp. 68-76, (2008)
[8]  
El Gamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, Proceedings of CRYPTO 84 on Advances in Cryptology, pp. 10-18, (1985)
[9]  
Girao J., Westhoff D., Cda: Concealed data aggregation for reverse multicast traffic in wireless sensor networks, IEEE International Conference on Communications (ICC '05), (2005)
[10]  
Goldreich O., Foundations of Cryptography: Volume II (Basic Applications), (2004)