Abstract
Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenue. However, the process of power selling induces two security problems, namely authentication and privacy-preservation. Like other messages, a customer’s request messages for power selling should be properly authenticated to avoid various attacks. At the same time, the customer’s privacy such as daily electricity usage pattern should be properly protected. In this paper, we propose a secure and privacy-preserving protocol to make this possible. Basically, authentication is done by means of anonymous credentials. Even in the reconciliation phase, the power operator only knows how much power a customer has uploaded to the grid but cannot know when the customer has done so. We evaluate our scheme to show that it is effective.
Chapter PDF
Similar content being viewed by others
Keywords
References
Networx: Guide to Selling Power Back to the Grid, http://www.networx.com/article/guide-to-selling-solar-geothermal-and
Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-Grid Security Issues. IEEE Security and Privacy Magazine 81–85 (2010)
The Smart Grid Interoperability Panel Cyber Security Working Group: Second Draft NISTIR 7628 Smart Grid Cyber Security Strategy and Requirements (2010)
Office of the National Coordinator for Smart Grid Interoperability: NIST Special Publication 1108: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0 (2010)
SmartGrids: European SmartGrids Technology Platform: Vision and Strategy for Europe’s Electricity Networks of the Future. In: European Commission, Directorate-General for Research, Sustainable Energy Systems, EUR 22040 (2006)
Electric Power Research Institute: Intelligrid, http://intelligrid.epri.com/
US Department of Energy: Grid 2030: A National Vision for Electricity’s Second 100 Years (2003)
Wen, M.H.F., Leung, K.C., Li, V.O.K.: Communication-oriented Smart Grid Framework. In: Proceedings of the IEEE SmartGridComm 2011 (2011)
Li, V.O.K., Wu, F.F., Zhong, J.: Communication requirements for Risk-Limiting Dispatch in Smart Grid. In: Proceedings of the IEEE Workshop on Smart Grid Communications (2010)
Liu, Y., Ning, P., Reiter, M.K.: False Data Injection Attacks against State Estimation in Electric Power Grids. In: Proceedings of the CCS 2009, pp. 21–32 (2009)
Chim, T.W., Yiu, S.M., Hui, Lucas C.K., Li, V.O.K.: PASS: Privacy-preserving Authentication Scheme for Smart Grid Network. In: Proceedings of the IEEE SmartGridComm’11 (2011).
Cheung, J.C.L., Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: Credential-based Privacy-preserving Power Request Scheme for Smart Grid Network. In: Proceedings of the IEEE GLOBECOM 2011 (2011)
Fouda, M.M., Fadlullah, Z.M., Kato, N., Lu, R., Shen, X.S.: Towards a Light-weight Message Authentication Mechanism Tailored for Smart Grid Communications. In: Proceedings of the First International Workshop on Security in Computers, Networking and Communications, pp. 1018–1023 (2011)
Fouda, M.M., Fadlullah, Z.M., Kato, N., Lu, R., Shen, X.S.: A Lightweight Message Authentication Scheme for Smart Grid Communications. IEEE Transactions on Smart Grid 2(4), 675–685 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chim, T.W. et al. (2012). Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner. In: Chim, T.W., Yuen, T.H. (eds) Information and Communications Security. ICICS 2012. Lecture Notes in Computer Science, vol 7618. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34129-8_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-34129-8_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34128-1
Online ISBN: 978-3-642-34129-8
eBook Packages: Computer ScienceComputer Science (R0)