TY - GEN
T1 - Efficient privacy-preserving data collection scheme for smart grid AMI networks
AU - Mohammed, Hawzhin
AU - Tonyali, Samet
AU - Rabieh, Khaled
AU - Mahmoud, Mohamed
AU - Akkaya, Kemal
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016
Y1 - 2016
N2 - In this paper, we propose an efficient scheme that utilizes symmetric-key-cryptography and hashing operations to collect consumption data. The idea is based on sending masked power consumption readings from the meters and removing these masks by adding all the meters' messages, so that the utility can learn the aggregated reading but cannot learn the individual readings. We also introduce a key management procedure that uses asymmetric key operations, but unlike the power consumption collection that is done very frequently, the key management procedure is run every long time for key renewals. Our evaluations indicate that the cryptographic operations needed in our scheme are much more efficient than the operations needed in the existing schemes. In addition, we have shown that the proposed scheme can preserve the consumers' privacy and provide high protection level against collusion attacks. Finally, ns-3 simulation results demonstrate that the network performance of the proposed scheme outperforms the performance of the existing schemes due to reducing the packet size and computational overhead.
AB - In this paper, we propose an efficient scheme that utilizes symmetric-key-cryptography and hashing operations to collect consumption data. The idea is based on sending masked power consumption readings from the meters and removing these masks by adding all the meters' messages, so that the utility can learn the aggregated reading but cannot learn the individual readings. We also introduce a key management procedure that uses asymmetric key operations, but unlike the power consumption collection that is done very frequently, the key management procedure is run every long time for key renewals. Our evaluations indicate that the cryptographic operations needed in our scheme are much more efficient than the operations needed in the existing schemes. In addition, we have shown that the proposed scheme can preserve the consumers' privacy and provide high protection level against collusion attacks. Finally, ns-3 simulation results demonstrate that the network performance of the proposed scheme outperforms the performance of the existing schemes due to reducing the packet size and computational overhead.
UR - http://www.scopus.com/inward/record.url?scp=85015375518&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015375518&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2016.7841782
DO - 10.1109/GLOCOM.2016.7841782
M3 - Conference contribution
AN - SCOPUS:85015375518
T3 - 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
BT - 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 59th IEEE Global Communications Conference, GLOBECOM 2016
Y2 - 4 December 2016 through 8 December 2016
ER -