On preserving user privacy in Smart Grid advanced metering infrastructure applications
ABSTRACT Advanced metering infrastructure (AMI) enables real‐time collection of power consumption data through the Smart Grid communication network. With the current deployment of smart meters (SMs), one of the concerns that started to be raised by the customers is on the privacy of their power cons...
Saved in:
Published in | Security and communication networks Vol. 7; no. 1; pp. 206 - 220 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
London
Blackwell Publishing Ltd
01.01.2014
John Wiley & Sons, Inc |
Subjects | |
Online Access | Get full text |
ISSN | 1939-0114 1939-0122 |
DOI | 10.1002/sec.706 |
Cover
Summary: | ABSTRACT
Advanced metering infrastructure (AMI) enables real‐time collection of power consumption data through the Smart Grid communication network. With the current deployment of smart meters (SMs), one of the concerns that started to be raised by the customers is on the privacy of their power consumption data. The exposure of these data can lead to several privacy problems that need to be addressed before the customers can be convinced for the use of SMs. This paper has two contributions. First, it identifies the threats regarding user and data privacy in AMI applications and comprehensively surveys the existing solutions to address these threats. We categorize the existing approaches on privacy and discuss pros and cons of these approaches with respect to some criteria. Second, we pick one of the existing solutions on privacy, namely the homomorphic encryption, and evaluate its feasibility and impact on performance when used in data aggregation for real‐time AMI applications. We investigate and compare the performance of homomorphic encryption in terms of data size and end‐to‐end delay with that of hop‐by‐hop secure data aggregation and data concatenation within a network of SMs via extensive simulations. We finally conclude the paper with some future privacy issues that are subject to further research. Copyright © 2013 John Wiley & Sons, Ltd.
In this paper, we provide a thorough survey and propose a classification of the existing efforts to protect user data privacy. We also investigate and compare the impact of privacy solutions on the performance of AMI applications that utilize data aggregation. The results indicated that the end‐to‐end latency of end‐to‐end homomorphic aggregation approach is superior to hop‐by‐hop concatenation and comparable with hop‐by‐hop aggregation. However, hop‐by‐hop aggregation does not provide privacy by itself even though it has the lowest bandwidth requirements. |
---|---|
Bibliography: | ark:/67375/WNG-7997MQV7-Z istex:213C8002A3D5EF77421D987C3F8F4BF82659D734 ArticleID:SEC706 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
ISSN: | 1939-0114 1939-0122 |
DOI: | 10.1002/sec.706 |