Privacy Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning

被引:22
作者
Ibrahem, Mohamed I. [1 ,2 ]
Mahmoud, Mohamed [1 ]
Fouda, Mostafa M. [2 ,3 ]
Alsolami, Fawaz [4 ]
Alasmary, Waleed [5 ]
Shen, Xuemin [6 ]
机构
[1] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[2] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11672, Egypt
[3] Idaho State Univ, Coll Sci & Engn, Dept Elect & Comp Engn, Pocatello, ID 83209 USA
[4] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21341, Saudi Arabia
[5] Umm Al Qura Univ, Dept Comp Engn, Mecca 21421, Saudi Arabia
[6] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cats; Privacy; Power demand; Load modeling; Encryption; Deep learning; Smart grids; Advanced metering infrastructure (AMI) networks; privacy preservation; smart grid; traffic analysis attack;
D O I
10.1109/JIOT.2021.3077897
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In advanced metering infrastructure, smart meters (SMs) send fine-grained power consumption readings periodically to the utility for load monitoring and energy management. Change and transmit (CAT) is an efficient approach to collect these readings, where the readings are not transmitted when there is no enough change in consumption. However, this approach causes a privacy problem, that is, by analyzing the transmission pattern of an SM, sensitive information on the house dwellers can be inferred. For instance, since the transmission pattern is distinguishable when dwellers are on travel, attackers may analyze the pattern to launch a presence-privacy attack (PPA) to infer whether the dwellers are absent from home. In this article, we propose a scheme, called "STDL," for efficient collection of power consumption readings in advanced metering infrastructure (AMI) networks while preserving the consumers' privacy by sending spoofing transmissions using a deep-learning approach. We first use a clustering technique and real power consumption readings to create a data set for transmission patterns using the CAT approach. Then, we train a deep-learning-based attacker model, and our evaluations indicate that the attacker's success rate is about 91%. Finally, we train a deep-learning-based defense model to send spoofing transmissions efficiently to thwart the PPA. Extensive evaluations are conducted, and the results indicate that our scheme can reduce the attacker's success rate to 3.15%, while still achieving high efficiency in terms of the number of readings that should be transmitted. Our measurements indicate that the proposed scheme can increase efficiency by about 41% compared to continuously transmitting readings.
引用
收藏
页码:17131 / 17146
页数:16
相关论文
共 41 条
[1]  
Abadi Martin, 2016, ARXIV160304467
[2]   A Review of Smart Homes-Past, Present, and Future [J].
Alam, Muhammad Raisul ;
Reaz, Mamun Bin Ibne ;
Ali, Mohd Alauddin Mohd .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (06) :1190-1203
[3]  
Alsemairi S, 2015, INT WIREL COMMUN, P337, DOI 10.1109/IWCMC.2015.7289106
[4]  
[Anonymous], 2015, P INT C LEARN REPR I
[5]   Is disaggregation the holy grail of energy efficiency? The case of electricity [J].
Armel, K. Carrie ;
Gupta, Abhay ;
Shrimali, Gireesh ;
Albert, Adrian .
ENERGY POLICY, 2013, 52 :213-234
[6]  
Bergstra James, 2015, Computational Science and Discovery, V8, DOI 10.1088/1749-4699/8/1/014008
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]  
Chaturvedi Soni, 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC), P425, DOI 10.1109/ICESC.2014.83
[9]  
Chollet F., 2015, KERAS 20 COMPUTER SO
[10]  
Dash Rajashree., 2010, INT J ENG SCI TECHNO, V2, P59, DOI DOI 10.4314/IJEST.V2I2.59139