Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers
نویسندگان
چکیده
Smart meters that track fine-grained electricity usage and implement sophisticated usage-based billing policies, e.g., based on timeof-use, are a key component of recent smart grid initiatives that aim to increase the electric grid’s efficiency. A key impediment to widespread smart meter deployment is that fine-grained usage data indirectly reveals detailed information about consumer behavior, such as when occupants are home, when they have guests or their eating and sleeping patterns. Recent research proposes cryptographic solutions that enable sophisticated billing policies without leaking information. However, prior research does not measure the performance constraints of real-world smart meters, which use cheap ultra-low-power microcontrollers to lower deployment costs. In this paper, we explore the feasibility of designing privacy-preserving smart meters using low-cost microcontrollers and provide a general methodology for estimating design costs. We show that it is feasible to produce certified meter readings for use in billing protocols relying on Zero-Knowledge Proofs with microcontrollers such as those inside currently deployed smart meters. Our prototype meter is capable of producing these readings every 10 seconds using a $3.30USD MSP430 microcontroller, while less powerful microcontrollers deployed in today’s smart meters are capable of producing readings every 28 seconds. In addition to our results, our goal is to provide smart meter designers with a general methodology for selecting an appropriate balance between platform performance, power consumption, and monetary cost that accommodates privacy-preserving billing protocols.
منابع مشابه
I Have a DREAM! (DiffeRentially privatE smArt Metering)
This paper presents a new privacy-preserving smart metering system. Our scheme is private under the differential privacy model and therefore provides strong and provable guarantees. With our scheme, an (electricity) supplier can periodically collect data from smart meters and derive aggregated statistics without learning anything about the activities of individual households. For example, a sup...
متن کاملDREAM: DiffeRentially privatE smArt Metering
This paper presents a new privacy-preserving smart metering system. Our scheme is private under the differential privacy model and therefore provides strong and provable guarantees. With our scheme, an (electricity) supplier can periodically collect data from smart meters and derive aggregated statistics while learning only limited information about the activities of individual households. For ...
متن کاملLoad Hiding to Preserve Privacy from Smart Meter Measurements
Load profiles generated by smart meters represent a privacy concern when analyzed by Non-Invasive Load Monitoring algorithms. Past research in preserving privacy and countering these algorithms has negated the benefits provided by smart meters. This research seeks to protect consumer privacy while maintaining the benefits of smart meters. The method proposed achieves this through the addition o...
متن کاملPrivacy-Preserving Energy-Reading for Smart Meter
Smart Meters belong to the Advanced Metering Infrastructure (AMI) and allow customers to monitor locally and remotely the current usage of energy. Providers query Smart Meters for billing purpose or to establish the amount of energy needed by houses. However, reading details sent from smart meters to the energy provider can be used to violate customers’ privacy. In this paper, our contribution ...
متن کاملAn efficient privacy-preserving comparison protocol in smart metering systems
In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy consumption. Unfortunately, providing power consumption statistics and generating recommendations rely on highly privacy-sensitive smart meter consumption data. From the past experience, we se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011