A secure ECC-based privacy preserving data aggregation scheme for smart grids

被引:47
作者
Vahedi, Erfaneh [1 ]
Bayat, Majid [2 ]
Pakravan, Mohammad Reza [3 ]
Aref, Mohammad Reza [3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, ISSL, Tehran, Iran
[2] Shahed Univ, Dept Comp Engn, Tehran, Iran
[3] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
关键词
Smart grid; Privacy preserving; Confidentiality; Data aggregation; Authentication;
D O I
10.1016/j.comnet.2017.08.025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers' privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users' privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don't usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time prevents smart meters from performing their other duties, such as managing the home area network. In this paper, we propose an efficient privacy preserving data aggregation scheme, based on elliptic curves. In our scheme, each smart meter signs its encrypted data and sends it to the aggregator. After receiving the data, the aggregator verifies the incoming messages and aggregates them, without the need to decrypt the data received from each smart meter. The aggregator signs the aggregated messages and sends it to the operation center. At the end, the smart meters' data are obtained and verified by the operation center. In addition to providing efficient computation cost, for the users, our protocol also satisfies the security requirements of smart grid data aggregation schemes. We provide security analysis of the proposed scheme as well as comparisons to show the efficiency of our scheme on computation and communication overheads. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:28 / 36
页数:9
相关论文
共 24 条
  • [1] Alharbi K, 2012, INT CONF WIRE COMMUN
  • [2] [Anonymous], 7628 NISTIR
  • [3] [Anonymous], 2015, MCF51EM MCF51EM256 3
  • [4] [Anonymous], 2017, FUTURE GENERATION CO
  • [5] Preserving privacy and efficiency in data communication and aggregation for AMI network
    Bae, Mungyu
    Kim, Kangho
    Kim, Hwangnam
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 : 333 - 344
  • [6] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [7] BONEH D, 2005, 2 THEOR CRYPT C, V3378, P325
  • [8] Chen L., 2014, PEER TO PEER NETW AP
  • [9] Privacy-Preserving Data Aggregation in Smart Metering Systems
    Erkin, Zekeriya
    Ramon Troncoso-Pastoriza, Juan
    Lagendijk, R. L.
    Perez-Gonzalez, Fernando
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 75 - 86
  • [10] Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
    Fan, Chun-I
    Huang, Shi-Yuan
    Lai, Yih-Loong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) : 666 - 675