Abstract
This chapter contextualizes the role of smart meters in smart grid initiatives around the world to show that the smart grid concept goes beyond energy supplier modernization. In addition, this chapter presents the security model and the privacy model for Privacy-Preserving Protocols (PPPs). Security is ensured by means of cryptography, and privacy is protected by aggregation of encrypted measurements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
On January 1, 2015.
- 3.
Directive 2012/27/EU of 25 October 2012 published on the Official Journal L No.315, 25 Oct 2012.
- 4.
On January 1, 2015.
- 5.
- 6.
Energy roadmap 2050—EU—doi:10.2833/10759.
- 7.
On January 1, 2015.
- 8.
- 9.
NIST Special Publication 1108R2.
- 10.
NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid.
- 11.
References
F. Borges, L.A. Martucci, M. Mühlhäuser, Analysis of privacy-enhancing protocols based on anonymity networks, in 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm) (2012), pp. 378–383. doi:10.1109/SmartGridComm.2012.6486013
F. Borges et al., Secure and privacy-friendly public key generation and certification, in 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2014), pp. 114–121. doi:10.1109/TrustCom.2014.19
W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inform. Theory 22 (6), 644–654 (1976). issn:0018-9448. doi:10.1109/TIT.1976.1055638
P. Fox-Penner, Smart Power: Climate Change, the Smart Grid, and the Future of Electric Utilities (Island Press, Washington, DC, 2010). isbn:9781597268097
F. Katiraei, C. Sun, B. Enayati, No inverter left behind: protection, controls, and testing for high penetrations of pv inverters on distribution systems. IEEE Power Energ. Mag. 13 (2), 43–49 (2015). issn:1540-7977. doi:10.1109/MPE.2014.2380374
S. Li, K. Choi, K. Chae, An enhanced measurement transmission scheme for privacy protection in smart grid, in 2013 International Conference on Information Networking (ICOIN) (2013), pp. 18–23. doi:10.1109/ICOIN.2013.6496345
D. Novosel, V. Rabl, J. Nelson, A report to the U.S. DOE: IEEE shares its insights on priority issues [leader’s corner]. IEEE Power Energ. Mag. 13 (2), 6–12 (2015). issn:1540–7977. doi:10.1109/MPE.2014.2374971
T.G. Paraskevakos, Sensor monitoring device. US Patent 3,842,208 (1974). http://www.google.com/patents/US3842208
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Advances in Cryptology - EUROCRYPT 1999, vol. 1592. Lecture Notes in Computer Science (Springer, Berlin, 1999), pp. 223–238. isbn:978-3-540-65889-4
C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28 (4), 656–715 (1949). issn:0005-8580. doi:10.1002/j.1538-7305.1949.tb00928.x
J. Vasconcelos, Survey of regulatory and technological developments concerning smart metering in the European Union electricity market (2008). issn:1830-1541. http://hdl.handle.net/1814/9267
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Borges de Oliveira, F. (2017). Background and Models. In: On Privacy-Preserving Protocols for Smart Metering Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-40718-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-40718-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-40717-3
Online ISBN: 978-3-319-40718-0
eBook Packages: EngineeringEngineering (R0)