An Identity-Based Data Aggregation Protocol for the Smart Grid

The smart grid significantly improves the reliability, efficiency, security, and sustainability of electricity services. It plays an important role in modern energy infrastructure. A drawback of this new technique, however, is that the fine-grained metering data may leak private customer information. Thus, various public-key based data aggregation protocols for privacy protection have been proposed. However, the National Institute of Standards and Technology has recommended not using public-key based cryptography in the smart grid, since maintaining the public-key infrastructure is a heavy cost. In this paper, we propose an identity-based data aggregation protocol for the smart grid, which cannot only prevent unauthorized reading and fine-grained analyzing but can also protect against unintentional errors and maliciously altered messages. The basic building block of our protocol is an identity-based encryption and signature scheme in which an identity-based encryption scheme is combined with an identity-based signature scheme. They share the same private/public parameters, which greatly reduces the complexity of the protocol in the smart grid. Security analysis demonstrates the effectiveness of our protocol in the context of six typical attacks against the smart grid. A prototype implementation based on the Intel Edison platform shows that our protocol is efficient enough for physically constrained smart grid operators, such as smart meters.

[1]  Rongxing Lu,et al.  Comment on “Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid” , 2016, IEEE Transactions on Industrial Informatics.

[2]  N. Maxemchuk,et al.  The Fair Allocation of Power to Air Conditioners on a Smart Grid , 2012, IEEE Transactions on Smart Grid.

[3]  Mohammad Reza Aref,et al.  Efficient multistage secret sharing scheme using bilinear map , 2014, IET Inf. Secur..

[4]  David K. Y. Yau,et al.  Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach , 2016, IEEE/ACM Transactions on Networking.

[5]  Jarmo Lundén,et al.  Smart Load Tracking and Reporting for Real-Time Metering in Electric Power Grids , 2016, IEEE Transactions on Smart Grid.

[6]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[7]  Flavio D. Garcia,et al.  A Schnorr-Like Lightweight Identity-Based Signature Scheme , 2009, AFRICACRYPT.

[8]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[9]  Nei Kato,et al.  Toward intelligent machine-to-machine communications in smart grid , 2011, IEEE Communications Magazine.

[10]  Jelena V. Misic,et al.  Investigating Public-Key Certificate Revocation in Smart Grid , 2015, IEEE Internet of Things Journal.

[11]  Neetesh Saxena,et al.  Integrated Distributed Authentication Protocol for Smart Grid Communications , 2018, IEEE Systems Journal.

[12]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[13]  Mohsen Guizani,et al.  An enhanced public key infrastructure to secure smart grid wireless communication networks , 2014, IEEE Network.

[14]  Chun-I Fan,et al.  Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid , 2014, IEEE Transactions on Industrial Informatics.

[15]  Xin Wang,et al.  Dynamic Resource Allocation for Smart-Grid Powered MIMO Downlink Transmissions , 2016, IEEE Journal on Selected Areas in Communications.

[16]  Ueli Maurer,et al.  Idealizing Identity-Based Encryption , 2015, ASIACRYPT.

[17]  Bart Jacobs,et al.  Privacy-Friendly Energy-Metering via Homomorphic Encryption , 2010, STM.

[18]  Jianhui Wang,et al.  Smart Transmission Grid: Vision and Framework , 2010, IEEE Transactions on Smart Grid.

[19]  Rongxing Lu,et al.  Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid , 2016, IEEE Transactions on Information Forensics and Security.

[20]  Andreas Peter,et al.  Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation , 2014, CANS.

[21]  Tanya L. Brewer,et al.  Smart Grid Cyber Security Strategy and Requirements , 2009 .

[22]  Sebnem Rusitschka,et al.  Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[23]  Weihua Zhuang,et al.  Towards optimal energy store-carry-and-deliver for PHEVs via V2G system , 2012, 2012 Proceedings IEEE INFOCOM.

[24]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[25]  Xiao Lu,et al.  Machine-to-machine communications for home energy management system in smart grid , 2011, IEEE Communications Magazine.

[26]  H. Farhangi,et al.  The path of the smart grid , 2010, IEEE Power and Energy Magazine.

[27]  Mohammad Sayad Haghighi,et al.  Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps , 2015, IET Inf. Secur..