Skip to main content
Top
Published in: Wireless Networks 2/2016

01-02-2016

Privacy-preserving data aggregation scheme against internal attackers in smart grids

Authors: Debiao He, Neeraj Kumar, Jong-Hyouk Lee

Published in: Wireless Networks | Issue 2/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With fast advancements of communication, systems and information technologies, a smart grid (SG) could bring much convenience to users because it could provide a reliable and efficient energy service. The data aggregation (DA) scheme for the SG plays an important role in evaluating information about current energy usage. To achieve the goal of preserving users’ privacy, many DA schemes for the SG have been proposed in last decade. However, how to withstand attacks of internal adversaries is not considered in those schemes. To enhance preservation of privacy, Fan et al. proposed a DA scheme for the SG against internal adversaries. In Fan et al.’s DA scheme, blinding factors are used in evaluating information about current energy usage and the aggregator cannot get the consumption information of any individual user. Fan et al. demonstrated that their scheme was secure against various attacks. However, we find that their scheme suffers from the key leakage problem, i.e., the adversary could extract the user’s private key through the public information. To overcome such serious weakness, this paper proposes an efficient and privacy-preserving DA scheme for the SG against internal attacks. Analysis shows that the proposed DA scheme not only overcome the key leakage problem in Fan et al.’s DA scheme, but also has better performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference He, D., Chen, C., Bu, J., Chan, S., Zhang, Y., & Guizani, M. (2012). Secure service provision in smart grid communications. IEEE Communications Magazine, 50(8), 53–61.CrossRef He, D., Chen, C., Bu, J., Chan, S., Zhang, Y., & Guizani, M. (2012). Secure service provision in smart grid communications. IEEE Communications Magazine, 50(8), 53–61.CrossRef
2.
go back to reference Fadlullah, Z., Kato, N., Lu, R., Shen, X., & Nozaki, Y. (2012). Toward secure targeted broadcast in smart grid. IEEE Communications Magazine, 50(5), 150–156.CrossRef Fadlullah, Z., Kato, N., Lu, R., Shen, X., & Nozaki, Y. (2012). Toward secure targeted broadcast in smart grid. IEEE Communications Magazine, 50(5), 150–156.CrossRef
3.
go back to reference He, D., Chan, S., Chen, C., & Bu, J. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16.CrossRef He, D., Chan, S., Chen, C., & Bu, J. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16.CrossRef
4.
go back to reference Gao, J., Xiao, Y., Liu, J., Liang, W., & Chen, C. (2011). A survey of communication/networking in smart grids. Future Generation Computer Systems, 28(2), 391–404.CrossRef Gao, J., Xiao, Y., Liu, J., Liang, W., & Chen, C. (2011). A survey of communication/networking in smart grids. Future Generation Computer Systems, 28(2), 391–404.CrossRef
5.
go back to reference Li, Q., & Cao, G. (2011). Multicast authentication in the smart grid with onetime signature. IEEE Transactions on Smart Grid, 2(4), 686–696.CrossRef Li, Q., & Cao, G. (2011). Multicast authentication in the smart grid with onetime signature. IEEE Transactions on Smart Grid, 2(4), 686–696.CrossRef
6.
go back to reference Fouda, M., Fadlullah, Z., Kato, N., Lu, R., & Shen, X. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675–685.CrossRef Fouda, M., Fadlullah, Z., Kato, N., Lu, R., & Shen, X. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675–685.CrossRef
7.
go back to reference Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2014). An efficient merkle-tree-based authentication scheme for smart grid. IEEE Systems Journal, 8(2), 655–663.CrossRef Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2014). An efficient merkle-tree-based authentication scheme for smart grid. IEEE Systems Journal, 8(2), 655–663.CrossRef
8.
go back to reference Wu, D., & Zhou, C. (2011). Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2(2), 375–381.CrossRef Wu, D., & Zhou, C. (2011). Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2(2), 375–381.CrossRef
9.
go back to reference Tseng, H. (2014). Threshold-based privacy-preserving key management scheme for vehicle-to-grid networks. Applied Mechanics and Materials, 479(1), 978–982. Tseng, H. (2014). Threshold-based privacy-preserving key management scheme for vehicle-to-grid networks. Applied Mechanics and Materials, 479(1), 978–982.
10.
go back to reference Wan, Z., Wang, G., Yang, Y., & Shi, S. (2014). SKM: Scalable key management for advanced metering infrastructure in smart grids. IEEE Transactions on Industrial Electronics, 61(12), 7055–7066.CrossRef Wan, Z., Wang, G., Yang, Y., & Shi, S. (2014). SKM: Scalable key management for advanced metering infrastructure in smart grids. IEEE Transactions on Industrial Electronics, 61(12), 7055–7066.CrossRef
11.
go back to reference Li, F., Luo, B., & Liu, P. (2010) Secure information aggregation for smart grids using homomorphic encryption. In First IEEE international conference on smart grid communications (pp. 327–332). Li, F., Luo, B., & Liu, P. (2010) Secure information aggregation for smart grids using homomorphic encryption. In First IEEE international conference on smart grid communications (pp. 327–332).
12.
go back to reference Paillier, P. (1999) A public-key cryptosystem based on composite degree residuosity classes. In EUROCRYPT ‘99 (pp. 223–238). Paillier, P. (1999) A public-key cryptosystem based on composite degree residuosity classes. In EUROCRYPT ‘99 (pp. 223–238).
13.
go back to reference Garcia, F. D., & Jacobs B. (2011). Privacy-friendly energy-metering via homomorphic encryption. In 6th international conference on security and trust management (pp. 226–238). Garcia, F. D., & Jacobs B. (2011). Privacy-friendly energy-metering via homomorphic encryption. In 6th international conference on security and trust management (pp. 226–238).
14.
go back to reference Lu, R., Liang, X., Li, X., Lin, X., & Shen, X. (2012). EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1621–1632.CrossRef Lu, R., Liang, X., Li, X., Lin, X., & Shen, X. (2012). EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1621–1632.CrossRef
15.
go back to reference Zhang, J., Liu, L., Cui, Y., & Chen, Z. (2013). SP2DAS: Self-certified PKC-based privacy-preserving data aggregation scheme in smart grid. International Journal of Distributed Sensor Networks, 2013, 457325. doi:10.1155/2013/457325. Zhang, J., Liu, L., Cui, Y., & Chen, Z. (2013). SP2DAS: Self-certified PKC-based privacy-preserving data aggregation scheme in smart grid. International Journal of Distributed Sensor Networks, 2013, 457325. doi:10.​1155/​2013/​457325.
16.
go back to reference Chen, L., Lu, R., & Cao, Z. (2014). PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Networking and Applications. doi:10.1007/s12083-014-0255-5. Chen, L., Lu, R., & Cao, Z. (2014). PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Networking and Applications. doi:10.​1007/​s12083-014-0255-5.
17.
go back to reference Fan, C., Huang, S., & Lai, Y. (2014). Privacy enhanced data aggregation scheme against internal attackers in smart grid. IEEE Transactions on Industrial Informatics, 10(1), 666–675.CrossRef Fan, C., Huang, S., & Lai, Y. (2014). Privacy enhanced data aggregation scheme against internal attackers in smart grid. IEEE Transactions on Industrial Informatics, 10(1), 666–675.CrossRef
18.
go back to reference Farash, M., & Attari, M. (2014). A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks. The Journal of Supercomputing, 69(1), 395–411.CrossRefMathSciNet Farash, M., & Attari, M. (2014). A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks. The Journal of Supercomputing, 69(1), 395–411.CrossRefMathSciNet
19.
go back to reference Farash, M., & Attari, M. (2014). Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dynamics, 76(2), 1203–1213.CrossRefMathSciNetMATH Farash, M., & Attari, M. (2014). Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dynamics, 76(2), 1203–1213.CrossRefMathSciNetMATH
20.
go back to reference Mishra, D., Jangirala, S., & Mukhopadhyay, S. (2014). A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(10), 1–10.CrossRef Mishra, D., Jangirala, S., & Mukhopadhyay, S. (2014). A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(10), 1–10.CrossRef
21.
go back to reference Xie, Q., Tan, X., Wong, D., Wang, G., Bao, M., & Dong, N. (2014). A practical anonymous authentication protocol for wireless roaming. Security and Communication Networks, 7(8), 1264–1273.CrossRef Xie, Q., Tan, X., Wong, D., Wang, G., Bao, M., & Dong, N. (2014). A practical anonymous authentication protocol for wireless roaming. Security and Communication Networks, 7(8), 1264–1273.CrossRef
22.
go back to reference He, D., & Zeadally, S. (2015). Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1), 71–77.CrossRef He, D., & Zeadally, S. (2015). Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1), 71–77.CrossRef
23.
go back to reference He, D., Kumar, N., & Chilamkurti, N. (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences. doi:10.1016/j.ins.2015.02.010. He, D., Kumar, N., & Chilamkurti, N. (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences. doi:10.​1016/​j.​ins.​2015.​02.​010.
24.
go back to reference Jiang, Q., Ma, J., Li, G., & Li, X. (2015). Improvement of robust smart-card-based password authentication scheme. International Journal Communication Systems, 28(2), 383–393.CrossRef Jiang, Q., Ma, J., Li, G., & Li, X. (2015). Improvement of robust smart-card-based password authentication scheme. International Journal Communication Systems, 28(2), 383–393.CrossRef
25.
go back to reference David, P., & Jacque, S. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH David, P., & Jacque, S. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH
26.
go back to reference Wu, T., & Tseng, Y. (2010). An efficient user authentication and key exchange protocol for mobile client–server environment. Computer Networks, 54(9), 1520–1530.CrossRefMATH Wu, T., & Tseng, Y. (2010). An efficient user authentication and key exchange protocol for mobile client–server environment. Computer Networks, 54(9), 1520–1530.CrossRefMATH
27.
go back to reference He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.CrossRef He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.CrossRef
28.
go back to reference Kilinc, H. H., & Yanik, T. (2014). A survey of SIP authentication and key agreement schemes. IEEE Communications Surveys & Tutorials, 16(2), 1005–1023.CrossRef Kilinc, H. H., & Yanik, T. (2014). A survey of SIP authentication and key agreement schemes. IEEE Communications Surveys & Tutorials, 16(2), 1005–1023.CrossRef
Metadata
Title
Privacy-preserving data aggregation scheme against internal attackers in smart grids
Authors
Debiao He
Neeraj Kumar
Jong-Hyouk Lee
Publication date
01-02-2016
Publisher
Springer US
Published in
Wireless Networks / Issue 2/2016
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-0983-3

Other articles of this Issue 2/2016

Wireless Networks 2/2016 Go to the issue