A Review of the Privacy-preserving Mechanisms of the Smart Meter in M2M

The relation between the Internet of things and people is increasingly closed, especially M2M technologies develop rapidly. As one of the most important applications in M2M, the smart meter has been widely spread for its convenience and intelligence. Because the user’s privacy data information is held in smart meter which can be attacked by eavesdropping and tampering, the requirement of privacy-preserving is indispensable. In this paper, after summarizing major privacy-preserving schemes to date, we classify these privacy-preserving schemes as external privacy-preserving schemes and internal privacy-preserving schemes according to the corresponding privacy attacks. The major part of external privacy-preserving schemes is the anonymous data transmission. The k-anonymity, l-anonymity and t-anonymity are proposed to achieve the goal of transmitting data anonymously to resist their corresponding privacy attacks. The internal privacy-preserving schemes involve access control and permission of authentication. Access control gives different users different permission; permission of authentication identifies the user’s permission and resists the force attack. Due to the uncertainty of the background knowledge which is the main attack scheme attackers depend on, we cannot prevent the privacy information from being revealed, namely, there is no perfect scheme to resist all the privacy attacks, existing privacy-preserving schemes are all proposed under a given environment of application.

[1]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[2]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.

[3]  Bo Sheng,et al.  Verifiable Privacy-Preserving Sensor Network Storage for Range Query , 2011, IEEE Transactions on Mobile Computing.

[4]  Carl H. Hauser,et al.  Smart Generation and Transmission With Coherent, Real-Time Data , 2011, Proceedings of the IEEE.

[5]  Chris Clifton,et al.  Multirelational k-Anonymity , 2009, IEEE Trans. Knowl. Data Eng..

[6]  Antonello Monti,et al.  Design of Smart MVDC Power Grid Protection , 2011, IEEE Transactions on Instrumentation and Measurement.

[7]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[8]  Yufei Tao,et al.  Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.

[9]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[10]  Rongbo Zhu Intelligent Collaborative Event Query Algorithm in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[11]  Vinu V. Das,et al.  Wireless Communication System for Energy Meter Reading , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[12]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[13]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[14]  Paul J. Werbos,et al.  Computational Intelligence for the Smart Grid-History, Challenges, and Opportunities , 2011, IEEE Computational Intelligence Magazine.

[15]  Haibo He,et al.  Special Issue on Computational Intelligence in Smart Grid [Guest Editorial] , 2011, IEEE Computational Intelligence Magazine.

[16]  Stefan Fischer,et al.  A Security Architecture for Mobile Wireless Sensor Networks , 2004, ESAS.

[17]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[18]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[19]  Hua Wang,et al.  A family of enhanced (L, alpha)-diversity models for privacy preserving data publishing , 2011, Future Gener. Comput. Syst..

[20]  Francesco Bonchi,et al.  Anonymization of moving objects databases by clustering and perturbation , 2010, Inf. Syst..

[21]  Rongbo Zhu,et al.  Energy-Aware Distributed Intelligent Data Gathering Algorithm in Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.

[22]  Raymond Chi-Wing Wong,et al.  (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.

[23]  Yixian Yang,et al.  An Efficient Algorithm for Time-Driven Data Gathering in Wireless Sensor Networks Using Inter-Session Network Coding , 2012 .

[24]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[25]  D.G. Hart,et al.  Using AMI to realize the Smart Grid , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[26]  Lin Sun,et al.  A Temporal and Spatial Data Compression Algorithm Based on Confidence Interval for Wireless Sensor Networks , 2012 .

[27]  Bin Hu,et al.  Multigate Communication Network for Smart Grid , 2011, Proceedings of the IEEE.

[28]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[29]  Thilo Sauter,et al.  End-to-End Communication Architecture for Smart Grids , 2011, IEEE Transactions on Industrial Electronics.

[30]  Daojing He,et al.  An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks , 2011, Journal of Zhejiang University SCIENCE C.

[31]  Benjamin C. M. Fung,et al.  Anonymizing sequential releases , 2006, KDD '06.

[32]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[33]  Lingfeng Wang,et al.  A conceptual design using harmonics to reduce pilfering of electricity , 2010, IEEE PES General Meeting.

[34]  Muhammad Haneef,et al.  Design Challenges and Comparative Analysis of Cluster Based Routing Protocols Used in Wireless Sensor Networks for Improving Network Life Time , 2012 .

[35]  A. Vojdani,et al.  Smart Integration , 2008, IEEE Power and Energy Magazine.

[36]  M. Chebbo EU SmartGrids Framework "Electricity Networks of the future 2020 and beyond" , 2007, 2007 IEEE Power Engineering Society General Meeting.

[37]  Kenneth C. Budka,et al.  Communication network architecture and design principles for smart grids , 2010 .

[38]  Kim Chang,et al.  Global Wireless Machine-to-Machine Standardization , 2011, IEEE Internet Computing.

[39]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[40]  Ronald J. Deibert,et al.  Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.

[41]  Rongbo Zhu Efficient Fault-Tolerant Event Query Algorithm in Distributed Wireless Sensor Networks , 2010, Int. J. Distributed Sens. Networks.

[42]  Wade Trappe,et al.  An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.

[43]  Jarmo Partanen,et al.  Smart grid power system control in distributed generation environment , 2009 .