Skip to main content

Smart Grid Security Security and Privacy of Customer-Side Networks

  • Chapter
  • First Online:
Security and Privacy in Smart Grid

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

Abstract

Smart grid technology has to consider many concerns due to network performance and security requirements. The security concerns for smart grid are varied according to the applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. H. Khurana, M. Hadley, N. Lu, and D. Frincke, “Smart-Grid Security Issues,” IEEE Computer and Reliability Societies, pp. 81–85, January/February 2010.

    Article  Google Scholar 

  2. R. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. Overbye, “Detecting false data injection attacks on DC state estimation,” in Proc. CPSWEEK, Sweden, April 2010.

    Google Scholar 

  3. S. Cui, Z. Han, S. Kar, T. Kim, H. Poor, and A. Tajer, “Coordinated Data-Injection Attack and Detection in Smart Grid,” IEEE Signal Processing Magazine, special issue on Signal Processing for Smart Grid, vol. 29, no. 5, pp. 106–115, September 2012.

    Google Scholar 

  4. B. Gou, and A. Abur, “An Improved Measurement Placement Algorithm for Network Observability,” IEEE Transactions on Power Systems, vol. 16, no. 4, pp. 819–824, November 2001.

    Google Scholar 

  5. S. Boyd, and L. Vandenberghe, Convex Optimization. Cambridge Univ. Press, U.K, 2004.

    Google Scholar 

  6. Y. Liu, P. Ning, and M. Reiter, “False Data Injection Attacks against State Estimation in Electric Power Grids,” ACM Transactions on Information and System Security, vol. 14, no. 1, Article. 13, May 2011.

    Article  Google Scholar 

  7. M. Rahman, E. Al-Shaer, and M. Rahman, “A Formal Model for Verifying Stealthy Attacks on State Estimation in Power Grids,” in Proc. IEEE SmartGridComm, Canada, October 2013.

    Google Scholar 

  8. Available: http://mathworld.wolfram.com/ChiDistribution.html [Accessed 8 May 2013]

  9. Y. Mo, T. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, “Cyber-Physical Security of a Smart Grid Infrastructure,” Proceedings of the IEEE, vol. 100, no. 1, pp. 195–209, January 2012.

    Article  Google Scholar 

  10. R. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key crypto-systems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.

    Article  MathSciNet  Google Scholar 

  11. O. Tan, D. Gunduz, and H. Poor, “Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1331–1341, July 2013.

    Article  Google Scholar 

  12. Z. Chen, and L. Wu, “Residential Appliance DR Energy Management With Electric Privacy Protection by Online Stochastic Optimization,” IEEE Transactions on Smart Grid, vol. 4, no. 4, pp. 1861–1869, December 2013.

    Article  MathSciNet  Google Scholar 

  13. X. He, X. Zhang, and C. Kuo, “A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids,” IEEE Access: practical innovations: open solutions, vol. 1, pp. 67–78, May 2013.

    Google Scholar 

  14. W. Jia, H. Zhu and C. Xiao, “Human-factor-aware privacy-preserving aggregation in smart grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 598–607, June 2014.

    Article  Google Scholar 

  15. G. Kalogridis, M. Sooriyabandara, Z. Fan, and M. Mustafa, “Toward Unified Security and Privacy Protection for Smart Meter Networks,” IEEE Systems Journal, vol. 8, no. 2, pp. 641–654, June 2014.

    Article  Google Scholar 

  16. V. Namboodiri, V. Aravinthan, S. Mohapatra, B. Karimi, and W. Jewell, “Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids,” IEEE Systems Journal, vol. 8, no. 2, pp. 509–520, August 2013.

    Article  Google Scholar 

  17. A. Metke, and R. Ekl, “Security Technology for Smart Grid Networks,” IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99–107, June 2010.

    Article  Google Scholar 

  18. Z. Fadlullah, N. Kato, R. Lu, X. Shen, and Y. Nozaki, “Toward secure targeted broadcast in smart grid,” IEEE Communications Magazine, pp. 150–156, May 2012.

    Article  Google Scholar 

  19. N. Saxena, S. Grijalva, and B. Choi, “Securing Restricted Publisher-Subscriber Communications in Smart Grid Substations,” in Proc. COMSNETS, India, January 2018.

    Google Scholar 

  20. A. Chowdhury and P. Ramanathan, “PPU: Privacy-Aware Purchasing Unit for Residential Customers in Smart Electric Grids,” in Proc. International Conference on VLSI Design and Embedded Systems, India, January 2018

    Google Scholar 

  21. M. Smith and M. Paté-Cornell, “Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multiarmed Bandit Approach to Cyber Security Investment,” IEEE Transactions on Engineering Management, vol. PP, no. 99, February 2018.

    Google Scholar 

  22. F. Knirsch, D. Engel, and Z. Erkin, “A Fault-tolerant and Efficient Scheme for Data Aggregation Over Groups in the Smart Grid,” in Proc. IEEE WIFS, France, December 2017?

    Google Scholar 

  23. D. Abbasinezhad-Mood and M. Nikooghadam, “Anonymous ECC-Based Self-Certified Key Distribution Scheme for Smart Grid,” IEEE Transactions on Industrial Electronics, vol. PP, no. 99, February 2018.

    Google Scholar 

  24. D. He, C. Chen, J. Bu, S. Chan, Y. Zhang, and M. Guizani, “Secure service provision in smart grid communications,” IEEE Communications Magazine, pp. 53–61, August 2012.

    Article  Google Scholar 

  25. V. Goyal, A. Sahai, O. Pandey, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. ACM CCS, USA, October/November 2006.

    Google Scholar 

  26. J. Liu, Y. Xiao, and J. Gao, “Achieving accountability in smart grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 493–508, June 2014.

    Article  Google Scholar 

  27. S. Ruj and A. Nayak, “A decentralized security framework for data aggregation and access control in smart grids,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 196–205, March 2013.

    Article  Google Scholar 

  28. Y. Kim and J. Heo, “Device authentication protocol for smart grid systems using homomorphic hash,” Journal of Communications and Networks, vol. 14, no. 6, pp. 606–613, December 2012.

    Article  Google Scholar 

  29. H. Li, X. Lin and X. Shen, “EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2053–2064, August 2014.

    Article  Google Scholar 

  30. R. Lu, X. Liang and X. Shen, “EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, September 2012.

    Article  Google Scholar 

  31. X. Li, X. Liang, X. Shen and H. Zhu, “Securing smart grid cyber attacks, countermeasures, and challenges,” IEEE Communications Magazine, pp. 38–45, August 2012.

    Article  Google Scholar 

  32. Y. Liu, W. Guo, C. Fan, L. Chang, and C. Cheng, “A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid,” IEEE Transactions on Industrial Informatics, vol. PP, no. 99, February 2018

    Google Scholar 

  33. S. Das,Y. Ohba, M. Kanda, D. Famolari, and S. Das, “A Key Management Framework for AMI Networks in Smart Grid,” IEEE Communications Magazine, pp. 30–37, August 2012.

    Article  Google Scholar 

  34. N. Liu, J. Chen, L. Zhu, J. Zhang, and Y. He, “A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid,” IEEE Transactions on Industrial Electronics, vol. 60, no. 10, pp. 4746–4756, October 2013.

    Article  Google Scholar 

  35. M. Fouda, Z. Fadlullah, N. Kato, R. Lu and X. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 675–685, December 2011.

    Article  Google Scholar 

  36. H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, “An efficient merkle tree-based authentication scheme for smart grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 655–663, June 2014

    Article  Google Scholar 

  37. Y. Yan, R. Hu, S. Das, H. Sharif and Y. Qian, “An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid,” IEEE Network, pp. 64–71, July/August 2013

    Google Scholar 

  38. H. Nicanfar, P. Jokar and V. Leung, “Efficient authentication and key management mechanisms for smart grid communications,” IEEE Systems Journal, vol. 8, no. 2, pp. 629–640, June 2014.

    Article  Google Scholar 

  39. C. Fan and Y. Lai, “Privacy enhanced data aggregation scheme against internal attackers in smart grid,” IEEE Transactions on Industrial informatics, vol. 10, no. 1, pp. 666–675, February 2014.

    Article  Google Scholar 

  40. C. Rottondi and C. Krauß, “Distributed privacy-preserving aggregation of metering data in smart grids,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1342–1354, July 2013.

    Article  Google Scholar 

  41. T. Chim, S. Yiu and V. Li, “Privacy-preserving advance power reservation,” IEEE Communications Magazine, pp. 18–23, August 2012.

    Article  Google Scholar 

  42. A. Abdallah, and X. Shen, “A Lightweight Lattice-based Security and Privacy-Preserving Scheme for Smart Grid,” in Proc. IEEE GLOBECOM, USA, December 2014.

    Google Scholar 

  43. A. Abdallah, and X. Shen, “Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-side Networks,” IEEE Transaction on Smart Grid, vol. 8, no. 3, pp. 1064–1074, 2017.

    Article  Google Scholar 

  44. Y. Yan, Y. Qian, and H. Sharif, “A secure data aggregation and dispatch scheme for home area networks in smart grid,” in Proc. IEEE GLOBECOM, USA, December 2011.

    Google Scholar 

  45. A. Abdallah, and X. Shen, “Lightweight Lattice-based Homomorphic Privacy-Preserving Aggregation Scheme for Home Area Networks,” in Proc. WCSP, China, October 2014.

    Google Scholar 

  46. A. Abdallah, and X. Shen, “A Lightweight Lattice-based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid,” IEEE Transaction on Smart Grid, vol. 9, no. 1, pp. 396–405, 2018.

    Article  Google Scholar 

  47. C. Melchor G. Castagnos, and P. Gaborit, “Lattice-based homomorphic encryption of vector spaces,” in Proc. IEEE ISIT, Canada, July 2008.

    Google Scholar 

  48. C. Melchor, and P. Gaborit, “A lattice-based computationally-efficient private information retrieval protocol,” in Proc. WEWoRC, Germany, July 2007.

    Google Scholar 

  49. Smart Grid Smart City, [Online]. Available: https://data.gov.au/dataset/smart-grid-smart-city-customer-trial-data/resource/63d2b1cd-f453-4440-8bb7-ed083326f5ae'inner_span=True. [Accessed 20 January 2016]

  50. Rasberry PI, [Online]. Available: https://www.raspberrypi.org [Accessed 20 January 2016]

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s), under exclusive license to Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Abdallah, A., Shen, X. (2018). Smart Grid Security Security and Privacy of Customer-Side Networks. In: Security and Privacy in Smart Grid. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-93677-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93677-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93676-5

  • Online ISBN: 978-3-319-93677-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics