Privacy-preserving data aggregation scheme against internal attackers in smart grids

被引:95
作者
He, Debiao [1 ]
Kumar, Neeraj [2 ]
Lee, Jong-Hyouk [3 ]
机构
[1] Wuhan Univ, Sch Comp, State Key Lab Software Engn, Wuhan 430072, Peoples R China
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] Sangmyung Univ, Dept Comp Sci & Engn, Cheonan, South Korea
基金
新加坡国家研究基金会;
关键词
Smart grid; Data aggregation; Privacy; Internal attacker; SCALABLE KEY MANAGEMENT; USER AUTHENTICATION; AGREEMENT PROTOCOL; EXCHANGE PROTOCOL; SECURE; INFRASTRUCTURE; IDENTITY;
D O I
10.1007/s11276-015-0983-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With fast advancements of communication, systems and information technologies, a smart grid (SG) could bring much convenience to users because it could provide a reliable and efficient energy service. The data aggregation (DA) scheme for the SG plays an important role in evaluating information about current energy usage. To achieve the goal of preserving users' privacy, many DA schemes for the SG have been proposed in last decade. However, how to withstand attacks of internal adversaries is not considered in those schemes. To enhance preservation of privacy, Fan et al. proposed a DA scheme for the SG against internal adversaries. In Fan et al.'s DA scheme, blinding factors are used in evaluating information about current energy usage and the aggregator cannot get the consumption information of any individual user. Fan et al. demonstrated that their scheme was secure against various attacks. However, we find that their scheme suffers from the key leakage problem, i.e., the adversary could extract the user's private key through the public information. To overcome such serious weakness, this paper proposes an efficient and privacy-preserving DA scheme for the SG against internal attacks. Analysis shows that the proposed DA scheme not only overcome the key leakage problem in Fan et al.'s DA scheme, but also has better performance.
引用
收藏
页码:491 / 502
页数:12
相关论文
共 28 条
[1]  
[Anonymous], ADV MAT SCI ENG
[2]   PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications [J].
Chen, Le ;
Lu, Rongxing ;
Cao, Zhenfu .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) :1122-1132
[3]   Toward Secure Targeted Broadcast in Smart Grid [J].
Fadlullah, Zubair Md ;
Kato, Nei ;
Lu, Rongxing ;
Shen, Xuemin Sherman ;
Nozaki, Yousuke .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (05) :150-156
[4]   Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid [J].
Fan, Chun-I ;
Huang, Shi-Yuan ;
Lai, Yih-Loong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) :666-675
[5]   A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks [J].
Farash, Mohammad Sabzinejad ;
Attari, Mahmoud Ahmadian .
JOURNAL OF SUPERCOMPUTING, 2014, 69 (01) :395-411
[6]   Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing [J].
Farash, Mohammad Sabzinejad ;
Attari, Mahmoud Ahmadian .
NONLINEAR DYNAMICS, 2014, 76 (02) :1203-1213
[7]   A Lightweight Message Authentication Scheme for Smart Grid Communications [J].
Fouda, Mostafa M. ;
Fadlullah, Zubair Md ;
Kato, Nei ;
Lu, Rongxing ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :675-685
[8]   A survey of communication/networking in Smart Grids [J].
Gao, Jingcheng ;
Xiao, Yang ;
Liu, Jing ;
Liang, Wei ;
Chen, C. L. Philip .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (02) :391-404
[9]  
Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15
[10]   An Enhanced Public Key Infrastructure to Secure Smart Grid Wireless Communication Networks [J].
He, Daojing ;
Chan, Sammy ;
Zhang, Yan ;
Guizani, Mohsen ;
Chen, Chun ;
Bu, Jiajun .
IEEE NETWORK, 2014, 28 (01) :10-16