scholarly journals Privacy Issues in Smart Grid Deployment

2016 ◽  
Author(s):  
Jennifer Urban

*Abstract: *This chapter serves as an introduction to the privacy and security issues presented by advanced metering and other "smart grid" technologies, and to recent policy efforts to address them. The chapter introduces the recent political and economic push to move to the ‘smart grid’, describes the privacy issues presented by advanced metering technologies and the data they gather, and gives an overview of regulatory and policy efforts being made to address them as the smart grid develops.Smart electricity meters and other devices that gather or process household energy signatures at high temporal resolutions hold a great deal of promise. Among other predicted benefits, smart grid technologies are expected to better manage energy usage, enable real-time demand-response pricing, improve efficient load balancing across the grid, and increase the capacity for solar and other edge-based energy generation. These predicted benefits depend, in part, on new, richer data models of energy flow and usage. The temporally granular data collected by advanced metering technologies can reveal detailed information about intimate life within the home, raising serious questions about how to address privacy interests. Moreover, the present vision for the smart grid requires large numbers of new devices and gateways to connect from the ‘edge’ of the grid, raising security issues that require immediate and sustained attention. Recent and ongoing technical and policy efforts in the United States and elsewhere attempt to address these issues.Available at SSRN: http://ssrn.com/abstract=2632300

2016 ◽  
pp. 1-12
Author(s):  
Guillermo A. Francia III ◽  
Frances Shannon Hutchinson ◽  
Xavier Paris Francia

The proliferation of the Internet has intensified the privacy protection and identity theft crises. A December 2013 report by the U.S. Department of Justice indicates that 16.6 million persons were victims of identity theft with direct and indirect losses amounting to almost $24.7 billion in 2012 (Harrell & Langton, 2013). These startling and apparently persistent statistics have prompted the United States and other foreign governments to initiate strategic plans and to enact several regulations in order to curb the crisis. This chapter surveys recently enacted national and international laws pertaining to identity theft and privacy issues. Further, it discusses the interplay between privacy and security, the various incentives and deterrence for privacy protection, and the prospects for the simulation of the social and behavioral aspects of privacy using the agent-based modeling.


Energies ◽  
2019 ◽  
Vol 12 (24) ◽  
pp. 4751 ◽  
Author(s):  
Shaohao Xie ◽  
Fangguo Zhang ◽  
Huizhi Lin ◽  
Yangtong Tian

The smart meter is one of the most important components of the smart grid, which enables bi-directional communication between electric power providers and in-home appliances. However, the fine-grained metering mechanism that reports real-time electricity usage to the provider may result in some privacy and security issues for the owner of the smart meter. In this paper, we propose a new secure and anonymous smart metering scheme based on the technique of direct anonymous attestation and identity-based signatures. We utilize the trusted platform module to realize the tamper resistance of the smart meter. Moreover, our scheme is able to detect malfunctioning meters in which data is reported more than once in a time period. Finally, the performance and security results show that our proposed scheme is efficient and satisfies the security requirements of the smart grid communication system.


2021 ◽  
Vol 17 (8) ◽  
pp. 155014772110415
Author(s):  
Otisitswe Kebotogetse ◽  
Ravi Samikannu ◽  
Abid Yahya

The electricity industry has been developed through the introduction of the smart grid. This has brought about two-way communication to the grid and its components. The smart grid has managed to increase the efficiency and reliability of the traditional power grid over the years. A smart grid has a system that is used to measure and collect readings for power consumption reflection, and the system is known as the Advanced Metering Infrastructure. The advanced metering infrastructure has its components too which are the smart metre, metre control system, collector or concentrator and communication networks (wide area network, neighbourhood area network, and home area network). The communication networks in the advanced metering infrastructure have created a vulnerability to cyber-attacks over the years. The reliability of the power grid to consumers relies on the readings from the smart metre, and this brings about the need to secure the smart metre data. This article presents a review of key management methods in advanced metering infrastructure environments. The article begins with an overview of advanced metering infrastructure and then shows the relationship between the advanced metering infrastructure and the smart grid. The review then provides the security issues related to advanced metering infrastructure. Finally, the article provides existing works of key management methods in advanced metering infrastructure and future directions in securing advanced metering infrastructure and the smart grid.


2018 ◽  
Vol 7 (2.19) ◽  
pp. 26
Author(s):  
C Bala Murugan ◽  
S Koteeswaran

IoT technology and applications represents security as a significant issue for facilitating the tremendous implementation.     Devoid of IoTs technology ensures the device level confidentiality, privacy and authenticity. The applicable users are not going to     undertake answers for security in IoT in huge scale. The earlier stage deployments of IoT devices are primarily based on RFIDs         technology which results in simplest, security solutions inside the principal been devised in an advert hoc manner [8]. This brings the fact that such deployments were typically vertically incorporated, with all additives beneath the manage of a single administrative entity. In the angle of an IoT eco-system, in which unique person may be worried in a given software state of affairs. One person owing the      physical operations of  sensors, one stakeholder deals with the statistics and processing them and other numerous stakeholders supplies different services based totally on such statistics to the customers. This leads to numerous variety of safety demanding situations and security for the IoT. In this paper, we address the revisited security issues and discuss the critical safety protection conditions of Internet of Things era into a mainstream. To support this, the three key problems requiring cutting-edge techniques includes are data               confidentiality, privacy and trust.In this review, we presented net factors with architectural design goals of IoT. We surveyed security and privacy issues in IoTs. Also the discussion on several open issues based on the privacy and security is addressed. Many real time applications of IoTs in real life treats the security issues of IoT as a main factor. Thus the IoT of complicated security issues have been anticipated the researchers to address. 


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4862 ◽  
Author(s):  
Tejasvi Alladi ◽  
Vinay Chamola ◽  
Joel J. P. C. Rodrigues ◽  
Sergei A. Kozlov

With the integration of Wireless Sensor Networks and the Internet of Things, the smart grid is being projected as a solution for the challenges regarding electricity supply in the future. However, security and privacy issues in the consumption and trading of electricity data pose serious challenges in the adoption of the smart grid. To address these challenges, blockchain technology is being researched for applicability in the smart grid. In this paper, important application areas of blockchain in the smart grid are discussed. One use case of each area is discussed in detail, suggesting a suitable blockchain architecture, a sample block structure and the potential blockchain technicalities employed in it. The blockchain can be used for peer-to-peer energy trading, where a credit-based payment scheme can enhance the energy trading process. Efficient data aggregation schemes based on the blockchain technology can be used to overcome the challenges related to privacy and security in the grid. Energy distribution systems can also use blockchain to remotely control energy flow to a particular area by monitoring the usage statistics of that area. Further, blockchain-based frameworks can also help in the diagnosis and maintenance of smart grid equipment. We also discuss several commercial implementations of blockchain in the smart grid. Finally, various challenges to be addressed for integrating these two technologies are discussed.


Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2088
Author(s):  
Hyeongyun Moon ◽  
Daejin Park

The paradigm of Internet-of-things (IoT) systems is changing from a cloud-based system to an edge-based system. These changes were able to solve the delay caused by the rapid concentration of data in the communication network, the delay caused by the lack of server computing capacity, and the security issues that occur in the data communication process. However, edge-based IoT systems performance was insufficient to process large numbers of data due to limited power supply, fixed hardware functions, and limited hardware resources. To improve their performance, application-specific hardware can be installed in edge devices, but performance cannot be improved except for specific applications due to a fixed function of an application-specific hardware. This paper introduces an edge-centric metamorphic IoT (mIoT) platform that can use various hardware modules through on-demand partial reconfiguration, despite the limited hardware resources of edge devices. In addition, this paper introduces an RISC-V based metamorphic IoT processor (mIoTP) with reconfigurable peripheral modules. We experimented to prove that the proposed structure can reduce the server access of edges and can be applied to a large-scale IoT system. Experiments were conducted in a single-edge environment and a large-scale environment combining one physical edge and 99 virtual edges. According to the experimental results, the edge-centric mIoT platform that executes the reconfiguration prediction algorithm at the edge was able to reduce the number of server accesses by up to 82.2% compared to our previous study in which the prediction process was executed at the server. Furthermore, we confirmed that there is no additional reconfiguration time overhead even for the large IoT systems.


2014 ◽  
Author(s):  
Constantin SPÂNU

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Social network users may not be aware of such threats. Therefore, this paper will present a survey on different privacy and security issues in online social networks. The issues include privacy issues, identity theft, social networks spam, social networks malware, and physical threats. Social network privacy issues, social network security issues, social network threats, identity Theft, social network spam, social network malware, Facebook worms, Twitter Worms.


2011 ◽  
Vol 2 (1) ◽  
pp. 14-21
Author(s):  
SSM Sadrul Huda ◽  
Md. Gazi Salah Uddin .

The forecasted number of mobile phone users will be around 70 million at the end of 2011. This statement makes everybody remind the quick emergence of cell phone and shows the strong and fastest growth in mobile phone industry which also reminds the importance of mobile phone retailers. No doubt, that mobile phone services are an important contributor to the cash-strapped nation's economy. When this industry is booming out, the safety and security issue related to the use of mobile phone has come up with a great concern. The development of mobile technology has positioned privacy and security into risk to its users.) This risk hampers the daily economic activities thus the economic growth and development. This study concerns about how personal, social and economic safety and security, health and privacy issues can be hampered by the misuse of mobile phone (threat, harassment). This study also concerns whether crime committing has become more organized with the help of mobile technology. And whether there should be a clear law to protect general people from harassment through mobile phone. Lastly this study comes up with the decision that whether the misuse of mobile phone (threat, harassment), hampers economic activities which have an adverse affect on economic development. The target population for his study is the micro entrepreneurs in Dhaka who inseparably depend on mobile phone for their business communication as well as the users of mobile phone are the target population of this study. The sample size is one hundred and four (104) micro entrepreneurs and users in Dhaka. The sample size is one hundred and four micro entrepreneurs and users in Dhaka. The structured questionnaire based on Likert scale has been used to ask the respondents to indicate their agreement or disagreement on a five point scale ranging from strongly agrees. The study comes up with the findings that misuse of mobile phone (threat, harassment), hampers economic activity thus have an adverse affect on economic development.


Author(s):  
D. Patel

Power grids are under pressure to meet the growing demand for electricity within a stable and sustainable distribution system. These challenges drive the evolution of smart grids. The smart grid involves various forms of technology, specifically advanced metering infrastructure (AMI). Deployment of AMI technologies, by utility companies, is rolling out all over the United States of America (U.S.). However customers have not been using the technologies to its full potential. Engaging communities, particularly lower income communities, to take full advantage of AMI technologies is an important first step in building social equity through the smart grid. Increasing resiliency of the grid infrastructure in these communities provides opportunities for strategic rebuilding, eective carbon drawdown, and opportunities for jobs creation.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Wenzhi Cheng ◽  
Wei Ou ◽  
Xiangdong Yin ◽  
Wanqin Yan ◽  
Dingwan Liu ◽  
...  

The collection and analysis of patient cases can effectively help researchers to extract case feature and to achieve the objectives of precision medicine, but it may cause privacy issues for patients. Although encryption is a good way to protect privacy, it is not conducive to the sharing and analysis of medical cases. In order to address this problem, this paper proposes a federated learning verification model, which combines blockchain technology, homomorphic encryption, and federated learning technology to effectively solve privacy issues. Moreover, we present a FL-EM-GMM Algorithm (Federated Learning Expectation Maximization Gaussian Mixture Model Algorithm), which can make model training without data exchange for protecting patient’s privacy. Finally, we conducted experiments on the federated task of datasets from two organizations in our model system, where the data has the same sample ID with different subset features, and this system is capable of handling privacy and security issues. The results show that the model was trained by our system with better usability, security, and higher efficiency, which is compared with the model trained by traditional machine learning methods.


Sign in / Sign up

Export Citation Format

Share Document