Balancing Security and Efficiency for Smart Metering against Misbehaving Collectors
نویسندگان
چکیده
Smart grid enables two-way communications between smart meters and operation centers to collect real-time power consumption of customers to improve flexibility, reliability and efficiency of the power system. It brings serious privacy issues to customers, since the meter readings possibly expose customers’ activities in the house. Data encryption can protect the readings, but lengthens the data size. Secure data aggregation improves communication efficiency and preserves customers’ privacy, while fails to support dynamic billing, or offer integrity protection against public collectors, which may be hacked in reality. In this paper, we define a new security model to formalize the misbehavior of collectors, in which the misbehaving collectors may launch pollution attacks to corrupt power consumption data. Under this model, we propose a novel privacy-preserving smart metering scheme to prevent pollution attacks for the balance of security and efficiency in smart grid. It achieves end-to-end security, data aggregation and integrity protection against the misbehaving collectors, which act as local gateways to collect and aggregate usage data and forward to operation centers. As a result, the misbehaving collectors cannot access or corrupt power usage data of customers. In addition, we design a dynamic billing mechanism based on individual power consumption maintained on collectors with the verification of customers. Our analysis shows that the proposed scheme achieves secure smart metering and verifiable dynamic billing against misbehaving collectors with low computational and communication overhead.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملIT Security Architecture Approaches for Smart Metering and Smart Grid
The power grid is currently undergoing changes towards highly volatile and localized energy production and storage, supported by IT and communication components. Smart Metering is going to provide fine-grained measurement and automatic remote reading of consumption and production amounts. It enables flexible tariffing and dynamic load optimization, ultimately aiming at cost and consumption redu...
متن کاملSecurity Architecture of Smart Metering Systems
The main goals of smart metering are the reduction of costs, energy and CO2 by the provision of actual metering information to the providers and the customer. They allow for flexible possibilities to influence the customers’ energy consumption behavior and to adapt dynamically the power generation and distribution to the requested energy by smart grids. Metering devices are under control of gov...
متن کاملSecret Share Based Program Access Authorization Protocol for Smart Metering
Varieties of data security protection technologies have been developed in smart metering. However, there are almost no researches focusing on the security of smart meter parameters. In fact, smart meter parameters, such as the total/sharp/peak/flat/valley period time, can be written locally or remotely by power companies or users through sending programming commands. Modifying smart meter param...
متن کاملSecure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems
This paper studies the security requirements for remote authentication and communication in smart grid systems. Though smart card based authentication techniques have been a successful solution for addressing key management challenges in several cryptographic authentication systems, they may not be applicable to smart grid systems. For example, in order to unlock the credentials stored in tampe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017