Abstract
In this chapter, the area of smart grid and privacy preservation schemes are discussed and compared in detail. Existing power grids generally carry energy from central locations to a large cluster of customers, such as a housing estate or an apartment block. Smart grid uses two-way flow using energy and information to increase automation and to better distribute energy flow throughout the grid. Smart grid utilizes modern technologies to deliver energy efficiently, and to respond to events within the grid, such as a power line failure (Gungor and Hancke, IEEE Trans Ind Electron 57(10):3357–3564, 2010, [1]).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
V. C. Gungor, B. Lu, and G. P. Hancke. 2010. Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics, 57(10): 3357–3564.
X. Fang, S. Misra, G. Xue, and D. Yang. 2012. Smart grid - The new and improved power grid: A survey. IEEE Communications Surveys & Tutorials, 14(4): 944–980.
Z. M. Fadlullah, M. M. Fouda, X. S. Shen, Y. Nozaki, and N. Kato. 2011. An early warning system against malicious activities for smart grid communications. IEEE Network Magazine, 25(5): 50–55.
Z. Michael and K. Roth. 2011. Nonintrusive appliance load monitoring: Review and outlook. IEEE Transactions on Consumer Electronics, 57(1): 76–84.
D. J. Hess and J. Coley. 2014. Wireless smart meters and public acceptance: The environment, limited choices, and precautionary politics. Public Understanding of Science, 23(6): 688–702.
F. G. M\(\acute{a}\)rmol, C. Sorg, O, Ugus, and G. M. P\(\acute{e}\)rez. 2012. Do not snoop my habits: preserving privacy in the smart grid. IEEE Communications Magazine, 50(5): 166–172.
H. Farhangi. 2010. The power of smart grid. IEEE power and energy magazine, 8(1): 18–28.
H. Khurana, M. Hadley, N. Lu, and D. A. Frincke. 2010. Smart-grid security issues. IEEE Security & Privacy, 1(8): 81–85.
P. Jokar, N. Arianpoo, and V. Leung. 2012. A survey on security issues in smart grids. Security and Communication Networks, 9(3): 262–273.
G. Kalogridis, C. Efthymiou, S. Z. Denic, T. A. Lewis, and R. Cepeda. 2010. Privacy for smart meters: Towards undetectable appliance load signatures. Proc. of the 1st IEEE International Conference on Smart Grid Communications(SmartGridComm), 232–237.
B. Michael and M. Sebastian. 2014. Differentially private smart metering with battery recharging. Springer Berlin Heidelberg, 8247: 194–212.
Y. Simmhan, A. G. Kumbhare, B. Cao, and V. Prasanna. 2011. An analysis of security and privacy issues in smart grid software architectures on clouds. Proc. of the 4th IEEE International Conference Cloud Computing (CLOUD)’11, 582–589.
X. Li, X. Liang, R. Lu, X. Sheng, X. Lin, and H. Zhu. 2012. Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine, 50(8): 38–45.
Q. Li and G. Cao. 2011. Multicast authentication in the smart grid with one-time signature. IEEE Transactions on Smart Grid, 2(4): 686–696.
C. Efthymiou and G. Kalogridis. 2010. Smart Grid Privacy via Anonymization of Smart Metering Data. Proc. of the 1st IEEE International Conference on Smart Grid Commnications(SmartGridComm), 238–243.
W. Wang and Z. Lu. 2013. Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5): 1344–1371.
The Smart Grid Interoperability Panel -Cyber Security Working Group, Guidelines for smart grid cyber security. NISTIR, 7628: 1–597.
S. McLaughlin, P. McDaniel, and D. Podkuiko. 2009. Energy theft in the advance metering infrastructure. Proc. of the 4th International Workshop on Critical Information Infrastructures Security’09, 15(1):129–142.
F. Li, B. Luo, and P. Liu. 2010. Secure information aggregation for smart grids using homomorphic encryption. Proc. of the 1st IEEE International Conference on Smart Grid Commnications(SmartGridComm), 45(2): 327–332.
M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. Shen. 2011. A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4): 675–685.
A. Perrig. 2001. The BiBa one-time signature and broadcast authentication protocol. Proc. of the 8th ACM conference on Computer and Communications Security(CCS), 28–37.
K. Scarfone and P. Mell. 2007. NIST. National Institute of Standards and Technology special publication, 800–894.
W. He, Y. Huang, R. Sathyam, K. Nahrstedt, and W. C. Lee. 2009. SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks. IEEE Transactions on Information Forensics and Security(TIFS), 4(1): 140–150.
D. Wu, C. Zhou. 2011. Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2(2): 375–381.
H. Nicanfar, and V. C. Leung. 2012. Smart grid multilayer consensus password-authenticated key exchange protocol. 2012 IEEE International Conference on Communications(ICC)’12, 6716–6720.
H. Nicanfar, P. Jokar, and V. C. Leung. 2011. Smart grid authentication and key management for unicast and multicast communications. Innovative Smart Grid Technologies Asia(ISGT)’11, 1–8.
S. Das, Y. Ohba, M. Kanda, D. Famolari, and S. K. Das. 2012. A key management framework for AMI networks in smart grid. IEEE Communications Magazine, 50(1): 30–37.
L. Nian, C. Jianshang, Z. Lin, Z. Jianhua, and H. Yanling. 2013. A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid. IEEE Transactions on Industrial Electronics, 60(1): 4746–4756.
S. H. Seo, X. Ding, and E. Bertino. 2013. Encryption Key Management for Secure Communication in Smart Advanced Metering Infrastructures. Proc. of the 4th IEEE International Conference on Smart Grid Communications(SmartGridComm), 143(6): 498–503.
S. McLaughlin, P. McDaniel, and W. Aiello. 2011. Protecting consumer privacy from electric load monitoring. Proc. of the 18th ACM conference on Computer and Communications Security(CCS), 87–98.
J. Z. Kolter and M. J. Johson. 2011. Redd: A public data set for energy disaggregation research. Proc. of SustKDD Workshop on Data Mining Applications in Sustainability’11, 1–6.
L. H. Zhu, Z. J. Zhang, Z. Qin, J. Weng, and K. Ren. 2016. Privacy protection using a rechargeable battery for energy consumption in smart grids. IEEE Network, to appear.
W. Yang, N. Li, Y. Qi, W. Qardaji, S. McLaughlin, and P. McDaniel. 2012. Minimizing private data disclosures in the smart grid. Proc. of the 19th ACM Conference on Computer and Communications Security(CCS), 415–427.
J. Koo, X. Lin, and S. Bagchi. 2012. Privatus: Wallet-friendly privacy protection for smart meters. Proc. of the 17th European Symposium on Research in Computer Security(ESORICS), 343–360.
L. Yang, X. Chen, J. Zhang, and H. V. Poor. 2014. Optimal privacy-preserving energy management for smart meters. Proc. of the 33rd IEEE International Conference on Computer Communications(INFOCOM), 513–521.
I. Richardson, A. Thomson, D. Infield, and C. Clifford. 2010. Domestic electricity use: A high-resolution energy demand model. Energy and Buildings, 42(1): 1878–1887.
J. Zhao, T. Jung, Y. Wang, and X. Li. 2014. Achieving differential privacy of data disclosure in the smart grid. Proc. of the 33rd IEEE International Conference on Computer Communications(INFOCOM), 505–512.
D. Cynthia. 2006. Differential privacy. Proc. of the 33rd International Conference on Automata, Languages and Programming(ICALP), 1–12.
Z. Erkin, and G. Tsudik. 2012. Private computation of spatial and temporal power consumption with smart meters. Proc. of the 10th International Conference on Applied Cryptography and Network Security(ACNS), 561–577.
B. Michael, and M. Sebastian. 2014. Differentially private smart metering with battery recharging. Proc of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security, 8247: 194–212.
Z. J. Zhang, Z. Qin, L. H. Zhu, W. Jiang, C. Xu, and K. Ren. 2015. Toward practical differential privacy in smart grid with capacity-limited rechargeable batteries. ArXiv arXiv:1507.03000v2
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Zhu, L., Zhang, Z., Xu, C. (2017). Privacy-Preserving Meter Reading Transmission in Smart Grid. In: Secure and Privacy-Preserving Data Communication in Internet of Things. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-3235-6_3
Download citation
DOI: https://doi.org/10.1007/978-981-10-3235-6_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3234-9
Online ISBN: 978-981-10-3235-6
eBook Packages: EngineeringEngineering (R0)