A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks

Fine-grained real-time metering is a fundamental service of wireless energy auditing networks, where metering data is transmitted from embedded wireless power meters to gateways for centralized processing, storage, and forwarding. Due to limited meter capability and wireless bandwidth, the increasing sampling rates and network scales needed to support new energy auditing applications pose significant challenges to metering data fidelity and secrecy. This article exploits the compression and encryption properties of compressive sensing (CS) to design a joint data compression and encryption (JICE) approach that addresses these two challenges simultaneously. Compared with a conventional signal processing pipeline that compresses and encrypts data sequentially, JICE reduces computation and space complexities due to its simple design. It thus leaves more processor time and available buffer space for handling lossy wireless transmissions. Moreover, JICE features an adaptive reconfiguration mechanism that selects the signal representation basis of CS at runtime among several candidate bases to achieve the best fidelity of the recovered data at the gateways. This mechanism enables JICE to adapt to changing power consumption patterns. On a smart plug platform, we implemented JICE and several baseline approaches including downsampling, lossless compression, and the pipeline approach. Extensive testbed experiments show that JICE achieves higher data delivery ratios and lower recovery distortions under a range of realistic settings. In particular, at a meter sampling rate of 8 Hz, JICE increases the number of meters supported by a gateway by 50%, compared with the commonly used pipeline approach, while keeping a signal distortion rate lower than 5%.

[1]  Steven Lanzisera,et al.  @Scale: Insights from a large, long-lived appliance energy WSN , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).

[2]  Wen Hu,et al.  Efficient background subtraction for real-time tracking in embedded camera networks , 2012, SenSys '12.

[3]  Kamin Whitehouse,et al.  Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.

[4]  Mingyan Liu,et al.  In-situ soil moisture sensing: Measurement scheduling and estimation using compressive sensing , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).

[5]  Hamid Sharif,et al.  Resource-aware secure ECG healthcare monitoring through body sensor networks , 2010, IEEE Wireless Communications.

[6]  David K. Y. Yau,et al.  Supero: A sensor system for unsupervised residential power usage monitoring , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[7]  Sriram Vishwanath,et al.  Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.

[8]  S.B. Leeb,et al.  Transient event detection for nonintrusive load monitoring and demand side management using voltage distortion , 2006, Twenty-First Annual IEEE Applied Power Electronics Conference and Exposition, 2006. APEC '06..

[9]  T. Baldwin,et al.  Power system observability with minimal phasor measurement placement , 1993 .

[10]  Stephen P. Boyd,et al.  Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.

[11]  Y. Rachlin,et al.  The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[12]  Feng Zhou,et al.  Keyboard acoustic emanations revisited , 2005, CCS '05.

[13]  David E. Culler,et al.  Design and implementation of a high-fidelity AC metering network , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[14]  André Brinkmann,et al.  Evaluation of a hash-compress-encrypt pipeline for storage system applications , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).

[15]  J. Haupt,et al.  Compressive wireless sensing , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[16]  Margaret Martonosi,et al.  Data compression algorithms for energy-constrained devices in delay tolerant networks , 2006, SenSys '06.

[17]  Jun Sun,et al.  Compressive data gathering for large-scale wireless sensor networks , 2009, MobiCom '09.

[18]  David E. Culler,et al.  Experiences with a high-fidelity wireless building energy auditing network , 2009, SenSys '09.

[19]  Wenyuan Xu,et al.  Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.

[20]  Wenyuan Xu,et al.  Current Events: Identifying Webpages by Tapping the Electrical Outlet , 2013, ESORICS.

[21]  Chenyang Lu,et al.  Reliable clinical monitoring using wireless sensor networks: experiences in a step-down hospital unit , 2010, SenSys '10.

[22]  Cong Wang,et al.  Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud , 2013, IEEE Transactions on Emerging Topics in Computing.

[23]  Piotr Indyk,et al.  Combining geometry and combinatorics: A unified approach to sparse signal recovery , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[24]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[25]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[26]  Prasant Misra,et al.  Efficient cross-correlation via sparse representation in sensor networks , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).

[27]  E. Candès,et al.  Sparsity and incoherence in compressive sampling , 2006, math/0611957.

[28]  Ruby B. Lee,et al.  Performance impact of data compression on virtual private network transactions , 2000, Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000.

[29]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[30]  Ami Wiesel,et al.  Linear Regression With Gaussian Model Uncertainty: Algorithms and Bounds , 2008, IEEE Transactions on Signal Processing.

[31]  Wen-Tsai Sung,et al.  Improving the compression and encryption of images using FPGA-based cryptosystems , 2006, Multimedia Tools and Applications.

[32]  E.J. Candes Compressive Sampling , 2022 .

[33]  Shwetak N. Patel,et al.  Televisions, video privacy, and powerline electromagnetic interference , 2011, CCS '11.

[34]  Richard G. Baraniuk,et al.  A new compressive imaging camera architecture using optical-domain compression , 2006, Electronic Imaging.

[35]  G. Sharma,et al.  On the security and robustness of encryption via compressed sensing , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[36]  S. Santoso,et al.  Power quality assessment via wavelet transform analysis , 1996 .