Privacy Preserving for Network Coding in Smart Grid

  • Shiming HeEmail author
  • Weini Zeng
  • Kun Xie
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9530)


In smart grid, privacy implications to individuals and their family is an important issue, due to the fine-grained usage data collection. Wireless communications are considered by many utility companies to obtain information. Network coding is exploited in smart grids, to enhance network performance in terms of throughput, delay, robustness, and energy consumption. However, Network Coding introduces new challenge for privacy preserving due to the encoding of packet in forwarder nodes. We propose a distributed privacy preserving scheme for network coding in smart grid, which considers the converged flows character of smart grid and exploits a homomorphic encryption function to decrease the complex in forwarder node. The message content of packet is encrypted and the tag of packet is encrypted by homomorphic encryption function. Then the forwarder node linear random codes the encrypted message contents and directly processes the tags cryptotext based on the homomorphism feature. It offers message content confidentiality privacy preserving feature, which can efficiently thwart traffic analysis. Extensive security analysis and performance evaluations demonstrate the validity and efficiency of the proposed scheme.


Privacy preserving Network coding Smart grid Homomorphic encryption function Traffic analysis 



This work was supported by National Natural Science Foundation of China (61303045, 61572184, Key Program 71331001, 71420107027), the Prospective Research Project on Future Networks (Jiangsu Future Networks Innovation Institute) under Grant No. BY2013095-4-06.


  1. 1.
    Cohen, F.: The smarter grid. IEEE Secur. Priv. 8(1), 60–63 (2010)CrossRefGoogle Scholar
  2. 2.
    Marihart, D.: Communications technology guidelines for EMS/SCADA systems. IEEE Trans. Power Deliv. 16(4) (2001)Google Scholar
  3. 3.
    Deconinck, G.: An evaluation of two-way communication means for advanced metering in flanders (Belgium). In: IEEE IIMTC, pp. 1–6 (2008)Google Scholar
  4. 4.
    Gao, Q., Yu, J., Chong, P., So, P., Gunawan, E.: Solutions for the silent node problemin an automaticmeter reading system using powerline communications. IEEE Trans. Power Deliv. 23, 150–156 (2008)CrossRefGoogle Scholar
  5. 5.
    Sivaneasan, B., Gunawan, E., So, P.: Modeling and performance analysis of automatic meter-reading systems using PLC under impulsive noise interference. IEEE Trans. Power Deliv. 25, 1465–1475 (2010)CrossRefGoogle Scholar
  6. 6.
    Galli, S., Scaglione, A., Wang, Z.: For the grid and through the grid: the role of power line communications in the smart grid. In: IEEE, vol. 99, pp. 998–1027 (2011)Google Scholar
  7. 7.
    Gungor, V., Lu, B., Hancke, G.: Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans. Ind. Electron. 57, 3557–3564 (2010)CrossRefGoogle Scholar
  8. 8.
    Souryal, M., Gentile, C., Griffith, D., Cypher, D., Golmie, N.: A methodology to evaluate wireless technologies for the smart grid. In: IEEE Smart Grid Communication, pp. 356–361 (2010)Google Scholar
  9. 9.
    Nicanfar, H., TalebiFard, P., Alasaad, A., Leung, V.C.: Privacy-preserving scheme in smart grid communication using enhanced network coding. In: ICC, pp. 2022–2026 (2013)Google Scholar
  10. 10.
    Nicanfar, H., TalebiFard, P., Alasaad, A., Leung, V.C.: Enhanced network coding to maintain privacy in smart grid communication. IEEE Trans. Emerg. Top. Comput. 1(2), 286–296 (2013)CrossRefGoogle Scholar
  11. 11.
    Karthick, M., Sivalingam, K.M.: Network coding meets TCP. In: IEEE ANTS, pp. 1–6 (2013)Google Scholar
  12. 12.
    Phulpin, Y., Barros, J., Lucani, D.: Network coding in smart grids. In: IEEE Smart Grid Communication, pp. 1–6 (2011)Google Scholar
  13. 13.
    Rajalingham, G., Ho, Q.D., Le-Ngoc., T.: Random linear network coding for converge-cast smart grid wireless networks. In: IEEE, pp. 208–212 (2014)Google Scholar
  14. 14.
    Prior, R., Lucani, D.E., Phulpin, Y., Nistor, M., Barros, J.: Network coding protocols for smart grid communications. IEEE Trans. Smart Grid 5(3), 1523–1531 (2014)CrossRefGoogle Scholar
  15. 15.
    McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(8), 75–77 (2009)CrossRefGoogle Scholar
  16. 16.
    Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: IEEE Smart Grid Communication, pp. 1–6 (2010)Google Scholar
  17. 17.
    Richardson, I., Thomson, A., Infield, D., Clifford, C.: Domestic electricity use: a high-resolution energy demand model. Energ. Build. 42, 1878–1887 (2010)CrossRefGoogle Scholar
  18. 18.
    Chen, L., Lu, R., Cao, Z., AlHarbi, K., Lin., X.: Mudamultifunctional data aggregation in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. online (2014)Google Scholar
  19. 19.
    Won, J., Ma, C.Y.T., Yau, D.K.Y., Rao, N.: Proactive fault-tolerant aggregation protocol for privacy-assured smart metering. In: Infocom, pp. 2804–2812 (2014)Google Scholar
  20. 20.
    Zhao, J., Jung, T., Wang, Y., Li., X.Y.: Achieving differential privacy of data disclosure in the smart grid. In: Infocom, pp. 504–512 (2014)Google Scholar
  21. 21.
    Yang, L., Chen, X., Zhang, J., Poor, H.V.: Optimal privacy-preserving energy management for smart meters. In: Infocom, pp. 513–521 (2014)Google Scholar
  22. 22.
    Zeng, W., Lin, Y., He, S., Yu, J.: Data aggregation based on the privacy-preserving element in wireless sensor networks. J. Commun. 33(10), 16–25 (2012)Google Scholar
  23. 23.
    Zeng, W., Lin, Y., Wang, L., He, S.: Privacy-preserving data aggregation scheme based on the p-function set in wireless sensor networks. Ad hoc Sens. Netw. 21(1–2), 21–58 (2014)Google Scholar
  24. 24.
    Fan, Y., Jiang, Y., Zhu, H., Shen, X.S.: An efficient privacy-preserving scheme against traffic analysis attacks in network coding. In: Infocom, pp. 2213–2221 (2009)Google Scholar
  25. 25.
    Fan, Y., Jiang, Y., Zhu, H., Shen, X.S.: Network coding based privacy preservation against traffic analysis in multi-hop wireless networks. IEEE Trans. Wirel. Commun. 10(3), 834–843 (2011)CrossRefGoogle Scholar
  26. 26.
    Feizi, S., Lucani, D.E., Mdard, M.: Tunable sparse network coding. In: International Zurich Seminar on Communications (IZS) (2012)Google Scholar
  27. 27.
    Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. Theory Cryptogr. 3378, 325–341 (2005)MathSciNetzbMATHGoogle Scholar
  28. 28.
    Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefzbMATHGoogle Scholar
  29. 29.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, School of Computer and Communication Engineering, Hunan Province Engineering Research Center of Electric Transportation and Smart Distributed NetworkChangsha University of Science and TechnologyChangshaChina
  2. 2.The 716th Research InstituteChina Shipbuilding Industry CorporationLianyungangChina
  3. 3.College of Computer Science and Electronics EngineeringHunan UniversityChangshaChina
  4. 4.Department of Electrical and Computer EngineeringState University of New York at Stony BrookNew YorkUSA

Personalised recommendations