Privacy-enhanced architecture for smart metering

被引:0
作者
Félix Gómez Mármol
Christoph Sorge
Ronald Petrlic
Osman Ugus
Dirk Westhoff
Gregorio Martínez Pérez
机构
[1] NEC Europe Ltd,Institut für Informatik
[2] University of Paderborn,Departamento de Ingeniería de la Información y las Comunicaciones
[3] Hamburg University of Applied Sciences,undefined
[4] Hochschule Furtwangen,undefined
[5] University of Murcia,undefined
来源
International Journal of Information Security | 2013年 / 12卷
关键词
Homomorphic encryption transformation; Privacy; Smart meters; Smart grid;
D O I
暂无
中图分类号
学科分类号
摘要
The recent deployment of smart grids promises to bring numerous advantages in terms of energy consumption reduction in both homes and businesses. A more transparent and instantaneous measurement of electricity consumption through smart meters utilization leads to an enhancement in the ability of monitoring, controlling and predicting energy usage. Nevertheless, it also has associated drawbacks related to the privacy of customers, since such management might reveal their personal habits, which electrical appliances they are using at each moment, whether they are at home or not, etc. In this work, we present a privacy-enhanced architecture for smart metering aimed at tackling this threat by means of encrypting individual measurements while allowing the electricity supplier to access the aggregation of the corresponding decrypted values.
引用
收藏
页码:67 / 82
页数:15
相关论文
共 31 条
  • [1] Wood G(2003)Dynamic energy-consumption indicators for domestic appliances: Environment, behaviour and design Energy Build. 35 821-841
  • [2] Newborough M(2012)An adaptive scenario-based reasoning system across smart houses Wirel. Pers. Commun. 64 287-304
  • [3] Cheng S-T(2003)Dynamic energy-consumption indicators for domestic appliances: Environment, behaviour and design Elsevier Energy Build. 35 821-841
  • [4] Wang C-H(2009)Security and privacy challenges in the smart grid IEEE Secur. Priv. 7 75-77
  • [5] Wood G(2010)SmartPrivacy for the smart grid: Embedding privacy into the design of electricity conservation Identity Inf. Soc. 3 275-294
  • [6] Newborough M(2008)A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing Comput. Commun. 31 734-749
  • [7] McDaniel P(2011)Identity-based cryptography for grid security Int. J. Inf. Secur. 10 15-32
  • [8] McLaughlin S(2012)Do not snoop my habits. Preserving privacy in the smart grid IEEE Commun. Mag. 50 166-172
  • [9] Cavoukian A(2005)A framework for the revocation of unintended digital signatures initiated by malicious terminals IEEE Trans. Dependable Secur. Comput. 2 268-272
  • [10] Polonetsky J(2010)A survey on the encryption of convergecast-traffic with in-network processing IEEE Trans. Dependable Secur. Comput. 4 20-34