An Identity-Based Data Aggregation Protocol for the Smart Grid

被引:64
作者
Wang, Zhiwei [1 ,2 ,3 ,4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Jiangsu, Peoples R China
[2] Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Jiangsu, Peoples R China
[3] Guangzhou Univ, Sch Math & Informat Sci, Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
[4] Shanghai Key Lab Informat Secur Integrated Manage, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Data aggregation protocol; Edison platform; identity based; smart grid; TO-MACHINE COMMUNICATIONS; SCHEME; POWER;
D O I
10.1109/TII.2017.2705218
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The smart grid significantly improves the reliability, efficiency, security, and sustainability of electricity services. It plays an important role in modern energy infrastructure. A drawback of this new technique, however, is that the fine-grained metering data may leak private customer information. Thus, various public-key based data aggregation protocols for privacy protection have been proposed. However, the National Institute of Standards and Technology has recommended not using public-key based cryptography in the smart grid, since maintaining the public-key infrastructure is a heavy cost. In this paper, we propose an identity-based data aggregation protocol for the smart grid, which cannot only prevent unauthorized reading and fine-grained analyzing but can also protect against unintentional errors and maliciously altered messages. The basic building block of our protocol is an identity-based encryption and signature scheme in which an identity-based encryption scheme is combined with an identity-based signature scheme. They share the same private/public parameters, which greatly reduces the complexity of the protocol in the smart grid. Security analysis demonstrates the effectiveness of our protocol in the context of six typical attacks against the smart grid. A prototype implementation based on the Intel Edison platform shows that our protocol is efficient enough for physically constrained smart grid operators, such as smart meters.
引用
收藏
页码:2428 / 2435
页数:8
相关论文
共 30 条
[1]  
[Anonymous], 1999, COMPUTING DISCRETE L
[2]  
[Anonymous], 2009, 7628 NISTIR
[3]   Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid" [J].
Bao, Haiyong ;
Lu, Rongxing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (01) :2-5
[4]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[5]   The Fair Allocation of Power to Air Conditioners on a Smart Grid [J].
Chen, Yu-Wen ;
Chen, Xiuxing ;
Maxemchuk, Nicholas .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (04) :2188-2195
[6]   Toward Intelligent Machine-to-Machine Communications in Smart Grid [J].
Fadlullah, Zubair Md. ;
Fouda, Mostafa M. ;
Kato, Nei ;
Takeuchi, Akira ;
Iwasaki, Noboru ;
Nozaki, Yousuke .
IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (04) :60-65
[7]   Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid [J].
Fan, Chun-I ;
Huang, Shi-Yuan ;
Lai, Yih-Loong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) :666-675
[8]   The Path of the Smart Grid [J].
Farhangi, Hassan .
IEEE POWER & ENERGY MAGAZINE, 2010, 8 (01) :18-28
[9]   Efficient multistage secret sharing scheme using bilinear map [J].
Fatemi, Mitra ;
Ghasemi, Reza ;
Eghlidos, Taraneh ;
Aref, Mohammad Reza .
IET INFORMATION SECURITY, 2014, 8 (04) :224-229
[10]  
Galindo D, 2009, LECT NOTES COMPUT SC, V5580, P135, DOI 10.1007/978-3-642-02384-2_9