Privacy Violations in Constrained Micro-grids: Adversarial Cases

被引:1
作者
Ambassa, Pacome L. [1 ]
Kayem, Anne V. D. M. [1 ]
Wolthusen, Stephen D. [2 ,3 ]
Meinel, Christoph [4 ]
机构
[1] Univ Cape Town, Dept Comp Sci, ZA-7701 Cape Town, South Africa
[2] Royal Holloway Univ London, Dept Math, Informat Secur Grp, Egham, Surrey, England
[3] Gjovik Univ Coll, Norwegian Informat Secur Lab, Gjovik, Norway
[4] Hasso Plattner Intitut, Potsdam, Germany
来源
IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016) | 2016年
关键词
Aggregation attack; inference attack; micro-grid; privacy;
D O I
10.1109/WAINA.2016.98
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart micro-grid architectures are small scale electricity provision networks composed of individual electricity providers and consumers. Supporting micro-grids with computationally limited devices, is a cost-effective approach to service provisioning in resource-limited settings. However, the limited availability of real time measurements and the unreliable communication network makes the use of Advanced Metering Infrastructure (AMI) for monitoring and control a challenging problem. Grid operation and stability are therefore reliant on inaccurate and incomplete information. Consequently, data gathering and analytics raise privacy concerns for grid users, which is undesirable. In this paper, we study adversarial scenarios for the privacy violations on micro-grids. We consider two types of privacy threats in constrained micro-grids, namely inferential and aggregation attacks. The reason is that both attacks capture scenarios that can be used to provoke energy theft and destabilize the grid. Grid destabilzation leads to distrust between suppliers and consumers. This work provides a roadmap towards a secure and resilient smart micro-grid energy networks.
引用
收藏
页码:601 / 606
页数:6
相关论文
共 39 条
[1]  
Acs Gergely, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P118, DOI 10.1007/978-3-642-24178-9_9
[2]  
Ambassa P., 2015, IEEE INNOVA IN PRESS
[3]  
[Anonymous], 2013, WORLD EN OUTL 2013
[4]  
[Anonymous], 2011, Tech. rep.
[5]  
Ashby V., 1996, TECH REP, V1/5
[6]  
Barbosa P., 2014, P 29 ANN ACM S APPL, P531
[7]  
Buchmann Erik, 2013, 2013 IEEE 15th Conference on Business Informatics (CBI), P198, DOI 10.1109/CBI.2013.36
[8]   Re-identification of Smart Meter data [J].
Buchmann, Erik ;
Boehm, Klemens ;
Burghardt, Thorben ;
Kessler, Stephan .
PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (04) :653-662
[9]  
Chowdhury S., 2009, IET RENEWABLE ENERGY, V6, P77, DOI DOI 10.1049/PBRN006E
[10]  
Efthymiou C, 2010, INT CONF SMART GRID, P238, DOI 10.1109/SMARTGRID.2010.5622050