Abstract
The smart grid is regarded as one of the important application field of the Internet of Things (IoT) composed of embedded sensors, which sense and control the behavior of the energy world. IoT is attractive for features of grid catastrophe prevention and decrease of grid transmission line and reliable load fluctuation control. Automated Demand Response (ADR) in smart grids maintain demand-supply stability and in regulating customer side electric energy charges. An important goal of IoT-based demand-response using IoT is to enable a type of DR approach called automatic demand bidding (ADR-DB). However, compromised information board can be injected into during the DR process that influences the data privacy and security in the ADR-DB bidding process, while protecting privacy oriented consumer data is in the bidding process is must. In this work, we present a bidding approach that is secure and private for incentive-based ADR system. We use cryptography method instead of using any trusted third-party for the security and privacy. We show that proposed ADR bidding are computationally practical through simulations performed in three simulation environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bhuiyan, M.Z.A., Wang, T., Hayajneh, T., Weiss, G.M.: Maintaining the balance between privacy and data integrity in Internet of Things. In: Proceedings of ACM ICMSS 2017, pp. 177–182 (2017)
Bhuiyan, M.Z.A., Wu, J.: Collusion attack detection in networked systems. In: Proceedings of IEEE DASC, pp. 1–8 (2016)
Liu, H., Xu, M., Wu, Y., Zheng, N., Chen, Y., Bhuiyan, M.Z.A.: Resilient bipartite consensus for multi-agent networks with antagonistic interaction. In: Proceedings of IEEE TrustCom 2018, pp. 1–8 (2018)
Liu, Y., Guan, X.: Purchase allocation and demand bidding in electric power markets. IEEE Trans. Power Syst. 18(2), 106–112 (2003)
Lu, L., Zhu, X., Zhang, X., Liu, J., Bhuiyan, M.Z.A., Cui, G.: Intrusion detection method based on uniformed conditional dynamic mutual information. In: Proceedings of IEEE TrustCom 2018, pp. 1–7 (2018)
Luo, E., Bhuiyan, M.Z.A., Wang, G., Rahman, M.A., Wu, J., Atiquzzaman, M.: Privacyprotector: privacy-protected patient data collection in IoT-based healthcare systems. IEEE Commun. Mag. (COMMAG) 56(2), 163–168 (2018)
Rahman, F., Bhuiyan, M.Z.A., Ahamed, S.I.: A privacy preserving framework for RFID based healthcare systems. Futur. Gener. Comput. Syst. (FGCS) 72, 339–352 (2017)
Rahman, M.S., Basua, A., Kiyomotoa, S., Bhuiyan, M.Z.A.: Privacy-friendly secure bidding for smart grid demand-response. Inf. Sci. 379(10), 229–240 (2017)
Saleem, Y., Crespi, N., Rehmani, M.H., Copeland, R.: Internet of Things-aided smart grid: technologies, architectures, applications, prototypes, and future research directions. Technical report (2017). https://arxiv.org/ftp/arxiv/papers/1704/1704.08977.pdf
Tao, H., Bhuiyan, M.Z.A., Abdalla, A., Hassan, M., Jain, J., Hayajneh, T.: Secured data collection with hardware-based ciphers for IoT-based healthcare. IEEE Internet Things J. (IEEE IoT-J), 1–10 (2018). https://doi.org/10.1109/JIOT.2018.2854714
Tarasak, P., Chai, C.C., Kwok, Y.S., Wah, S.: Demand bidding program and its application in hotel energy management. IEEE Trans. Smart Grid 5(2), 821–829 (2014)
Wang, T., Bhuiyan, M.Z.A., Wang, G., Rahman, M.A., Wu, J., Cao, J.: Big data reduction for smart city’s critical infrastructural health monitoring. IEEE Commun. Mag. (COMMAG) 56(3), 128–133 (2018)
Wang, T., et al.: Fog-based storage technology to fight with cyber threat. Futur. Gener. Comput. Syst. (FGCS) 83, 208–218 (2018)
Weng, Y., Negi, R., Faloutsos, C., Ilić, M.D.: Robust data-driven state estimation for smart grid. IEEE Trans. Power Syst. 8(4), 1956–1967 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Bhuiyan, M.Z.A., Zaman, M., Wang, G., Wang, T., Rahman, M.A., Tao, H. (2019). Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid. In: Pathan, AS., Fadlullah, Z., Guerroumi, M. (eds) Smart Grid and Internet of Things. SGIoT 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 256. Springer, Cham. https://doi.org/10.1007/978-3-030-05928-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-05928-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05927-9
Online ISBN: 978-3-030-05928-6
eBook Packages: Computer ScienceComputer Science (R0)