Privacy Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning

被引:19
|
作者
Ibrahem, Mohamed I. [1 ,2 ]
Mahmoud, Mohamed [1 ]
Fouda, Mostafa M. [2 ,3 ]
Alsolami, Fawaz [4 ]
Alasmary, Waleed [5 ]
Shen, Xuemin [6 ]
机构
[1] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[2] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11672, Egypt
[3] Idaho State Univ, Coll Sci & Engn, Dept Elect & Comp Engn, Pocatello, ID 83209 USA
[4] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21341, Saudi Arabia
[5] Umm Al Qura Univ, Dept Comp Engn, Mecca 21421, Saudi Arabia
[6] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cats; Privacy; Power demand; Load modeling; Encryption; Deep learning; Smart grids; Advanced metering infrastructure (AMI) networks; privacy preservation; smart grid; traffic analysis attack;
D O I
10.1109/JIOT.2021.3077897
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In advanced metering infrastructure, smart meters (SMs) send fine-grained power consumption readings periodically to the utility for load monitoring and energy management. Change and transmit (CAT) is an efficient approach to collect these readings, where the readings are not transmitted when there is no enough change in consumption. However, this approach causes a privacy problem, that is, by analyzing the transmission pattern of an SM, sensitive information on the house dwellers can be inferred. For instance, since the transmission pattern is distinguishable when dwellers are on travel, attackers may analyze the pattern to launch a presence-privacy attack (PPA) to infer whether the dwellers are absent from home. In this article, we propose a scheme, called "STDL," for efficient collection of power consumption readings in advanced metering infrastructure (AMI) networks while preserving the consumers' privacy by sending spoofing transmissions using a deep-learning approach. We first use a clustering technique and real power consumption readings to create a data set for transmission patterns using the CAT approach. Then, we train a deep-learning-based attacker model, and our evaluations indicate that the attacker's success rate is about 91%. Finally, we train a deep-learning-based defense model to send spoofing transmissions efficiently to thwart the PPA. Extensive evaluations are conducted, and the results indicate that our scheme can reduce the attacker's success rate to 3.15%, while still achieving high efficiency in terms of the number of readings that should be transmitted. Our measurements indicate that the proposed scheme can increase efficiency by about 41% compared to continuously transmitting readings.
引用
收藏
页码:17131 / 17146
页数:16
相关论文
共 50 条
  • [1] Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks
    Mohammed, Hawzhin
    Tonyali, Samet
    Rabieh, Khaled
    Mahmoud, Mohamed
    Akkaya, Kemal
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [2] MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks
    Alsharif, Ahmad
    Nabil, Mahmoud
    Sherif, Ahmed
    Mahmoud, Mohamed
    Song, Min
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10363 - 10374
  • [3] EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks
    Alsharif, Ahmad
    Nabil, Mahmoud
    Mahmoud, Mohamed M. E. A.
    Abdallah, Mohamed
    IEEE ACCESS, 2019, 7 : 27829 - 27845
  • [4] EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks
    Alsharif, Ahmad
    Nabil, Mahmoud
    Tonyali, Samet
    Mohammed, Hawzhin
    Mahmoud, Mohamed
    Akkaya, Kemal
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 3309 - 3321
  • [5] Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks
    Ibrahem, Mohamed I.
    Nabil, Mahmoud
    Fouda, Mostafa M.
    Mahmoud, Mohamed M. E. A.
    Alasmary, Waleed
    Alsolami, Fawaz
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02): : 1243 - 1258
  • [6] Privacy Preserving of Shared Data in Deep Learning
    Al-Qerem, Ahmad
    Al Nagi, Eman
    2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2019, : 230 - 234
  • [7] MPP-MDA: Multifunctional Privacy-Preserving Multisubset Data Aggregation for AMI Networks
    Sun, Dan
    Zhao, Shuai
    Tao, Wanqiong
    Gu, Mianxue
    Lin, Jianhong
    Han, Song
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40026 - 40040
  • [8] Privacy Preserving Synthetic Data Release Using Deep Learning
    Abay, Nazmiye Ceren
    Zhou, Yan
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    Sweeney, Latanya
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2018, PT I, 2019, 11051 : 510 - 526
  • [9] EPPDA: An Efficient Privacy-Preserving Data Aggregation Federated Learning Scheme
    Song, Jingcheng
    Wang, Weizheng
    Gadekallu, Thippa Reddy
    Cao, Jianyu
    Liu, Yining
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 3047 - 3057
  • [10] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning
    Jiang, Yili
    Zhang, Kuan
    Qian, Yi
    Zhou, Liang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2227 - 2240