Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid"

被引:42
作者
Bao, Haiyong [1 ]
Lu, Rongxing [2 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Data aggregation; data integrity; privacy-preserving; smart grid;
D O I
10.1109/TII.2015.2500882
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quite recently, Fan et al. (IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 666-675, 2014) proposed a new data aggregation scheme for smart grid communications, and claimed that it can achieve not only user's privacy-preservation, but also data integrity requirement. However, in this paper, we show that Fan et al.'s scheme has a serious security flaw and cannot meet data integrity requirement at all. Specifically, by observing the user registration procedure in Fan et al.'s scheme, we find that each user's private key can be easily derived from the information published by the aggregator. Then, with the derived private key, an attacker can inject polluted data to user's real data without being detected. As a result, data integrity will be completely violated. We hope that with our comment, similar mistakes can be avoided in future design of privacy-preserving data aggregation with data integrity protection.
引用
收藏
页码:2 / 5
页数:4
相关论文
共 11 条
[1]  
Adams C., 1999, Understanding Public-Key Infrastructure:Concepts, Standards, and Deployment Considerations
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
[Anonymous], 1999, COMPUTING DISCRETE L
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[5]   Defending Against False Data Injection Attacks on Power System State Estimation [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) :198-207
[6]   Fast Distributed Demand Response With Spatially and Temporally Coupled Constraints in Smart Grid [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing ;
Chen, Jiming .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) :1597-1606
[7]   A Survey on Demand Response in Smart Grids: Mathematical Models and Approaches [J].
Deng, Ruilong ;
Yang, Zaiyue ;
Chow, Mo-Yuen ;
Chen, Jiming .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (03) :570-582
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]   Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid [J].
Fan, Chun-I ;
Huang, Shi-Yuan ;
Lai, Yih-Loong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) :666-675
[10]  
GIRAULT M, 1991, LECT NOTES COMPUT SC, V547, P490