A privacy protection scheme for smart meter that can verify terminal's trustworthiness

被引:15
|
作者
Zhang, Shaomin [1 ]
Zheng, Tengfei [1 ]
Wang, Baoyi [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
关键词
Smart meter; Privacy protection; Trusted computing; Attributes; Ring signcryption; SECURITY;
D O I
10.1016/j.ijepes.2019.01.010
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to monitor and predict the status of the power grid effectively in real time, smart meters need to send the power information of users to the control center frequently. However, power consumption data may contain users' privacy, e.g., living habits and hobbies. Further, as the smart meter terminal's working environment is complex and diverse, and smart meters suffer from endless physical attacks and cyber attacks, so the trustworthiness of smart meters is under threat. Aiming at addressing the problems above, a privacy protection scheme for smart meters that can verify the terminal's trustworthiness based on trusted computing is proposed in this paper. We design an attribute identity-based signcryption algorithm, and improve the remote anonymous attestation protocol based on the algorithm, which on the one hand realizes privacy protection of smart meters with high efficiency, and on the other hand completes real time verification of the smart meters' trustworthiness. The specific implementation process of the scheme is given in this paper. The anonymity, privacy protection of the platform configuration, and unforgeability of the scheme are proved in theory. Corresponding experiments show that this scheme has higher computational efficiency than others.
引用
收藏
页码:117 / 124
页数:8
相关论文
共 50 条
  • [31] A fine-grained privacy protection data aggregation scheme for outsourcing smart grid
    LI Hongyang
    LI Xinghua
    CHENG Qingfeng
    Frontiers of Computer Science, 2023, 17 (03)
  • [32] Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios
    Xu, Zhiyan
    Luo, Min
    Kumar, Neeraj
    Vijayakumar, Pandi
    Li, Li
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [33] A Smart Grid Privacy Protection Scheme Based on Short Fail-Stop Signature
    Xu, Shumei
    Yang, Ningbin
    Zhou, Quan
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 258 - 266
  • [34] A Security Privacy Protection Scheme for Data Collection of Smart Meters Based on Homomorphic Encryption
    Niu Yukun
    Tan Xiaobin
    Chen Shi
    Wang Haifeng
    Yu Kai
    Bu Zhiyong
    2013 IEEE EUROCON, 2013, : 1400 - 1404
  • [35] A fine-grained privacy protection data aggregation scheme for outsourcing smart grid
    Li, Hongyang
    Li, Xinghua
    Cheng, Qingfeng
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (03)
  • [36] An optimal scheduling scheme for smart home electricity considering demand response and privacy protection
    Zhang, Shaomin
    Rong, Jieqi
    Wang, Baoyi
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 132 (132)
  • [37] TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities
    Wang, Hao
    Han, Guangjie
    Zhu, Chunsheng
    Chan, Sammy
    Zhang, Wenbo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 965 - 974
  • [38] Preference Preserved Privacy Protection Scheme for Smart Home Network System Based on Information Hiding
    Yang, Lina
    Deng, Haiyu
    Dang, Xiaocui
    IEEE ACCESS, 2020, 8 : 40767 - 40776
  • [39] Lightweight privacy-preserving data aggregation scheme for smart grid metering infrastructure protection
    Baloglu, Ulas Baran
    Demir, Yakup
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 22 : 16 - 24
  • [40] An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection
    Teng, Da
    Yao, Yanqing
    Wang, Yingdong
    Zhou, Lei
    Huang, Chao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 296 - 313