Skip to main content

IAA: Incentive-Based Anonymous Authentication Scheme in Smart Grids

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9089))

Abstract

The traditional energy consumption calculation heavily relies on manual work, which is inefficient and error-prone. The Smart Grid, which integrates information and communication technologies into the electrical grid to gather information and manage energy production and consumption, may be a solution to this challenge. However, the resulting complex infrastructure and profusion of information may open up new attack vectors exploitable by malicious parties that could attack the grid itself or violate its consumers’ privacy. In this paper, we indicate the increasing interests in providing conditionally anonymous authentication in the Smart Grid systems. While the consumption report stays anonymous, the consumers who voluntarily curtail their energy consumption, can confirm their curtailments in the scheme. Moreover, compared with the existing conditionally anonymous authentication schemes, our scheme is more efficient in computational and communication overhead for Smart Grid systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Litos Strategic Communication, The Smart Grid: An Introduction, Tech. rep., U.S. Department of Energy, pp. 7, 14–19, 22 (2008)

    Google Scholar 

  2. Yarali, A., Rahman, S.: Smart grid networks: Promises and challenges. Journal of Communications 7, 409–417 (2012)

    Article  Google Scholar 

  3. Eckert, C., Krau, C., Schoo, P.: Sicherheit im Smart Grid - Eckpunkte fuer ein Energieinformationsnetz. Stiftung-Verbundkolleg/Projekt Newise (90) (2011)

    Google Scholar 

  4. Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: First IEEE International Conference on Smart Grid Communications (SmartGrid-Comm), pp. 238–243. IEEE (2010)

    Google Scholar 

  5. Fan, Z., Kalogridis, G., Efthymiou, C., Sooriyabandara, M., Serizawa, M., McGeehan, J.: The new frontier of communications research: smart grid and smart metering. In: Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, pp. 115–118. ACM (2010)

    Google Scholar 

  6. McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy 7(3), 75–77 (2009)

    Article  Google Scholar 

  7. Lo, Y.-L., Huang, S.-C., Lu, C.-N.: Non-technical loss detection using smart distribution network measurement data. In: Innovative Smart Grid Technologies - Asia (ISGT Asia), pp. 1–5. IEEE (2012)

    Google Scholar 

  8. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  9. So, H.K.-H., Kwok, S.H.M., Lam, E.Y., Lui, K.-S.: Zero-configuration identity-based signcryption scheme for smart grid. In: IEEE First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 321–326 (2010)

    Google Scholar 

  10. Nicanfar, H., Jokar, P., Beznosov, K., Leung, V.C.: Efficient authentication and key management mechanisms for smart grid communications. IEEE Systems Journal (6), 1–12 (2013)

    Google Scholar 

  11. Li, H., Liang, X., Lu, R., Lin, X., Shen, X.: EDR: An efficient demand response scheme for achieving forward secrecy in smart grid. In: IEEE Global Communications Conference (GLOBECOM), pp. 929–934 (2012)

    Google Scholar 

  12. He, D., Chen, C., Bu, J., Chan, S., Zhang, Y., Guizani, M.: Secure service provision in smart grid communications. IEEE Communications Magazine 50(8), 53–61 (2012)

    Article  Google Scholar 

  13. Chu, C.-K., Liu, J.K., Wong, J.W., Zhao, Y., Zhou, J.: Privacy-preserving smart metering with regional statistics and personal enquiry services. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 369–380 (2013)

    Google Scholar 

  14. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(1), 186–208 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  15. Schnorr, C., Claus, P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161–174 (1991)

    Article  MATH  Google Scholar 

  16. Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111–125. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 372–386. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Chen, L., Ng, S.L., Wang, G.: Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications 29(3), 605–615 (2011)

    Article  Google Scholar 

  19. Zeng, S., Jiang, S., Qin, Z.: An efficient conditionally anonymous ring signature in the random oracle model. Theoretical Computer Science 461, 106–114 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  20. Komano, Y., Ohta, K., Shimbo, A., Kawamura, S.-i.: Toward the fair anonymous signatures: Deniable ring signatures. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 174–191. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  21. Lynn, B.: PBC library, http://crypto.stanford.edu/pbc/

  22. Multiprecision integer and rational arithmetic c/c++ library, http://www.shamus.ie/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiyuan Sui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sui, Z., Alyousef, A., de Meer, H. (2015). IAA: Incentive-Based Anonymous Authentication Scheme in Smart Grids. In: Tiropanis, T., Vakali, A., Sartori, L., Burnap, P. (eds) Internet Science. INSCI 2015. Lecture Notes in Computer Science(), vol 9089. Springer, Cham. https://doi.org/10.1007/978-3-319-18609-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18609-2_11

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18608-5

  • Online ISBN: 978-3-319-18609-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics