Conditional access smart meter privacy based on multi-resolution wavelet analysis

Smart Metering is an important component of Smart Grids. Detailed load profiles are available through smart metering at a high resolution. Load profiles allow inferring detailed information on the end user by non-intrusive load monitoring. Therefore, these load profiles need to be regarded as sensitive data, and treated with security and privacy in mind. We propose a method that allows conditional access to different resolution levels of the load data, allowing access on a "need-to-know" basis only. For this purpose, a multiresolution representation of the load data is created using the simple Haar wavelet transform. Securing the portions of the wavelet representation pertaining to each resolution with a unique key allows to implement conditional access for smart meter data.

[1]  M. Lisovich,et al.  Privacy Concerns in Upcoming Residential and Commercial Demand-Response Systems , 2008 .

[2]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[3]  E. Quinn Privacy and the New Energy Infrastructure , 2009 .

[4]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[5]  Ning Lu,et al.  Smart-grid security issues , 2010, IEEE Security & Privacy.

[6]  David P. Varodayan,et al.  Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  Jian Liang,et al.  Load Signature Study—Part I: Basic Concept, Structure, and Methodology , 2010, IEEE Transactions on Power Delivery.

[8]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[9]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[10]  G. W. Hart,et al.  Nonintrusive appliance load monitoring , 1992, Proc. IEEE.

[11]  Jianqing Zhang,et al.  Application-Aware Secure Multicast for Power Grid Communications , 2010 .

[12]  I. Daubechies,et al.  Factoring wavelet transforms into lifting steps , 1998 .

[13]  Ross J. Anderson,et al.  On the Security Economics of Electricity Metering , 2010, WEIS.

[14]  Todd Baumeister,et al.  Literature Review on Smart Grid Cyber Security , 2010 .

[15]  M. Dohler,et al.  Secure Lossless Aggregation for Smart Grid M2M Networks , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[16]  H. Y. Lam,et al.  A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.

[17]  Stephen B. Wicker,et al.  Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.

[18]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.