Advertisement

Security and Privacy in Smart Grid Demand Response Systems

  • Andrew Paverd
  • Andrew Martin
  • Ian Brown
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8448)

Abstract

Various research efforts have focussed on the security and privacy concerns arising from the introduction of smart energy meters. However, in addition to smart metering, the ultimate vision of the smart grid includes bi-directional communication between consumers and suppliers to facilitate certain types of Demand Response (DR) strategies such as demand bidding (DR-DB). In this work we explore the security and privacy implications arising from this bi-directional communication. This paper builds on the preliminary work in this field to define a set of security and privacy goals for DR systems and to identify appropriate and realistic adversary models. We use these adversary models to analyse a DR-DB system, based on the Open Automated Demand Response (OpenADR) specifications, in terms of the security and privacy goals. Our analysis shows that whilst the system can achieve the defined security goals, the current system architecture cannot achieve the privacy goals in the presence of honest-but-curious adversaries. To address this issue, we present a preliminary proposal for an enhanced architecture which includes a trusted third party based on approaches and technologies from the field of Trusted Computing.

Notes

Acknowledgements

The research described in this paper was conducted as part of the Future Home Networks and Services project at the University of Oxford, funded by BT.

References

  1. 1.
    Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 238–243 (2010)Google Scholar
  2. 2.
    Danezis, G., Kohlweiss, M., Rial, A.: Differentially private billing with rebates. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 148–162. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  3. 3.
    Ács, G., Castelluccia, C.: I have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118–132. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  4. 4.
    Borges, F., Martucci, L.A., Muhlhauser, M.: Analysis of privacy-enhancing protocols based on anonymity networks. In: Proceedings of IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp. 378–383, November 2012Google Scholar
  5. 5.
    Piette, M.A., Ghatikar, G., Kiliccote, S., Koch, E., Hennage, D., Palensky, P., McParland, C.: Open automated demand response communications specification (version 1.0). Technical report, California Energy Commission, PIER Program, April 2009Google Scholar
  6. 6.
    OpenADR Alliance: OpenADR 2.0b profile specification. Technical report (2013)Google Scholar
  7. 7.
    OpenADR Alliance: The openADR primer. Technical report (2012)Google Scholar
  8. 8.
    United States Department of Energy: Benefits of demand response in electricity markets and recommendations for achieving them. Technical report, February 2006Google Scholar
  9. 9.
    Albadi, M., El-Saadany, E.: A summary of demand response in electricity markets. Electr. Power Syst. Res. 78(11), 1989–1996 (2008)CrossRefGoogle Scholar
  10. 10.
    Karwe, M., Strüker, J.: Maintaining privacy in data rich demand response applications. In: Cuellar, J. (ed.) SmartGridSec 2012. LNCS, vol. 7823, pp. 85–95. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  11. 11.
    Quinn, E.L.: Privacy and the New Energy Infrastructure. SSRN eLibrary (2009)Google Scholar
  12. 12.
    Brown, I.: Britain’s smart meter programme: a case study in privacy by design. Int. Rev. Law Comput. Technol. 28, 172–184 (2013)CrossRefGoogle Scholar
  13. 13.
    Cuijpers, C., Koops, B.J.: Smart metering and privacy in Europe: lessons from the Dutch case. In: Gutwirth, S., Leenes, R., de Hert, P., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 269–293. Springer, Dordrecht (2013) CrossRefGoogle Scholar
  14. 14.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)CrossRefzbMATHMathSciNetGoogle Scholar
  15. 15.
    Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2. Cambridge University Press, Cambridge (2009)Google Scholar
  16. 16.
    Paverd, A.J., Martin, A.P.: Hardware security for device authentication in the smart grid. In: Cuellar, J. (ed.) SmartGridSec 2012. LNCS, vol. 7823, pp. 72–84. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  17. 17.
    Cuijpers, C., Koops, B.J.: Het wetsvoorstel slimme meters: een privacytoets op basis van art. 8 EVRM Onderzoek in opdracht van de Consumentenbond. Technical report, Universiteit van Tilburg (2008)Google Scholar
  18. 18.
    Paverd, A.J.: Student research abstract: trustworthy remote entities in the smart grid. In: ACM Symposium on Applied Computing (SAC) (2013)Google Scholar
  19. 19.
    Trusted Computing Group: TPM main specifications, version 1.2, revision 116, part 1: design principles. Technical report (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of OxfordOxfordUK
  2. 2.Oxford Internet InstituteUniversity of OxfordOxfordUK

Personalised recommendations