Inferring Private User Behaviour Based on Information Leakage

In rural/remote areas, resource constrained smart micro-grid (RCSMG) architectures can provide a cost-effective power supply alternative in cases when connectivity to the national power grid is impeded by factors such as load shedding. RCSMG architectures can be designed to handle communications over a distributed lossy network in order to minimise operation costs. However, due to the unreliable nature of lossy networks communication data can be distorted by noise additions that alter the veracity of the data. In this chapter, we consider cases in which an adversary who is internal to the RCSMG, deliberately distorts communicated data to gain an unfair advantage over the RCSMG’s users. The adversary’s goal is to mask malicious data manipulations as distortions due to additive noise due to communication channel unreliability. Distinguishing malicious data distortions from benign distortions is important in ensuring trustworthiness of the RCSMG. Perturbation data anonymisation algorithms can be used to alter transmitted data to ensure that adversarial manipulation of the data reveals no information that the adversary can take advantage of. However, because existing data perturbation anonymisation algorithms operate by using additive noise to anonymise data, using these algorithms in the RCSMG context is challenging. This is due to the fact that distinguishing benign noise additions from malicious noise additions is a difficult problem. In this chapter, we present a brief survey of cases of privacy violations due to inferences drawn from observed power consumption patterns in RCSMGs centred on inference, and propose a method of mitigating these risks. The lesson here is that while RCSMGs give users more control over power management and distribution, good anonymisation is essential to protecting personal information on RCSMGs.

[1]  Valentin Tudor,et al.  A study on data de-pseudonymization in the smart grid , 2015, EUROSEC.

[2]  Ralph Gottschalg,et al.  Energy yields of small grid connected photovoltaic system: effects of component reliability and maintenance , 2015 .

[3]  Valentin Tudor,et al.  BES: Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures , 2016, CPSS@AsiaCCS.

[4]  Ashwin Machanavajjhala,et al.  No free lunch in data privacy , 2011, SIGMOD '11.

[5]  Murat Kantarcioglu,et al.  Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy , 2017, 2017 American Control Conference (ACC).

[6]  Marek Klonowski,et al.  Electing a Leader in Wireless Networks Quickly Despite Jamming , 2015, SPAA.

[7]  Murat Kantarcioglu,et al.  Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms , 2017, HotSoS.

[8]  George N Korres,et al.  A Distributed Multiarea State Estimation , 2011, IEEE Transactions on Power Systems.

[9]  T. Van Cutsem,et al.  Critical Survey of Hierarchical Methods for State Estimation of Electric Power Systems , 1983, IEEE Power Engineering Review.

[10]  Eugene D. Moe,et al.  Off-grid Power for Small Communities with Renewable Energy Sources in Rural Guatemalan Villages , 2011, 2011 IEEE Global Humanitarian Technology Conference.

[11]  Bart Jacobs,et al.  Privacy-Friendly Energy-Metering via Homomorphic Encryption , 2010, STM.

[12]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[13]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[14]  Andrey Brito,et al.  A Technique to provide differential privacy for appliance usage in smart metering , 2016, Inf. Sci..

[15]  Stefano Panzieri,et al.  Malicious false data injection in hierarchical electric power grid state estimation systems , 2013, e-Energy '13.

[16]  Christoph Meinel,et al.  A Smart Micro-Grid Architecture for Resource Constrained Environments , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[17]  George J. Pappas,et al.  Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[18]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[19]  Nancy A. Lynch,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[20]  Stephen D. Wolthusen,et al.  Dynamic forced partitioning of robust hierarchical state estimators for power networks , 2014, ISGT 2014.

[21]  Christoph Meinel,et al.  Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids , 2015, 2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA).

[22]  Taha Selim Ustun,et al.  The role of microgrids & renewable energy in addressing Sub-Saharan Africa's current and future energy needs , 2015, IREC2015 The Sixth International Renewable Energy Congress.

[23]  Patrick D. McDaniel,et al.  Protecting consumer privacy from electric load monitoring , 2011, CCS '11.

[24]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[25]  Claude Castelluccia,et al.  I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.

[26]  Thierry Van Cutsem,et al.  A taxonomy of multi-area state estimation methods , 2011 .

[27]  Stephen B. Wicker,et al.  Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.

[28]  Stefano Panzieri,et al.  A model for robust distributed hierarchical electric power grid state estimation , 2014, ISGT 2014.

[29]  Christoph Meinel,et al.  Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids , 2015, FNSS.

[30]  Antonio Gómez Expósito,et al.  A Multilevel State Estimation Paradigm for Smart Grids , 2011, Proceedings of the IEEE.

[31]  Klemens Böhm,et al.  Re-identification of Smart Meter data , 2012, Personal and Ubiquitous Computing.

[32]  Zhao Wang,et al.  Stability analysis of weak rural electrification microgrids with droop-controlled rotational and electronic distributed generators , 2015, 2015 IEEE Power & Energy Society General Meeting.

[33]  George M. Mathews An optimal hierarchical algorithm for factored nonlinear weighted least squares state estimation , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).

[34]  Murtuza Jadliwala,et al.  AgSec: Secure and efficient CDMA-based aggregation for smart metering systems , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[35]  Wenyuan Xu,et al.  Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.

[36]  A. Gómez-Expósito,et al.  A Factorized Approach to WLS State Estimation , 2011, IEEE Transactions on Power Systems.

[37]  R. Nagaraj Renewable energy based small hybrid power system for desalination applications in remote locations , 2012, 2012 IEEE 5th India International Conference on Power Electronics (IICPE).