Skip to main content

Privacy-Preserving Meter Reading Transmission in Smart Grid

  • Chapter
  • First Online:
Book cover Secure and Privacy-Preserving Data Communication in Internet of Things

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSSIGNAL))

Abstract

In this chapter, the area of smart grid and privacy preservation schemes are discussed and compared in detail. Existing power grids generally carry energy from central locations to a large cluster of customers, such as a housing estate or an apartment block. Smart grid uses two-way flow using energy and information to increase automation and to better distribute energy flow throughout the grid. Smart grid utilizes modern technologies to deliver energy efficiently, and to respond to events within the grid, such as a power line failure (Gungor and Hancke, IEEE Trans Ind Electron 57(10):3357–3564, 2010, [1]).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. V. C. Gungor, B. Lu, and G. P. Hancke. 2010. Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10): 3357–3564.

    Google Scholar 

  2. X. Fang, S. Misra, G. Xue, and D. Yang. 2012. Smart grid - The new and improved power grid: A survey. IEEE Communications Surveys & Tutorials, 14(4): 944–980.

    Google Scholar 

  3. Z. M. Fadlullah, M. M. Fouda, X. S. Shen, Y. Nozaki, and N. Kato. 2011. An early warning system against malicious activities for smart grid communications. IEEE Network Magazine, 25(5): 50–55.

    Google Scholar 

  4. Z. Michael and K. Roth. 2011. Nonintrusive appliance load monitoring: Review and outlook. IEEE Transactions on Consumer Electronics, 57(1): 76–84.

    Google Scholar 

  5. D. J. Hess and J. Coley. 2014. Wireless smart meters and public acceptance: The environment, limited choices, and precautionary politics. Public Understanding of Science, 23(6): 688–702.

    Google Scholar 

  6. F. G. M\(\acute{a}\)rmol, C. Sorg, O, Ugus, and G. M. P\(\acute{e}\)rez. 2012. Do not snoop my habits: preserving privacy in the smart grid. IEEE Communications Magazine, 50(5): 166–172.

    Google Scholar 

  7. H. Farhangi. 2010. The power of smart grid. IEEE power and energy magazine, 8(1): 18–28.

    Google Scholar 

  8. H. Khurana, M. Hadley, N. Lu, and D. A. Frincke. 2010. Smart-grid security issues. IEEE Security & Privacy, 1(8): 81–85.

    Google Scholar 

  9. P. Jokar, N. Arianpoo, and V. Leung. 2012. A survey on security issues in smart grids. Security and Communication Networks, 9(3): 262–273.

    Google Scholar 

  10. G. Kalogridis, C. Efthymiou, S. Z. Denic, T. A. Lewis, and R. Cepeda. 2010. Privacy for smart meters: Towards undetectable appliance load signatures. Proc. of the 1st IEEE International Conference on Smart Grid Communications(SmartGridComm), 232–237.

    Google Scholar 

  11. B. Michael and M. Sebastian. 2014. Differentially private smart metering with battery recharging. Springer Berlin Heidelberg, 8247: 194–212.

    Google Scholar 

  12. Y. Simmhan, A. G. Kumbhare, B. Cao, and V. Prasanna. 2011. An analysis of security and privacy issues in smart grid software architectures on clouds. Proc. of the 4th IEEE International Conference Cloud Computing (CLOUD)’11, 582–589.

    Google Scholar 

  13. X. Li, X. Liang, R. Lu, X. Sheng, X. Lin, and H. Zhu. 2012. Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine, 50(8): 38–45.

    Google Scholar 

  14. Q. Li and G. Cao. 2011. Multicast authentication in the smart grid with one-time signature. IEEE Transactions on Smart Grid, 2(4): 686–696.

    Google Scholar 

  15. C. Efthymiou and G. Kalogridis. 2010. Smart Grid Privacy via Anonymization of Smart Metering Data. Proc. of the 1st IEEE International Conference on Smart Grid Commnications(SmartGridComm), 238–243.

    Google Scholar 

  16. W. Wang and Z. Lu. 2013. Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5): 1344–1371.

    Google Scholar 

  17. The Smart Grid Interoperability Panel -Cyber Security Working Group, Guidelines for smart grid cyber security. NISTIR, 7628: 1–597.

    Google Scholar 

  18. S. McLaughlin, P. McDaniel, and D. Podkuiko. 2009. Energy theft in the advance metering infrastructure. Proc. of the 4th International Workshop on Critical Information Infrastructures Security’09, 15(1):129–142.

    Google Scholar 

  19. F. Li, B. Luo, and P. Liu. 2010. Secure information aggregation for smart grids using homomorphic encryption. Proc. of the 1st IEEE International Conference on Smart Grid Commnications(SmartGridComm), 45(2): 327–332.

    Google Scholar 

  20. M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. Shen. 2011. A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4): 675–685.

    Google Scholar 

  21. A. Perrig. 2001. The BiBa one-time signature and broadcast authentication protocol. Proc. of the 8th ACM conference on Computer and Communications Security(CCS), 28–37.

    Google Scholar 

  22. K. Scarfone and P. Mell. 2007. NIST. National Institute of Standards and Technology special publication, 800–894.

    Google Scholar 

  23. W. He, Y. Huang, R. Sathyam, K. Nahrstedt, and W. C. Lee. 2009. SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks. IEEE Transactions on Information Forensics and Security(TIFS), 4(1): 140–150.

    Google Scholar 

  24. D. Wu, C. Zhou. 2011. Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2(2): 375–381.

    Google Scholar 

  25. H. Nicanfar, and V. C. Leung. 2012. Smart grid multilayer consensus password-authenticated key exchange protocol. 2012 IEEE International Conference on Communications(ICC)’12, 6716–6720.

    Google Scholar 

  26. H. Nicanfar, P. Jokar, and V. C. Leung. 2011. Smart grid authentication and key management for unicast and multicast communications. Innovative Smart Grid Technologies Asia(ISGT)’11, 1–8.

    Google Scholar 

  27. S. Das, Y. Ohba, M. Kanda, D. Famolari, and S. K. Das. 2012. A key management framework for AMI networks in smart grid. IEEE Communications Magazine, 50(1): 30–37.

    Google Scholar 

  28. L. Nian, C. Jianshang, Z. Lin, Z. Jianhua, and H. Yanling. 2013. A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid. IEEE Transactions on Industrial Electronics, 60(1): 4746–4756.

    Google Scholar 

  29. S. H. Seo, X. Ding, and E. Bertino. 2013. Encryption Key Management for Secure Communication in Smart Advanced Metering Infrastructures. Proc. of the 4th IEEE International Conference on Smart Grid Communications(SmartGridComm), 143(6): 498–503.

    Google Scholar 

  30. S. McLaughlin, P. McDaniel, and W. Aiello. 2011. Protecting consumer privacy from electric load monitoring. Proc. of the 18th ACM conference on Computer and Communications Security(CCS), 87–98.

    Google Scholar 

  31. J. Z. Kolter and M. J. Johson. 2011. Redd: A public data set for energy disaggregation research. Proc. of SustKDD Workshop on Data Mining Applications in Sustainability’11, 1–6.

    Google Scholar 

  32. L. H. Zhu, Z. J. Zhang, Z. Qin, J. Weng, and K. Ren. 2016. Privacy protection using a rechargeable battery for energy consumption in smart grids. IEEE Network, to appear.

    Google Scholar 

  33. W. Yang, N. Li, Y. Qi, W. Qardaji, S. McLaughlin, and P. McDaniel. 2012. Minimizing private data disclosures in the smart grid. Proc. of the 19th ACM Conference on Computer and Communications Security(CCS), 415–427.

    Google Scholar 

  34. J. Koo, X. Lin, and S. Bagchi. 2012. Privatus: Wallet-friendly privacy protection for smart meters. Proc. of the 17th European Symposium on Research in Computer Security(ESORICS), 343–360.

    Google Scholar 

  35. L. Yang, X. Chen, J. Zhang, and H. V. Poor. 2014. Optimal privacy-preserving energy management for smart meters. Proc. of the 33rd IEEE International Conference on Computer Communications(INFOCOM), 513–521.

    Google Scholar 

  36. I. Richardson, A. Thomson, D. Infield, and C. Clifford. 2010. Domestic electricity use: A high-resolution energy demand model. Energy and Buildings, 42(1): 1878–1887.

    Google Scholar 

  37. J. Zhao, T. Jung, Y. Wang, and X. Li. 2014. Achieving differential privacy of data disclosure in the smart grid. Proc. of the 33rd IEEE International Conference on Computer Communications(INFOCOM), 505–512.

    Google Scholar 

  38. D. Cynthia. 2006. Differential privacy. Proc. of the 33rd International Conference on Automata, Languages and Programming(ICALP), 1–12.

    Google Scholar 

  39. Z. Erkin, and G. Tsudik. 2012. Private computation of spatial and temporal power consumption with smart meters. Proc. of the 10th International Conference on Applied Cryptography and Network Security(ACNS), 561–577.

    Google Scholar 

  40. B. Michael, and M. Sebastian. 2014. Differentially private smart metering with battery recharging. Proc of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security, 8247: 194–212.

    Google Scholar 

  41. Z. J. Zhang, Z. Qin, L. H. Zhu, W. Jiang, C. Xu, and K. Ren. 2015. Toward practical differential privacy in smart grid with capacity-limited rechargeable batteries. ArXiv arXiv:1507.03000v2

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liehuang Zhu .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Zhu, L., Zhang, Z., Xu, C. (2017). Privacy-Preserving Meter Reading Transmission in Smart Grid. In: Secure and Privacy-Preserving Data Communication in Internet of Things. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-3235-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3235-6_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3234-9

  • Online ISBN: 978-981-10-3235-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics