The deployment of smart metering provides an immense amount of data for power grid operators and energy providers. By using this data, a more efficient and flexible power grid can be realized. However, this data also raises privacy concerns since it contains very sensitive information about customers. In this paper, we present a security and privacy-preserving metering scheme for the community customers, by utilizing the password authenticated key exchange (PAKE) protocol and Elliptic Curve Cryptosystem (ECC). The proposed scheme will protect the community network from possible malicious behavior, and security analysis is also given in the paper.
References
[1]
Finster, S., Baumgart, I., Lin, H. and Tian, S. (2014) Privacy-Aware Smart Metering: A Survey. IEEE Communication Surveys and Tutorials, 16, 1732-1745.
https://doi.org/10.1109/SURV.2014.052914.00090
[2]
Elderberry: A Peer-to-Peer, Privacy-Aware Smart Metering Protocol.
[3]
Shen, H. and Zhang, M. (2016) A Privacy-Preserving Multi-Level Users Electricity Consumption Aggregation and Control Scheme in Smart Grids. Journal of Cryptologic Research, 3, 171-191.
[4]
Quinn, E.L. (2009) Privacy and the New Energy Infrastructure. Ssrn Electronic Journal, 2009. https://doi.org/10.2139/ssrn.1370731
[5]
Dutta, M., Singh, A.K. and Kumar, A. (2013) An Efficient Signcryption Scheme Based on ECC with Forward Secrecy and Encrypted Message Authentication. 3rd IEEE International Advance Computing Conference, Ghaziabad, 22-23 February 2013, 399-403. https://doi.org/10.1109/IAdCC.2013.6514258
[6]
Alshinina, R. and Elleithy, K. (2015) An Efficient Message Authenti-cation and Source Privacy with a Hidden Generator Point Based on ECC. IEEE International Advance Computing Conference, Farmingdale, 1-1 May 2015, 257-302.
https://doi.org/10.1109/LISAT.2015.7160220
[7]
Saeed, M., Mackvandi, A., Naddafiun, M. and Karimnejad, H.R. (2012) An Enhanced Password Authenticated Key Exchange Protocol without Server Public Keys. ICTC 2012, Jeju Island, 15-17 October 2012, 87-91.
https://doi.org/10.1109/ICTC.2012.6386785
[8]
Ding, X., Ma, C. and Cheng, Q. (2009) Password Authenticated Key Exchange Protocol with Stronger Security. IEEE 1st International Workshop on Education Technology and Computer Sci-ence, 2009, 678-681.
[9]
Strangio, M.A. (2006) An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol. Proceeding of the 1st IEEE International Conference on Availability, Reliability, and Security (ARES’06), Vienna, 20-22 April 2006, 216-223.
https://doi.org/10.1109/ARES.2006.29
[10]
Singh, V., Dahiya, P. and Singh, S. (2014) Smart Card Based Password Au-thentication and User Anonymity Scheme Using ECC and Steganography. IEEE 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, 24-27 September 2014, 1614-1621.
https://doi.org/10.1109/ICACCI.2014.6968403
[11]
Chang, Q., Zhang, Y.P. and Qin, L.L. (2010) A Node Authentication Protocol Based on ECC in WSN. IEEE 2010 International Conference on Computer Design and Applications (ICCDA), Qinhuangdao, 25-27 June 2010, 606-609.
https://doi.org/10.1109/ICCDA.2010.5541288
[12]
Raj, S.P. and Renold, A.P. (2015) An Enhanced Elliptic Curve Algo-rithm for Secured Data Transmission in Wireless Sensor Network. IEEE 2015 Global Conference on Communication Tech-nologies (GCCT), Thuckalay, 23-24 April 2015.
https://doi.org/10.1109/GCCT.2015.7342790
[13]
Nicanfar, H. and Leung, V.C.M. (2013) Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System. IEEE Transactions on Smart Grid, 4,253-264. https://doi.org/10.1109/TSG.2012.2226252