Publicly verifiable spatial and temporal aggregation scheme against malicious aggregator in smart grid

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

We propose a privacy-preserving aggregation scheme under a malicious attacks model, in which the aggregator may forge householders' billing, or a neighborhood aggregation data, or collude with compromised smart meters to reveal object householders' fine-grained data. The scheme can generate spatially total consumption in a neighborhood at a timestamp and temporally a householder's billing in a series of timestamps. The proposed encryption scheme of imposing masking keys from pseudo-random function (PRF) between pairwise nodes on partitioned data ensures the confidentiality of individual fine-grained data, and fends off the power theft of n-2 smart meters at most (n is the group size of smart meters in a neighborhood). Compared with the afore-mentioned methods of public key encryption in most related literatures, the simple and lightweight combination of PRF with modular addition not only is customized to the specific needs of smart grid, but also facilitates any node's verification for local aggregation or global aggregation with low cost overhead. The publicly verifiable scenarios are very important for self-sufficient, remote places, which can only afford renewable energy and can manage its own energy price according to the energy consumption circumstance in a neighborhood.

Cite

CITATION STYLE

APA

Zhang, L., & Zhang, J. (2019). Publicly verifiable spatial and temporal aggregation scheme against malicious aggregator in smart grid. Applied Sciences (Switzerland), 9(3). https://doi.org/10.3390/app9030490

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free