Advertisement

Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid

  • Md Zakirul Alam Bhuiyan
  • Mdaliuz Zaman
  • Guojun WangEmail author
  • Tian Wang
  • Md. Arafat Rahman
  • Hai Tao
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 256)

Abstract

The smart grid is regarded as one of the important application field of the Internet of Things (IoT) composed of embedded sensors, which sense and control the behavior of the energy world. IoT is attractive for features of grid catastrophe prevention and decrease of grid transmission line and reliable load fluctuation control. Automated Demand Response (ADR) in smart grids maintain demand-supply stability and in regulating customer side electric energy charges. An important goal of IoT-based demand-response using IoT is to enable a type of DR approach called automatic demand bidding (ADR-DB). However, compromised information board can be injected into during the DR process that influences the data privacy and security in the ADR-DB bidding process, while protecting privacy oriented consumer data is in the bidding process is must. In this work, we present a bidding approach that is secure and private for incentive-based ADR system. We use cryptography method instead of using any trusted third-party for the security and privacy. We show that proposed ADR bidding are computationally practical through simulations performed in three simulation environments.

Keywords

Internet of Things (IoT) Smart grid Demand response Security attack Privacy Compromised information injection 

References

  1. 1.
    Bhuiyan, M.Z.A., Wang, T., Hayajneh, T., Weiss, G.M.: Maintaining the balance between privacy and data integrity in Internet of Things. In: Proceedings of ACM ICMSS 2017, pp. 177–182 (2017)Google Scholar
  2. 2.
    Bhuiyan, M.Z.A., Wu, J.: Collusion attack detection in networked systems. In: Proceedings of IEEE DASC, pp. 1–8 (2016)Google Scholar
  3. 3.
    Liu, H., Xu, M., Wu, Y., Zheng, N., Chen, Y., Bhuiyan, M.Z.A.: Resilient bipartite consensus for multi-agent networks with antagonistic interaction. In: Proceedings of IEEE TrustCom 2018, pp. 1–8 (2018)Google Scholar
  4. 4.
    Liu, Y., Guan, X.: Purchase allocation and demand bidding in electric power markets. IEEE Trans. Power Syst. 18(2), 106–112 (2003)Google Scholar
  5. 5.
    Lu, L., Zhu, X., Zhang, X., Liu, J., Bhuiyan, M.Z.A., Cui, G.: Intrusion detection method based on uniformed conditional dynamic mutual information. In: Proceedings of IEEE TrustCom 2018, pp. 1–7 (2018)Google Scholar
  6. 6.
    Luo, E., Bhuiyan, M.Z.A., Wang, G., Rahman, M.A., Wu, J., Atiquzzaman, M.: Privacyprotector: privacy-protected patient data collection in IoT-based healthcare systems. IEEE Commun. Mag. (COMMAG) 56(2), 163–168 (2018)CrossRefGoogle Scholar
  7. 7.
    Rahman, F., Bhuiyan, M.Z.A., Ahamed, S.I.: A privacy preserving framework for RFID based healthcare systems. Futur. Gener. Comput. Syst. (FGCS) 72, 339–352 (2017)CrossRefGoogle Scholar
  8. 8.
    Rahman, M.S., Basua, A., Kiyomotoa, S., Bhuiyan, M.Z.A.: Privacy-friendly secure bidding for smart grid demand-response. Inf. Sci. 379(10), 229–240 (2017)CrossRefGoogle Scholar
  9. 9.
    Saleem, Y., Crespi, N., Rehmani, M.H., Copeland, R.: Internet of Things-aided smart grid: technologies, architectures, applications, prototypes, and future research directions. Technical report (2017). https://arxiv.org/ftp/arxiv/papers/1704/1704.08977.pdf
  10. 10.
    Tao, H., Bhuiyan, M.Z.A., Abdalla, A., Hassan, M., Jain, J., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. (IEEE IoT-J), 1–10 (2018).  https://doi.org/10.1109/JIOT.2018.2854714
  11. 11.
    Tarasak, P., Chai, C.C., Kwok, Y.S., Wah, S.: Demand bidding program and its application in hotel energy management. IEEE Trans. Smart Grid 5(2), 821–829 (2014)CrossRefGoogle Scholar
  12. 12.
    Wang, T., Bhuiyan, M.Z.A., Wang, G., Rahman, M.A., Wu, J., Cao, J.: Big data reduction for smart city’s critical infrastructural health monitoring. IEEE Commun. Mag. (COMMAG) 56(3), 128–133 (2018)CrossRefGoogle Scholar
  13. 13.
    Wang, T., et al.: Fog-based storage technology to fight with cyber threat. Futur. Gener. Comput. Syst. (FGCS) 83, 208–218 (2018)CrossRefGoogle Scholar
  14. 14.
    Weng, Y., Negi, R., Faloutsos, C., Ilić, M.D.: Robust data-driven state estimation for smart grid. IEEE Trans. Power Syst. 8(4), 1956–1967 (2017)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Department of Computer and Information ScienceFordham UniversityNew York CityUSA
  2. 2.School of Computer Science and Educational SoftwareGuangzhou UniversityGuangzhouChina
  3. 3.Department of Computer Science and TechnologyHuaqiao UniversityXiamenChina
  4. 4.Faculty of Computer Systems and Software EngineeringUniversiti Malaysia PahangPekanMalaysia
  5. 5.Department of Computer ScienceBaoji University of Arts and SciencesBaojiChina

Personalised recommendations