Saxena, N., Choi, B.J. and Grijalva, S., 2017. Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks. In: IEEE ICC'17: Bridging People, Communities, and Cultures, 21-25 May 2017, Paris, France.
Full text available as:
|
PDF
1570319544 new.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 813kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
Official URL: http://icc2017.ieee-icc.org/
Abstract
The industry has recognized the risk of cyber- attacks targeting to the advanced metering infrastructure (AMI). A potential adversary can modify or inject malicious data, and can perform security attacks over an insecure network. Also, the network operators at intermediate devices can reveal private information, such as the identity of the individual home and metering data units, to the third-party. Existing schemes generate large overheads and also do not ensure the secure delivery of correct and accurate metering data to all AMI entities, including data concentrator at the utility and the billing center. In this paper, we propose a secure and privacy-preserving data aggregation scheme based on additive homomorphic encryption and proxy re-encryption operations in the Paillier cryptosystem. The scheme can aggregate metering data without revealing the actual individual information (identity and energy usage) to intermediate entities or to any third-party, hence, resolves identity and related data theft attacks. Moreover, we propose a scalable algorithm to detect malicious metering data injected by the adversary. The proposed scheme protects the system against man-in-the-middle, replay, and impersonation attacks, and also maintains message integrity and undeniability. Our performance analysis shows that the scheme generates manageable compu- tation, communication, and storage overheads and has efficient execution time suitable for AMI networks.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Group: | Faculty of Science & Technology |
ID Code: | 29398 |
Deposited By: | Symplectic RT2 |
Deposited On: | 26 Jun 2017 14:23 |
Last Modified: | 14 Mar 2022 14:05 |
Downloads
Downloads per month over past year
Repository Staff Only - |