Repairing an aggregation-based smart metering system

被引:0
作者
Garra, Ricard [1 ]
Leibenger, Dominik [2 ]
Miret, Josep M. [1 ]
Sebe, Francesc [1 ]
机构
[1] Univ Lleida, Dept Matemat, C Jaume II 69, Lleida 25001, Spain
[2] Saarland Univ, CISPA, POB 15 11 50, D-66041 Saarbrucken, Germany
关键词
Encryption; Homomorphism; Privacy; Smart metering; PRIVACY;
D O I
10.1007/s10207-019-00435-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart meters inform the electricity suppliers about the consumption of their clients in short intervals. Fine-grained electricity consumption information is highly sensitive as it has been proven to permit to infer people's habits, for instance, the time they leave or arrive home. Hence, appropriate measures have to be taken to preserve clients' privacy in smart metering systems. In this paper, we first analyze a recent proposal by Busom et al. (Comput Commun 82:95-101, 2016) and show how a corrupted substation is able to get the individual reading of any arbitrarily chosen smart meter without requiring the collaboration of any other party. After that, we propose a way to fix the mentioned security flaw which is based on adding an additional step in which the substation proves that it has properly followed all the protocol steps. Our solution is analyzed and shown to be computationally feasible for realistic parameter choices.
引用
收藏
页码:637 / 646
页数:10
相关论文
共 23 条
  • [1] [Anonymous], LNCS
  • [2] Bohli J. -M., 2010, P 1 IEEE INT W SMART
  • [3] Efficient smart metering based on homomorphic encryption
    Busom, N.
    Petrlic, R.
    Sebe, F.
    Sorge, C.
    Valls, M.
    [J]. COMPUTER COMMUNICATIONS, 2016, 82 : 95 - 101
  • [4] Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
  • [5] Efthymiou C, 2010, INT CONF SMART GRID, P238, DOI 10.1109/SMARTGRID.2010.5622050
  • [6] Egarter D, 2014, INT CONF SMART GRID, P854, DOI 10.1109/SmartGridComm.2014.7007755
  • [7] Erkin Zekeriya, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P561, DOI 10.1007/978-3-642-31284-7_33
  • [8] Pseudonymous smart metering without a trusted third party
    Finster, Soeren
    Baumgart, Ingmar
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1723 - 1728
  • [9] Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15
  • [10] NONINTRUSIVE APPLIANCE LOAD MONITORING
    HART, GW
    [J]. PROCEEDINGS OF THE IEEE, 1992, 80 (12) : 1870 - 1891