PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice

Aiming to tackle the security and privacy issues of smart grid, we propose a privacy-aware data aggregation (PADA) scheme with efficient communication suitable for power injection in 5G smart grid slice. In PADA, each power storage unit calculates two secret keys to be shared by the utility company and the gateway to blind power injection bids, then aggregates the blinded bids of different time slots by using a novel aggregation technique called hash-then-homomorphic. The local gateway partially removes the blind factor from the received data by computing the corresponding shared secret key, then further aggregates the masked bids before sending them to the company. The company computes the total amount of collected power at each time slot by removing a blind factor from the aggregated bid and performing a decryption. User privacy is preserved in PADA because adversaries cannot know individual bids. Besides, extensive evaluations indicate that PADA is secure and efficient.

[1]  Xiaohui Liang,et al.  EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  H. Li,et al.  Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.

[3]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[4]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[5]  Jin Li,et al.  Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.

[6]  Thanasis Korakis,et al.  Network Store: Exploring Slicing in Future 5G Networks , 2015, MobiArch.

[7]  Yinghui Zhang,et al.  Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks , 2017, Mob. Inf. Syst..

[8]  Jin Cao,et al.  A group-based authentication and key agreement for MTC in LTE networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[9]  Xiaodong Lin,et al.  MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks , 2010, CMC 2010.

[10]  Ufuk Topcu,et al.  Optimal decentralized protocol for electric vehicle charging , 2011, IEEE Transactions on Power Systems.

[11]  H. Vincent Poor,et al.  Ergodic Capacity Analysis of Remote Radio Head Associations in Cloud Radio Access Networks , 2014, IEEE Wireless Communications Letters.

[12]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[13]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[14]  Ismail Güvenç,et al.  Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks , 2016, IEEE Internet of Things Journal.

[15]  Xuemin Shen,et al.  A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[16]  Kemal Akkaya,et al.  Privacy-preserving and secure communication scheme for power injection in smart grid , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[17]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[18]  Kemal Akkaya,et al.  Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters , 2017, IEEE Transactions on Dependable and Secure Computing.

[19]  Kemal Akkaya,et al.  Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network , 2017, IEEE Internet of Things Journal.

[20]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[21]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .