P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid

To address recently emerging concerns on privacy violations, this paper investigates possible sensitive information leakages and analyzes potential privacy threats in the automatic appliance control (AAC) application, which is one of the handiest applications in smart grids and one of the earliest examples in Internet of Things (IoT). Without an effective and consistent privacy preservation mechanism, the adversary can capture, model, and divulge customers' behavior, activities, and personal information at almost every level of society. Based on a set of existing cryptographic primitives, we propose an attribute-based encryption (ABE) key management variant and we also design and implement a fine-grained protocol named privacy preservation protocol (P3). We further present a practical automatic appliance control (AAC) system based on that protocol, and shows that it can fulfill the smart grid's requirements in privacy preservation. Experimental results demonstrate that our protocol merely incurs a substantially light overhead on the AAC application, yet is able to address and solve the formidable privacy challenges both customers and utility companies are facing.

[1]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.

[2]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[3]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[4]  Jianqing Zhang,et al.  Application-Aware Secure Multicast for Power Grid Communications , 2010 .

[5]  Tatsuya Yamazaki,et al.  AERO: extraction of user's activities from electric power consumption data , 2010, IEEE Transactions on Consumer Electronics.

[6]  Jianqing Zhang,et al.  Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).

[7]  Xiaozhou Li,et al.  Reliable group rekeying: a performance analysis , 2001, SIGCOMM '01.

[8]  Markus Karwe,et al.  Maintaining Privacy in Data Rich Demand Response Applications , 2012, SmartGridSec.

[9]  John R. Williams,et al.  Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[10]  John R. Williams,et al.  P3: Privacy preservation protocol for appliance control application , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[11]  Husheng Li,et al.  Compressed Meter Reading for Delay-Sensitive and Secure Load Report in Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[12]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[13]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[14]  Bart Jacobs,et al.  Privacy-Friendly Energy-Metering via Homomorphic Encryption , 2010, STM.

[15]  George Danezis,et al.  Privacy-preserving smart metering , 2011, ISSE.

[16]  Paulo S. L. M. Barreto,et al.  Efficient Implementation of Pairing-Based Cryptosystems , 2004, Journal of Cryptology.

[17]  M. Lisovich,et al.  Privacy Concerns in Upcoming Residential and Commercial Demand-Response Systems , 2008 .

[18]  Dmitry Podkuiko,et al.  Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.

[19]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[20]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[21]  Andreas Pashalidis,et al.  Relations among privacy notions , 2009, TSEC.

[22]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[23]  Haitham S. Cruickshank,et al.  Scalable balanced batch rekeying for secure group communication , 2006, Comput. Secur..

[24]  M. Tech Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks , 2015 .

[25]  Patrick D. McDaniel,et al.  Protecting consumer privacy from electric load monitoring , 2011, CCS '11.

[26]  Jianqing Zhang,et al.  Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.

[27]  John R. Williams,et al.  Towards Accurate Electricity Load Forecasting in Smart Grids , 2012, DBKDA 2012.

[28]  Kyungtae Kang,et al.  Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks , 2014, IEEE/ACM Transactions on Networking.

[29]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[30]  Srinivas Sampalli,et al.  A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying , 2008, Int. J. Netw. Secur..

[31]  Srinivas Sampalli,et al.  Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid , 2013 .

[32]  H. Vincent Poor,et al.  Smart meter privacy: A utility-privacy framework , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[33]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[34]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[35]  Georgios Kalogridis,et al.  ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms , 2011, IEEE Transactions on Smart Grid.

[36]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[37]  Stephen B. Wicker,et al.  Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.

[38]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[39]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.