scholarly journals A New Secure and Anonymous Metering Scheme for Smart Grid Communications

Energies ◽  
2019 ◽  
Vol 12 (24) ◽  
pp. 4751 ◽  
Author(s):  
Shaohao Xie ◽  
Fangguo Zhang ◽  
Huizhi Lin ◽  
Yangtong Tian

The smart meter is one of the most important components of the smart grid, which enables bi-directional communication between electric power providers and in-home appliances. However, the fine-grained metering mechanism that reports real-time electricity usage to the provider may result in some privacy and security issues for the owner of the smart meter. In this paper, we propose a new secure and anonymous smart metering scheme based on the technique of direct anonymous attestation and identity-based signatures. We utilize the trusted platform module to realize the tamper resistance of the smart meter. Moreover, our scheme is able to detect malfunctioning meters in which data is reported more than once in a time period. Finally, the performance and security results show that our proposed scheme is efficient and satisfies the security requirements of the smart grid communication system.

2011 ◽  
Vol 145 ◽  
pp. 364-368 ◽  
Author(s):  
Tung Hung Chueh ◽  
Huei Ru Tseng

The smart grid is a network of computers and power infrastructures that monitor and manage energy usage and uses intelligent transmission and distribution networks to deliver electricity for improving the electric system’s reliability and efficiency. With grid controls, energy transmission management could be enhanced and resilience to control-system failures would be increased. Processing chips and storage units have been embedded into traditional electricity meters, so that they are capable of performing smart functions, called smart meters. Then, smart meters communicate with electrical appliances at home as well as the generation and management facilities at the power companies. Although deploying the smart grid has numerous social and technical benefits, several security and privacy concerns arise. Attackers might compromise smart meters, eavesdrop the communication, or hack into the power company’s database, to access power consumption data of the victim, from which they learn about the victim’s daily activities. Recently, various security and privacy vulnerabilities and threats have been studied in the research literature, however, most of the problems remain yet to be addressed. Therefore, it is crucial to design secure smart grid communication protocols that could prevent all possible security vulnerabilities. In this paper, we propose an anonymous authentication protocol for securing communication among various smart meters of the smart grid. The proposed protocol can achieve key agreement between smart meters and fully protect user privacy with low computation overhead. In addition, the analysis shows that the proposed protocol can satisfy the desirable security requirements and resist several notorious attacks.


2014 ◽  
Vol 2014 ◽  
pp. 1-8
Author(s):  
Sang-Soo Yeo ◽  
Dae-il Park ◽  
Young-Ae Jung

This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.


2018 ◽  
Vol 7 (4.1) ◽  
pp. 51
Author(s):  
Ala'a Saeb Al-Sherideh ◽  
Roesnita Ismail ◽  
Fauziah Abdul Wahid ◽  
Norasikin Fabil ◽  
Waidah Ismail

Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many considerations such as the hardware characteristics, software characteristics, and communication characteristics. This article mainly gives better understanding of security requirements of mobile government applications.   


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ruijun Duan ◽  
Li Guo

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. The decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. This gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoT using the bibliometric method. The results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. This study will provide researchers with a greater understanding on the state of the art of BIoT and will serve as a reference for researchers engaging in this field to identify their own future research directions.


Author(s):  
Muhammad Aminu Lawal ◽  
Syed Raheel Hassan

Smart grids are conceived to ensure smarter generation, transmission, distribution, and consumption of electricity. It integrates the traditional electricity grid with information and communication technology. This enables a two-way communication among the smart grid entities, which translates to exchange of information about fine-grained user energy consumption between the smart grid entities. However, the flow of user energy consumption data may lead to the violation of user privacy. Inference on such data can expose the daily habits and types of appliances of users. Thus, several privacy preservation schemes have been proposed in the literature to ensure the privacy and security requirements of smart grid users. This chapter provides a review of some privacy preservation schemes. The schemes operational procedure, strengths, and weaknesses are discussed. A taxonomy, comparison table, and comparative analysis are also presented. The comparative analysis gives an insight on open research issues in privacy preservation schemes.


2022 ◽  
Vol 32 (2) ◽  
pp. 1225-1239
Author(s):  
Jingtang Luo ◽  
Jingru Liao ◽  
Chenlin Zhang ◽  
Ziqi Wang ◽  
Yuhang Zhang ◽  
...  

2022 ◽  
pp. 1398-1408
Author(s):  
Zou Ying ◽  
Wang Si-ning ◽  
Du Chang-yu ◽  
Jiang Yuan-kun

The construction of smart grid, in the meet of communication network core layer must have the strong bearing capacity and the strong network frame, also requires the access layer have the wide variety and flexible edge access ability. In this article, in accordance with the technical features of the smart grid communication network, combined with the Global Energy Interconnection to the requirement of all kinds of communication. The wireless bridge system based on the IEEE 802.11 series protocol as flexible edge access is applied to the smart grid communications, to forward the power wireless bridge structure design and the bridge monitoring management platform design and safety protection design. The use of a wireless bridge will increase the transmission quality of signal, distance and the safety of the transmission. In this article, the wireless bridge in the application of the smart grid electric power communication network has a role in promoting, has a guiding significance to the construction of the smart grid communication.


Energies ◽  
2018 ◽  
Vol 11 (11) ◽  
pp. 2972 ◽  
Author(s):  
Yuwen Chen ◽  
José-Fernán Martínez ◽  
Pedro Castillejo ◽  
Lourdes López

Smart meters are applied to the smart grid to report instant electricity consumption to servers periodically; these data enable a fine-grained energy supply. However, these regularly reported data may cause some privacy problems. For example, they can reveal whether the house owner is at home, if the television is working, etc. As privacy is becoming a big issue, people are reluctant to disclose this kind of personal information. In this study, we analyzed past studies and found that the traditional method suffers from a meter failure problem and a meter replacement problem, thus we propose a smart meter aggregation scheme based on a noise addition method and the homomorphic encryption algorithm, which can avoid the aforementioned problems. After simulation, the experimental results show that the computation cost on both the aggregator and smart meter side is reduced. A formal security analysis shows that the proposed scheme has semantic security.


2016 ◽  
Author(s):  
Jennifer Urban

*Abstract: *This chapter serves as an introduction to the privacy and security issues presented by advanced metering and other "smart grid" technologies, and to recent policy efforts to address them. The chapter introduces the recent political and economic push to move to the ‘smart grid’, describes the privacy issues presented by advanced metering technologies and the data they gather, and gives an overview of regulatory and policy efforts being made to address them as the smart grid develops.Smart electricity meters and other devices that gather or process household energy signatures at high temporal resolutions hold a great deal of promise. Among other predicted benefits, smart grid technologies are expected to better manage energy usage, enable real-time demand-response pricing, improve efficient load balancing across the grid, and increase the capacity for solar and other edge-based energy generation. These predicted benefits depend, in part, on new, richer data models of energy flow and usage. The temporally granular data collected by advanced metering technologies can reveal detailed information about intimate life within the home, raising serious questions about how to address privacy interests. Moreover, the present vision for the smart grid requires large numbers of new devices and gateways to connect from the ‘edge’ of the grid, raising security issues that require immediate and sustained attention. Recent and ongoing technical and policy efforts in the United States and elsewhere attempt to address these issues.Available at SSRN: http://ssrn.com/abstract=2632300


Sign in / Sign up

Export Citation Format

Share Document