Security Analysis of an Identity-Based Data Aggregation Protocol for the Smart Grid

Author(s):  
Zhiwei Wang ◽  
Hao Xie ◽  
Yumin Xu
2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Debiao He ◽  
Sherali Zeadally ◽  
Huaqun Wang ◽  
Qin Liu

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the last several years. However, most of them suffer from security weaknesses or have poor performances. To reduce computation cost and achieve better security, we construct a lightweight data aggregation scheme against internal attackers in the smart grid environment using Elliptic Curve Cryptography (ECC). Security analysis of our proposed approach shows that it is provably secure and can provide confidentiality, authentication, and integrity. Performance analysis of the proposed scheme demonstrates that both computation and communication costs of the proposed scheme are much lower than the three previous schemes. As a result of these aforementioned benefits, the proposed lightweight data aggregation scheme is more practical for deployment in the smart grid environment.


2017 ◽  
Vol 2017 ◽  
pp. 1-8 ◽  
Author(s):  
Zhiwei Wang ◽  
Hao Xie

Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isolated smart grid devices. Our protocol consists of an encryption scheme with additively homomorphic property and a linearly homomorphic signature scheme, where the linearly homomorphic signature scheme is suitable for privacy-preserving data aggregation. We also provide security analysis of our protocol in the context of some typical attacks in smart grid. The implementation of our protocol on the Intel Edison platform shows that our protocol is efficient enough for the physical constrained devices, like smart meters.


2020 ◽  
pp. 1-1
Author(s):  
Jiawei Qian ◽  
Zhenfu Cao ◽  
Xiaolei Dong ◽  
Jiachen Shen ◽  
Zhusen Liu ◽  
...  
Keyword(s):  

2021 ◽  
pp. 1-1
Author(s):  
Hafiz Muhammad Sanaullah Badar ◽  
Salman Qadri ◽  
Salman Shamshad ◽  
Muhammad Faizan Ayub ◽  
Khalid Mahmood ◽  
...  

2020 ◽  
Vol 14 (2) ◽  
pp. 2066-2077
Author(s):  
Yuwen Chen ◽  
Jose-Fernan Martinez-Ortega ◽  
Pedro Castillejo ◽  
Lourdes Lopez

2021 ◽  
Author(s):  
Yilin Yuan ◽  
Jianbiao Zhang ◽  
Wanshan Xu ◽  
Xiao Wang ◽  
Yanhui Liu

Abstract Under the shared big data environment, most of the existing data auditing schemes rarely consider the authorization management of group users. Meanwhile, how to deal with the shared data integrity is a problem that needs to be pondered. Thus, in this paper, we propose a novel remote data checking possession scheme which achieves group authority management while completing the public auditing. To perform authority management work, we introduce a trusted entity – group manager. We formalize a new algebraic structure operator named authorization invisible authenticator (AIA). Meanwhile, we provide two versions of AIA scheme: basic AIA scheme and standard AIA scheme. The standard AIA scheme is constructed based on the basic AIA scheme and user information table (UIT), with advanced security and wider applicable scenarios. By virtue of standard AIA scheme, the group manager can perfectly and easily carry out authority management, including enrolling, revoking, updating. On the basis of the above, we further design a public auditing scheme for non-revoked users’ shared data. The scheme is based on identity-based encryption (IBE), which greatly reduce the necessary certificate management cost. Furthermore, the detailed security analysis and performance evaluation demonstrate that the scheme is safe and feasible.


Sign in / Sign up

Export Citation Format

Share Document