Skip to main content

Compromised Through Compression

Privacy Implications of Smart Meter Traffic Analysis

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2021)

Abstract

Smart metering comes with risks to privacy. One concern is the possibility of an attacker seeing the traffic that reports the energy use of a household and deriving private information from that. Encryption helps to mask the actual energy measurements, but is not sufficient to cover all risks. One aspect which has yet gone unexplored – and where encryption does not help – is traffic analysis, i.e. whether the length of messages communicating energy measurements can leak privacy-sensitive information to an observer. In this paper we examine whether using encodings or compression for smart metering data could potentially leak information about household energy use. Our analysis is based on the real-world energy use data of \(\pm 80\) Dutch households.

We find that traffic analysis could reveal information about the energy use of individual households if compression is used. As a result, when messages are sent daily, an attacker performing traffic analysis would be able to determine when all the members of a household are away or not using electricity for an entire day. We demonstrate this issue by recognizing when households from our dataset were on holiday. If messages are sent more often, more granular living patterns could likely be determined.

We propose a method of encoding the data that is nearly as effective as compression at reducing message size, but does not leak the information that compression leaks. By not requiring compression to achieve the best possible data savings, the risk of traffic analysis is eliminated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cuijpers, C., Koops, B-J.: Smart metering and privacy in Europe: lessons from the Dutch case. In: European Data Protection: Coming of Age, pp. 269–293. Springer, Heidelberg (2013). https://doi.org/10.1007/978-94-007-5170-5_12

  2. Fehér, M., Yazdani, N., Aranha, D.F., Lucani Rötter, D.E., Hansen, M.T., Vester, F.E.: Side channel security of smart meter data compression techniques. In: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) (2020). https://doi.org/10.1109/SmartGridComm47815.2020.9302931

  3. Fehér, M., Yazdani, N., Hansen, M.T., Vester, F.E., Lucani Rötter, D.E.: Smart meter data compression using generalized deduplication. In: IEEE Global Communications Conference (GLOBECOM) (2020). https://doi.org/10.1109/GLOBECOM42002.2020.9322393

  4. Gedragscode slimme meters voor netbeheerders. Netbeheer NL (2017)

    Google Scholar 

  5. Gluck, Y., Harris, N., Prado, A.: BREACH: reviving the CRIME attack (2013). http://breachattack.com/

  6. Greveler, U., Glösekötterz, P., Justus, B., Löhr, D.: Multimedia content identification through smart meter power usage profiles. In: Information and Knowledge Engineering, pp. 383–390. WorldComp (2012). https://worldcomp-proceedings.com/proc/p2012/IKE7720.pdf

  7. Greveler, U., Justus, B., Löhr, D.: Identifikation von videoinhalten über granulare stromverbrauchsdaten. In: Sicherheit, Schutz und Zuverlässigkeit, pp. 35–45 (2012). http://subs.emis.de/LNI/Proceedings/Proceedings195/article6606.html

  8. Electricity metering data exchange - the DLMS/COSEM suite - part 5–3: DLMS/COSEM application layer. IEC standard 62056-5-3:2017, International Electrotechnical Commission (2017). https://webstore.iec.ch/publication/27065

  9. Electricity metering data exchange - the DLMS/COSEM suite - part 6–1: Object Identification System (OBIS). IEC standard 62056-6-1:2017, International Electrotechnical Commission (2017). https://webstore.iec.ch/publication/32782

  10. Electricity metering data exchange - the DLMS/COSEM suite - part 6–2: COSEM interface classes. IEC standard 62056-6-2:2017, International Electrotechnical Commission (2017). https://webstore.iec.ch/publication/34317

  11. International Telecommunication Union: Recommendation V.44 - Series V: Data Communication over the Telephone Network - Error Control - Data Compression Procedures (2000). https://www.itu.int/rec/T-REC-V.44-200011-I/en

  12. Kelsey, J.: Compression and information leakage of plaintext. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 263–276. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45661-9_21

    Chapter  Google Scholar 

  13. Langley, A.: Compression contexts and privacy considerations. spdy-dev mailing list (2011). https://groups.google.com/g/spdy-dev/c/B_ulCnBjSug/m/rcU-SIFtTKoJ

  14. Lempel, A., Ziv, J.: On the complexity of finite sequences. IEEE Trans. Inf. Theory 22(1), 75–81 (1976). https://doi.org/10.1109/TIT.1976.1055501

    Article  MathSciNet  MATH  Google Scholar 

  15. Liander N.V.: Datasets slimme meter, “Zonnedael”. https://www.liander.nl/partners/datadiensten/open-data/data, https://www.liander.nl/sites/default/files/Over-Liander-slimme-meter-dataset-2013-levering.zip

  16. Liao, J., Stankovic, L., Stankovic, V.: Detecting household activity patterns from smart meter data. In: 2014 International Conference on Intelligent Environments, pp. 71–78 (2014). https://doi.org/10.1109/IE.2014.18

  17. Python Software Foundation: lzma - compression using the LZMA algorithm. https://docs.python.org/3.9/library/lzma.html

  18. Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61–66. ACM (2010). https://doi.org/10.1145/1878431.1878446

  19. Rizzo, J., Duong, T.: The CRIME attack. In: Ekoparty Security Conference (2012). https://docs.google.com/presentation/d/11eBmGiHbYcHR9gL5nDyZChu_-lCa2GizeuOfaLU2HOU/

  20. Van Aubel, P., Poll, E.: Smart metering in the Netherlands: what, how, and why. Int. J. Electric. Power Energy Syst. 109, 719–725 (2019). https://doi.org/10.1016/j.ijepes.2019.01.001

    Article  Google Scholar 

  21. Vereniging Nederlandse EnergieDataUitwisseling: Profielen elektriciteit (2016–2020). https://www.nedu.nl/documenten/verbruiksprofielen/

  22. Vestergaard, R., Zhang, Q., Lucani Rötter, D.E.: Lossless compression of time series data with generalized deduplication. In: IEEE Global Communications Conference (GLOBECOM) (2019). https://doi.org/10.1109/GLOBECOM38437.2019.9013957

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pol Van Aubel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Van Aubel, P., Poll, E. (2021). Compromised Through Compression. In: Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M. (eds) Security and Privacy in Communication Networks. SecureComm 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 399. Springer, Cham. https://doi.org/10.1007/978-3-030-90022-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-90022-9_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-90021-2

  • Online ISBN: 978-3-030-90022-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics