Privacy-preserving data aggregation scheme against internal attackers in smart grids
- 599 Downloads
With fast advancements of communication, systems and information technologies, a smart grid (SG) could bring much convenience to users because it could provide a reliable and efficient energy service. The data aggregation (DA) scheme for the SG plays an important role in evaluating information about current energy usage. To achieve the goal of preserving users’ privacy, many DA schemes for the SG have been proposed in last decade. However, how to withstand attacks of internal adversaries is not considered in those schemes. To enhance preservation of privacy, Fan et al. proposed a DA scheme for the SG against internal adversaries. In Fan et al.’s DA scheme, blinding factors are used in evaluating information about current energy usage and the aggregator cannot get the consumption information of any individual user. Fan et al. demonstrated that their scheme was secure against various attacks. However, we find that their scheme suffers from the key leakage problem, i.e., the adversary could extract the user’s private key through the public information. To overcome such serious weakness, this paper proposes an efficient and privacy-preserving DA scheme for the SG against internal attacks. Analysis shows that the proposed DA scheme not only overcome the key leakage problem in Fan et al.’s DA scheme, but also has better performance.
KeywordsSmart grid Data aggregation Privacy Internal attacker
The work of J.-H. Lee was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2014R1A1A1006770).
- 9.Tseng, H. (2014). Threshold-based privacy-preserving key management scheme for vehicle-to-grid networks. Applied Mechanics and Materials, 479(1), 978–982.Google Scholar
- 11.Li, F., Luo, B., & Liu, P. (2010) Secure information aggregation for smart grids using homomorphic encryption. In First IEEE international conference on smart grid communications (pp. 327–332).Google Scholar
- 12.Paillier, P. (1999) A public-key cryptosystem based on composite degree residuosity classes. In EUROCRYPT ‘99 (pp. 223–238).Google Scholar
- 13.Garcia, F. D., & Jacobs B. (2011). Privacy-friendly energy-metering via homomorphic encryption. In 6th international conference on security and trust management (pp. 226–238).Google Scholar
- 15.Zhang, J., Liu, L., Cui, Y., & Chen, Z. (2013). SP2DAS: Self-certified PKC-based privacy-preserving data aggregation scheme in smart grid. International Journal of Distributed Sensor Networks, 2013, 457325. doi: 10.1155/2013/457325.
- 16.Chen, L., Lu, R., & Cao, Z. (2014). PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Networking and Applications. doi: 10.1007/s12083-014-0255-5.
- 23.He, D., Kumar, N., & Chilamkurti, N. (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences. doi: 10.1016/j.ins.2015.02.010.