Secure and private data aggregation for energy consumption scheduling in smart grids

Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab

Research output: Contribution to journalArticlepeer-review

30 Scopus citations

Abstract

The recent proposed solutions for demand side energy management leverage the two-way communication infrastructure provided by modern smart-meters and sharing the usage information with the other users. In this paper, we first highlight the privacy and security issues involved in the distributed demand management protocols. We propose a novel protocol to share required information among users providing privacy, confidentiality, and integrity. We also propose a new clustering-based, distributed multi-party computation (MPC) protocol. Through simulation experiments we demonstrate the efficiency of our proposed solution. The existing solutions typically usually thwart selfish and malicious behavior of consumers by deploying billing mechanisms based on total consumption during a few time slots. However, the billing is typically based on the total usage in each time slot in smart grids. In the second part of this paper, we formally prove that under the per-slot based charging policy, users have incentive to deviate from the proposed protocols. We also propose a protocol to identify untruthful users in these networks. Finally, considering a repeated interaction among honest and dishonest users, we derive the conditions under which the smart grid can enforce cooperation among users and prevents dishonest declaration of consumption.

Original languageEnglish (US)
Article number7126948
Pages (from-to)221-234
Number of pages14
JournalIEEE Transactions on Dependable and Secure Computing
Volume14
Issue number2
DOIs
StatePublished - Mar 1 2017
Externally publishedYes

Keywords

  • Energy consumption schedule
  • Game theory
  • Security and privacy
  • Smart grid

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Secure and private data aggregation for energy consumption scheduling in smart grids'. Together they form a unique fingerprint.

Cite this