Skip to main content

Advertisement

Log in

Privacy-preserving data aggregation scheme against internal attackers in smart grids

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

With fast advancements of communication, systems and information technologies, a smart grid (SG) could bring much convenience to users because it could provide a reliable and efficient energy service. The data aggregation (DA) scheme for the SG plays an important role in evaluating information about current energy usage. To achieve the goal of preserving users’ privacy, many DA schemes for the SG have been proposed in last decade. However, how to withstand attacks of internal adversaries is not considered in those schemes. To enhance preservation of privacy, Fan et al. proposed a DA scheme for the SG against internal adversaries. In Fan et al.’s DA scheme, blinding factors are used in evaluating information about current energy usage and the aggregator cannot get the consumption information of any individual user. Fan et al. demonstrated that their scheme was secure against various attacks. However, we find that their scheme suffers from the key leakage problem, i.e., the adversary could extract the user’s private key through the public information. To overcome such serious weakness, this paper proposes an efficient and privacy-preserving DA scheme for the SG against internal attacks. Analysis shows that the proposed DA scheme not only overcome the key leakage problem in Fan et al.’s DA scheme, but also has better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. He, D., Chen, C., Bu, J., Chan, S., Zhang, Y., & Guizani, M. (2012). Secure service provision in smart grid communications. IEEE Communications Magazine, 50(8), 53–61.

    Article  Google Scholar 

  2. Fadlullah, Z., Kato, N., Lu, R., Shen, X., & Nozaki, Y. (2012). Toward secure targeted broadcast in smart grid. IEEE Communications Magazine, 50(5), 150–156.

    Article  Google Scholar 

  3. He, D., Chan, S., Chen, C., & Bu, J. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16.

    Article  Google Scholar 

  4. Gao, J., Xiao, Y., Liu, J., Liang, W., & Chen, C. (2011). A survey of communication/networking in smart grids. Future Generation Computer Systems, 28(2), 391–404.

    Article  Google Scholar 

  5. Li, Q., & Cao, G. (2011). Multicast authentication in the smart grid with onetime signature. IEEE Transactions on Smart Grid, 2(4), 686–696.

    Article  Google Scholar 

  6. Fouda, M., Fadlullah, Z., Kato, N., Lu, R., & Shen, X. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675–685.

    Article  Google Scholar 

  7. Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2014). An efficient merkle-tree-based authentication scheme for smart grid. IEEE Systems Journal, 8(2), 655–663.

    Article  Google Scholar 

  8. Wu, D., & Zhou, C. (2011). Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid, 2(2), 375–381.

    Article  Google Scholar 

  9. Tseng, H. (2014). Threshold-based privacy-preserving key management scheme for vehicle-to-grid networks. Applied Mechanics and Materials, 479(1), 978–982.

    Google Scholar 

  10. Wan, Z., Wang, G., Yang, Y., & Shi, S. (2014). SKM: Scalable key management for advanced metering infrastructure in smart grids. IEEE Transactions on Industrial Electronics, 61(12), 7055–7066.

    Article  Google Scholar 

  11. Li, F., Luo, B., & Liu, P. (2010) Secure information aggregation for smart grids using homomorphic encryption. In First IEEE international conference on smart grid communications (pp. 327–332).

  12. Paillier, P. (1999) A public-key cryptosystem based on composite degree residuosity classes. In EUROCRYPT ‘99 (pp. 223–238).

  13. Garcia, F. D., & Jacobs B. (2011). Privacy-friendly energy-metering via homomorphic encryption. In 6th international conference on security and trust management (pp. 226–238).

  14. Lu, R., Liang, X., Li, X., Lin, X., & Shen, X. (2012). EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1621–1632.

    Article  Google Scholar 

  15. Zhang, J., Liu, L., Cui, Y., & Chen, Z. (2013). SP2DAS: Self-certified PKC-based privacy-preserving data aggregation scheme in smart grid. International Journal of Distributed Sensor Networks, 2013, 457325. doi:10.1155/2013/457325.

  16. Chen, L., Lu, R., & Cao, Z. (2014). PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Networking and Applications. doi:10.1007/s12083-014-0255-5.

  17. Fan, C., Huang, S., & Lai, Y. (2014). Privacy enhanced data aggregation scheme against internal attackers in smart grid. IEEE Transactions on Industrial Informatics, 10(1), 666–675.

    Article  Google Scholar 

  18. Farash, M., & Attari, M. (2014). A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks. The Journal of Supercomputing, 69(1), 395–411.

    Article  MathSciNet  Google Scholar 

  19. Farash, M., & Attari, M. (2014). Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dynamics, 76(2), 1203–1213.

    Article  MathSciNet  MATH  Google Scholar 

  20. Mishra, D., Jangirala, S., & Mukhopadhyay, S. (2014). A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38(10), 1–10.

    Article  Google Scholar 

  21. Xie, Q., Tan, X., Wong, D., Wang, G., Bao, M., & Dong, N. (2014). A practical anonymous authentication protocol for wireless roaming. Security and Communication Networks, 7(8), 1264–1273.

    Article  Google Scholar 

  22. He, D., & Zeadally, S. (2015). Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1), 71–77.

    Article  Google Scholar 

  23. He, D., Kumar, N., & Chilamkurti, N. (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences. doi:10.1016/j.ins.2015.02.010.

  24. Jiang, Q., Ma, J., Li, G., & Li, X. (2015). Improvement of robust smart-card-based password authentication scheme. International Journal Communication Systems, 28(2), 383–393.

    Article  Google Scholar 

  25. David, P., & Jacque, S. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.

    Article  MATH  Google Scholar 

  26. Wu, T., & Tseng, Y. (2010). An efficient user authentication and key exchange protocol for mobile client–server environment. Computer Networks, 54(9), 1520–1530.

    Article  MATH  Google Scholar 

  27. He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings. Ad Hoc Networks, 10(6), 1009–1016.

    Article  Google Scholar 

  28. Kilinc, H. H., & Yanik, T. (2014). A survey of SIP authentication and key agreement schemes. IEEE Communications Surveys & Tutorials, 16(2), 1005–1023.

    Article  Google Scholar 

Download references

Acknowledgments

The work of J.-H. Lee was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2014R1A1A1006770).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong-Hyouk Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

He, D., Kumar, N. & Lee, JH. Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Netw 22, 491–502 (2016). https://doi.org/10.1007/s11276-015-0983-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-0983-3

Keywords

Navigation