Advertisement

An Accountable Neighborhood Area Network in Smart Grids

  • Jing Liu
  • Yang Xiao
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 181)

Abstract

Since customer’s monthly electricity bill is charged solely based on the measurement of a power meter, once the meter is compromised or malfunction, the correctness of the bill cannot be guaranteed. To eliminate this problem, we propose an accountable scheme for the smart gird in a neighborhood area network (NAN).

Keywords

smart grid AMI security accountability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Faruqui, A., Hledik, R., Sergici, S.: Piloting the smart grid. The Electricity Journal 22(7), 55–69 (2009)CrossRefGoogle Scholar
  2. 2.
    Cisco Systems, Inc., Internet protocol architecture for the smart grid. White Paper (July 2009), http://www.cisco.com/web/strategy/docs/energy/CISCO_IP_INTEROP_STDS_PPR_TO_NIST_WP.pdf
  3. 3.
    U.S. DOE, Smart grid system report. White Paper (July 2009), http://www.oe.energy.gov/SGSRMain_090707_lowres.pdf
  4. 4.
    Wei, D., Lu, Y., Jafari, M., Skare, P., Rohde, K.: An integrated security system of protecting smart grid against cyber attacks. In: Innovative Smart Grid Technologies (ISGT 2010), Gaithersburg, MD, pp. 1–7 (January 2010)Google Scholar
  5. 5.
    Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Transactions on Smart Grid 1(1), 99–107 (2010)CrossRefGoogle Scholar
  6. 6.
    Kalogridis, G., Efthymiou, C., Denic, S.Z., Lewis, T.A., Cepeda, R.: Privacy for smart meters: towards undetectable appliance load signatures. In: The First IEEE Internation Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, pp. 232–237 (October 2010)Google Scholar
  7. 7.
    Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: The First IEEE Internation Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, pp. 238–243 (October 2010)Google Scholar
  8. 8.
    Liu, J., Xiao, Y., Gao, J.: Accountability in smart grids. In: IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011), Smart Grids Special Seesions, Las Vegas, NV, pp. 1166–1170 (January 2011)Google Scholar
  9. 9.
    U.S. NETL, Advanced metering infrastructure. White Paper (February 2008), http://www.smartgrid.gov/white_papers
  10. 10.
    U.S. NIST, NIST framework and roadmap for smart grid interoperability standards, release 1.0. NIST Special Publication 1108 (January 2010), http://www.smartgrid.gov/standards/roadmap
  11. 11.
    West Virginia Division of Energy, West virginia smart grid implementation plan. U.S. DOE/NETL Report (August 2009), http://www.smartgrid.gov/reports
  12. 12.
    U.S. NETL, A systems view of the modern grid. White Paper (January 2007), http://www.smartgrid.gov/white_papers
  13. 13.
    Clark, A., Pavlovski, C.J.: Wireless networks for the smart energy grid: application aware networks. In: Proc. IMECS 2010 (2010)Google Scholar
  14. 14.
    Gadze, J.: Control-aware wireless sensor network platform for the smart electric grid. IJCSNS International Journal of Computer Science and Network Security 9(1), 16–26 (2009)Google Scholar
  15. 15.
    Dvian, D., Johal, H.: A smart grid for improving system reliability and asset utilization. In: CES/IEEE 5th International Power Electronics and Motion Control Conference, Shanghai, China, pp. 1–7 (August 2006)Google Scholar
  16. 16.
    Srinivasa Prasanna, G.N., Lakshmi, A., Sumanth, S., Simha, V., Bapat, J., Koomullil, G.: Data communication over the smart grid. In: Proc. ISPLC 2009, Dresden, pp. 273–279 (2009)Google Scholar
  17. 17.
    Khan, H.A., Xu, Z., Iu, H., Sreeram, V.: Review of technologies and implementation strategies in the area of smart grid. In: The 10th Postgraduate Electrical Engineering and Computing Symposium. IEEE WA Section, Perth (2009)Google Scholar
  18. 18.
    Kailar, R.: Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering 22(5), 313–328 (1996)CrossRefGoogle Scholar
  19. 19.
    Kudo, M.: Electronic submission protocol based on temporal accountability. In: Proceedings of the 14th Annual Computer Security Applications Conference, pp. 353–363 (1998)Google Scholar
  20. 20.
    Haeberlen, A., Kouznetsov, P., Druschel, P.: PeerReview: practical accountability for distributed systems. ACM SIGOPS Operating Systems Review 41(6), 175–188 (2007)CrossRefGoogle Scholar
  21. 21.
    Xiao, Y.: Editorial. International Journal of Security and Networks 6(1), 1 (2011)Google Scholar
  22. 22.
    Kundur, D., Feng, X., Mashayekh, S., Liu, S., Zourntos, T., Butler-Purry, K.L.: Towards modelling the impact of cyber attacks on a smart grid. International Journal of Security and Networks 6(1), 2–13 (2011)CrossRefGoogle Scholar
  23. 23.
    Kalogridis, G., Denic, S.Z., Lewis, T., Cepeda, R.: Privacy protection system and metrics for hiding electrical events. International Journal of Security and Networks 6(1), 14–27 (2011)CrossRefGoogle Scholar
  24. 24.
    Li, F., Luo, B., Liu, P.: Secure and privacy-preserving information aggregation for smart grids. International Journal of Security and Networks 6(1), 28–39 (2011)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Zhang, J., Gunter, C.A.: Application-aware secure multicast for power grid communications. International Journal of Security and Networks 6(1), 40–52 (2011)CrossRefGoogle Scholar
  26. 26.
    Ramsey, B.W., Mullins, B.E., Thomas, R.W., Andel, T.R.: Subjective audio quality over a secure IEEE 802.11n network. International Journal of Security and Networks 6(1), 53–63 (2011)CrossRefGoogle Scholar
  27. 27.
    Chen, H., Sun, B.: Editorial. International Journal of Security and Networks 6(2/3), 65–66 (2011)Google Scholar
  28. 28.
    Barua, M., Liang, X., Lu, R., Shen, X.: ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing. International Journal of Security and Networks 6(2/3), 67–76 (2011)CrossRefGoogle Scholar
  29. 29.
    Jaggi, N., Reddy, U.M., Bagai, R.: A Three Dimensional Sender Anonymity Metric. International Journal of Security and Networks 6(2/3), 77–89 (2011)CrossRefGoogle Scholar
  30. 30.
    Sharma, M.J., Leung, V.C.M.: Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks. International Journal of Security and Networks 6(2/3), 90–100 (2011)CrossRefGoogle Scholar
  31. 31.
    Cheng, N., Govindan, K., Mohapatra, P.: Rendezvous Based Trust Propagation to Enhance Distributed Network Security. International Journal of Security and Networks 6(2/3), 101–111 (2011)CrossRefGoogle Scholar
  32. 32.
    Fathy, A., El Batt, T., Youssef, M.: A Source Authentication Scheme Using Network Coding. International Journal of Security and Networks 6(2/3), 112–122 (2011)CrossRefGoogle Scholar
  33. 33.
    Liu, L., Xiao, Y., Zhang, J., Faulkner, A., Weber, K.: Hidden Information in Microsoft Word. International Journal of Security and Networks 6(2/3), 123–135 (2011)CrossRefGoogle Scholar
  34. 34.
    Chow, S.S.M., Yiu, S.: Exclusion-Intersection Encryption. International Journal of Security and Networks 6(2/3), 136–146 (2011)CrossRefGoogle Scholar
  35. 35.
    Walker, D., Latifi, S.: Partial Iris Recognition as a Viable Biometric Scheme. International Journal of Security and Networks 6(2-3), 147–152 (2011)CrossRefGoogle Scholar
  36. 36.
    Desoky, A.: Edustega: An Education-Centric Steganography Methodology. International Journal of Security and Networks 6(2-3), 153–173 (2011)CrossRefGoogle Scholar
  37. 37.
    Ampah, N., Akujuobi, C., Alam, S., Sadiku, M.: An intrusion detection technique based on continuous binary communication channels. International Journal of Security and Networks 6(2-3), 174–180 (2011)CrossRefGoogle Scholar
  38. 38.
    Choi, T., Acharya, H.B., Gouda, M.G.: Is that you? Authentication in a network without identities. International Journal of Security and Networks 6(4), 181–190 (2011)CrossRefGoogle Scholar
  39. 39.
    Chai, Q., Gong, G.: On the (in) security of two Joint Encryption and Error Correction schemes. International Journal of Security and Networks 6(4), 191–200 (2011)CrossRefGoogle Scholar
  40. 40.
    Tang, S., Li, W.: An epidemic model with adaptive virus spread control for Wireless Sensor Networks. International Journal of Security and Networks 6(4), 201–210 (2011)CrossRefGoogle Scholar
  41. 41.
    Luo, G., Subbalakshmi, K.P.: KL-sense secure image steganography. International Journal of Security and Networks 6(4), 211–225 (2011)CrossRefGoogle Scholar
  42. 42.
    Chang, W., Wu, J., Tan, C.C.: Friendship-based location privacy in Mobile Social Networks. International Journal of Security and Networks 6(4), 226–236 (2011)CrossRefGoogle Scholar
  43. 43.
    Zhao, X., Li, L., Xue, G.: Authenticating strangers in Online Social Networks. International Journal of Security and Networks 6(4), 237–248 (2011)CrossRefGoogle Scholar
  44. 44.
    Chen, B., Liu, W.: A high computational power wireless sensor network for distributed structural health monitoring. International Journal of Sensor Networks 11(3), 137–147 (2012)CrossRefGoogle Scholar
  45. 45.
    Pham, C.: Coverage and activity management of wireless video sensor networks for surveillance applications. International Journal of Sensor Networks 11(3), 148–165 (2012)CrossRefGoogle Scholar
  46. 46.
    He, J., Ji, S., Yan, M., Pan, Y., Li, Y.: Load-balanced CDS construction in wireless sensor networks via genetic algorithm. International Journal of Sensor Networks 11(3), 166–178 (2012)CrossRefGoogle Scholar
  47. 47.
    Thakur, G.S., Kumar, U., Hsu, W., Helmy, A.: Gauging human mobility characteristics and its impact on mobile routing performance. International Journal of Sensor Networks 11(3), 179–191 (2012)CrossRefGoogle Scholar
  48. 48.
    Xu, H., Huang, L., Zhang, Z., Liu, G., Zhang, Y.: Cooperative relay assignment for static energy-constrained networks. International Journal of Sensor Networks 11(3), 192–203 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2012

Authors and Affiliations

  • Jing Liu
    • 1
  • Yang Xiao
    • 1
  1. 1.Department of Computer ScienceThe University of AlabamaTuscaloosaUSA

Personalised recommendations