The Community for Technology Leaders
RSS Icon
Issue No.09 - Sept. (2012 vol.23)
pp: 1621-1631
Rongxing Lu , University of Waterloo, Waterloo
Xiaohui Liang , University of Waterloo, Waterloo
Xu Li , INRIA Lille - Nord Europe, Lille
Xiaodong Lin , University of Ontario Institute of Technology, Oshawa
Xuemin (Sherman) Shen , University of Waterloo, Waterloo
The concept of smart grid has emerged as a convergence of traditional power system engineering and information and communication technology. It is vital to the success of next generation of power grid, which is expected to be featuring reliable, efficient, flexible, clean, friendly, and secure characteristics. In this paper, we propose an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid communications. EPPA uses a superincreasing sequence to structure multidimensional data and encrypt the structured data by the homomorphic Paillier cryptosystem technique. For data communications from user to smart grid operation center, data aggregation is performed directly on ciphertext at local gateways without decryption, and the aggregation result of the original data can be obtained at the operation center. EPPA also adopts the batch verification technique to reduce authentication cost. Through extensive analysis, we demonstrate that EPPA resists various security threats and preserve user privacy, and has significantly less computation and communication overhead than existing competing approaches.
Smart grids, Electricity, Real time systems, Logic gates, Encryption, privacy preserving, Smart grids, Electricity, Real time systems, Logic gates, Encryption, multidimensional aggregation., Smart grid, security
Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin (Sherman) Shen, "EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 9, pp. 1621-1631, Sept. 2012, doi:10.1109/TPDS.2012.86
[1] "Blackout 2003," , 2012.
[2] G.W. Arnold, "Challenges and Opportunities in Smart Grid: A Position Article," Proc. IEEE, vol. 99, no. 6, pp. 922-927, June 2011.
[3] F. Li, W. Qiao, H. Sun, H. Wan, J. Wang, Y. Xia, Z. Xu, and P. Zhang, "Smart Transmission Grid: Vision and Framework," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 168-177, Sept. 2010.
[4] K. Moslehi and R. Kumar, "A Reliability Perspective of the Smart Grid," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 57-64, June 2010.
[5] D. Niyato, L. Xiao, and P. Wang, "Machine-to-Machine Communications for Home Energy Management System in Smart Grid," IEEE Comm. Magazine, vol. 49, no. 4, pp. 53-59, Apr. 2011.
[6] Z.M. Fadlullah, M.M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, "Toward Intelligent Machine-to-Machine Communications in Smart Grid," IEEE Comm. Magazine, vol. 49, no. 4, pp. 60-65, Apr. 2011.
[7] H. Liang, B. Choi, W. Zhuang, and X. Shen, "Towards Optimal Energy Store-Carry-and-Deliver for Phevs Via v2g System," Proc. IEEE INFOCOM '12, pp. 25-30, Mar. 2012.
[8] P. McDaniel and S. McLaughlin, "Security and Privacy Challenges in the Smart Grid," IEEE Security & Privacy, vol. 7, no. 3, pp. 75-77, May/June 2009.
[9] Z.M. Fadlullah, M.M. Fouda, X. Shen, Y. Nozaki, and N. Kato, "An Early Warning System Against Malicious Activities for Smart Grid Communications," IEEE Network Magazine, vol. 25, no. 5, pp. 50-55, Sept./Oct. 2011.
[10] M.M. Fouda, Z.M. Fadlullah, N. Kato, R. Lu, and X. Shen, "A Light-Weight Message Authentication Scheme for Smart Grid Communications," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675-685, Dec. 2011.
[11] M. He and J. Zhang, "A Dependency Graph Approach for Fault Detection and Localization towards Secure Smart Grid," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 342-351, June 2011.
[12] Y. Yuan, Z. Li, and K. Ren, "Modeling Load Redistribution Attacks in Power Systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, June 2011.
[13] R. Lu, X. Li, X. Lin, X. Liang, and X. Shen, "GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications," IEEE Comm. Magazine, vol. 49, no. 4, pp. 28-35, Apr. 2011.
[14] P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," Proc. 17th Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 223-238, 1999.
[15] C. Castelluccia, A.C.-F. Chan, E. Mykletun, and G. Tsudik, "Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks," Trans. Sensor Networks, vol. 5, no. 3,article 20, 2009.
[16] D. Westhoff, J. Girão, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
[17] J. Shi, R. Zhang, Y. Liu, and Y. Zhang, "Prisense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems," Proc. IEEE INFOCOM, pp. 758-766, 2010.
[18] D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 213-229, 2001.
[19] Y. Sang, H. Shen, and H. Tian, "Privacy-Preserving Tuple Matching in Distributed Databases," IEEE Trans. Knowledge and Data Eng., vol. 21, no. 12, pp. 1767-1782, Dec. 2009.
[20] S. Zhong, "Privacy-Preserving Algorithms for Distributed Mining of Frequent Itemsets," Information Sciences, vol. 177, no. 2, pp. 490-503, 2007.
[21] D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," J. Cryptology, vol. 17, no. 4, pp. 297-319, 2004.
[22] M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," Proc. ACM Conf. Computer and Comm. Security, pp. 62-73, 1993.
[23] B. Lynn, "PBC Library," http://crypto.stanford.edupbc/, 2012.
[24] "Multiprecision Integer and Rational Arithmetic c/c++ Library," http:/, 2012.
[25] C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Systems (MobiQuitous), pp. 109-117, 2005.
[26] X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 10, no. 6, pp. 843-856, 2010.
56 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool