Shahed University

A secure ECC-based privacy preserving data aggregation scheme for smart grids

Erfaneh Vahedi | Majid Bayat | Mohammad Reza Pakravan | Mohammad Reza Aref

URL :   http://research.shahed.ac.ir/WSR/WebPages/Report/PaperView.aspx?PaperID=54012
Date :  2017/12/24
Publish in :    Computer Networks:The International Journal of Computer and Telecommunications
DOI :  https://doi.org/10.1016/j.comnet.2017.08.025
Link :  http://www.sciencedirect.com/science/article/pii/S1389128617303353
Keywords :Smart grid , Privacy preserving , Confidentiality, Data aggregation, Authentication

Abstract :
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time prevents smart meters from performing their other duties, such as managing the home area network. In this paper, we propose an efficient privacy preserving data aggregation scheme, based on elliptic curves. In our scheme, each smart meter signs its encrypted data and sends it to the aggregator. After receiving the data, the aggregator verifies the incoming messages and aggregates them, without the need to decrypt the data received from each smart meter. The aggregator signs the aggregated messages and sends it to the operation center. At the end, the smart meters’ data are obtained and verified by the operation center. In addition to providing efficient computation cost, for the users, our protocol also satisfies the security requirements of smart grid data aggregation schemes. We provide security analysis of the proposed scheme as well as comparisons to show the efficiency of our scheme on computation and communication overheads.