Elliptic Curve-Based Secure Multidimensional Aggregation for Smart Grid Communications

被引:44
作者
Boudia, Omar Rafik Merad [1 ]
Senouci, Sidi Mohammed [2 ]
Feham, Mohammed [1 ]
机构
[1] Univ Tlemcen, STIC Lab, Tilimsen 13000, Algeria
[2] Univ Burgundy, Drive Lab, F-58000 Nevers, France
关键词
Smart grid; privacy-preserving; elliptic curve cryptography; data aggregation; homomorphic encryption; SCHEME; COMPUTATION;
D O I
10.1109/JSEN.2017.2720458
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In smart grid, data aggregation is considered as an essential paradigm in assessing information about current energy usage. To achieve the privacy-preserving goal, several homomorphic-based solutions have been proposed. However, these solutions either consider one-dimensional information or use costly pairing computation in order to ensure source authentication. In fact, smart grid data are likely to be multidimensional (e.g., time, purpose, and so on) for more accurate control. In addition, the aggregation node in smart grid needs to verify data that come from several smart meters in a residential area; hence, the verification must be cost-efficient. In this paper, we propose a scheme that considers multidimensional aggregation with privacy preserving and an efficient verification of smart grid data. The proposal is based on elliptic curve cryptography along with homomorphic encryption and without pairings. The performance analysis shows the efficiency of the scheme for smart grid communications in comparison with existing schemes. For instance, we show that, when an aggregator node is responsible of 600 smart meters, it spends approximately 14 s to verify the data in pairing-based schemes, while only 0.3 s is needed for verification within the proposed scheme.
引用
收藏
页码:7750 / 7757
页数:8
相关论文
共 26 条
  • [1] Antipa A, 2006, LECT NOTES COMPUT SC, V3897, P307
  • [2] Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security
    Bellare, Mihir
    Boldyreva, Alexandra
    Kurosawa, Kaoru
    Staddon, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (11) : 3927 - 3943
  • [3] A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
    Boudia, Omar Rafik Merad
    Senouci, Sidi Mohammed
    Feham, Mohammed
    [J]. AD HOC NETWORKS, 2015, 32 : 98 - 113
  • [4] Cao Z., 2015, IACR CRYPTOL EPRINT, V2015, P84
  • [5] Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks
    Castelluccia, Claude
    Chan, Aldar C-F
    Mykletun, Einar
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) : 1 - 36
  • [6] Certivox, 2014, MULT INT RAT ARTH C
  • [7] False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey
    Deng, Ruilong
    Xiao, Gaoxi
    Lu, Rongxing
    Liang, Hao
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (02) : 411 - 423
  • [8] Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
    Fan, Chun-I
    Huang, Shi-Yuan
    Lai, Yih-Loong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) : 666 - 675
  • [9] A Survey of Homomorphic Encryption for Nonspecialists
    Fontaine, Caroline
    Galand, Fabien
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01):
  • [10] A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities
    Fu, Shuai
    Ma, Jianfeng
    Li, Hongtao
    Jiang, Qi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2779 - 2788