Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks

07/30/2018
βˆ™
by   Hawzhin Mohammed, et al.
βˆ™
0
βˆ™

In Advanced Metering Infrastructure (AMI) systems, smart meters (SM) send fine-grained power consumption information to the utility company, yet this power consumption information can uncover sensitive information about the consumers' lifestyle. To allow the utility company to gather the power consumption information while safeguarding the consumers' privacy, different methods that broadly utilize symmetric key and asymmetric key cryptography operation have been generally utilized. In this paper, we propose an effective method that uses symmetric key cryptography and hashing operation to gather power consumption information. Moreover, provide the utility company with an overview of the type of the appliances used by its power consumer and range of power use. The idea is based on sending cover power consumption information from the smart meters and removes these covers by including every one of the smart meters' messages, with the goal that the utility can take in the accumulated power consumption information, yet cannot take in the individual readings. Our assessments show that the cryptographic operations required in our scheme are substantially more effective than the operations required in other schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
βˆ™ 10/03/2018

EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks

In Advanced Metering Infrastructure (AMI) networks, smart meters should ...
research
βˆ™ 11/07/2020

Privacy-Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning

In advanced metering infrastructure (AMI), smart meters (SMs), which are...
research
βˆ™ 12/06/2020

Privacy-Preserving Synthetic Smart Meters Data

Power consumption data is very useful as it allows to optimize power gri...
research
βˆ™ 07/27/2022

Balanced Encoding of Near-Zero Correlation for an AES Implementation

Power consumption of a circuit can be exploited to recover the secret ke...
research
βˆ™ 06/12/2020

CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring

The lack of any sender authentication mechanism in place makes CAN (Cont...
research
βˆ™ 05/02/2019

Reputation-Based Information Design for Inducing Prosocial Behavior

We study the idea of information design for inducing prosocial behavior ...
research
βˆ™ 10/04/2019

Energy Resource Control via Privacy Preserving Data

Although the frequent monitoring of smart meters enables granular contro...

Please sign up or login with your details

Forgot password? Click here to reset