Abstract
Smart metering comes with risks to privacy. One concern is the possibility of an attacker seeing the traffic that reports the energy use of a household and deriving private information from that. Encryption helps to mask the actual energy measurements, but is not sufficient to cover all risks. One aspect which has yet gone unexplored – and where encryption does not help – is traffic analysis, i.e. whether the length of messages communicating energy measurements can leak privacy-sensitive information to an observer. In this paper we examine whether using encodings or compression for smart metering data could potentially leak information about household energy use. Our analysis is based on the real-world energy use data of \(\pm 80\) Dutch households.
We find that traffic analysis could reveal information about the energy use of individual households if compression is used. As a result, when messages are sent daily, an attacker performing traffic analysis would be able to determine when all the members of a household are away or not using electricity for an entire day. We demonstrate this issue by recognizing when households from our dataset were on holiday. If messages are sent more often, more granular living patterns could likely be determined.
We propose a method of encoding the data that is nearly as effective as compression at reducing message size, but does not leak the information that compression leaks. By not requiring compression to achieve the best possible data savings, the risk of traffic analysis is eliminated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cuijpers, C., Koops, B-J.: Smart metering and privacy in Europe: lessons from the Dutch case. In: European Data Protection: Coming of Age, pp. 269–293. Springer, Heidelberg (2013). https://doi.org/10.1007/978-94-007-5170-5_12
Fehér, M., Yazdani, N., Aranha, D.F., Lucani Rötter, D.E., Hansen, M.T., Vester, F.E.: Side channel security of smart meter data compression techniques. In: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) (2020). https://doi.org/10.1109/SmartGridComm47815.2020.9302931
Fehér, M., Yazdani, N., Hansen, M.T., Vester, F.E., Lucani Rötter, D.E.: Smart meter data compression using generalized deduplication. In: IEEE Global Communications Conference (GLOBECOM) (2020). https://doi.org/10.1109/GLOBECOM42002.2020.9322393
Gedragscode slimme meters voor netbeheerders. Netbeheer NL (2017)
Gluck, Y., Harris, N., Prado, A.: BREACH: reviving the CRIME attack (2013). http://breachattack.com/
Greveler, U., Glösekötterz, P., Justus, B., Löhr, D.: Multimedia content identification through smart meter power usage profiles. In: Information and Knowledge Engineering, pp. 383–390. WorldComp (2012). https://worldcomp-proceedings.com/proc/p2012/IKE7720.pdf
Greveler, U., Justus, B., Löhr, D.: Identifikation von videoinhalten über granulare stromverbrauchsdaten. In: Sicherheit, Schutz und Zuverlässigkeit, pp. 35–45 (2012). http://subs.emis.de/LNI/Proceedings/Proceedings195/article6606.html
Electricity metering data exchange - the DLMS/COSEM suite - part 5–3: DLMS/COSEM application layer. IEC standard 62056-5-3:2017, International Electrotechnical Commission (2017). https://webstore.iec.ch/publication/27065
Electricity metering data exchange - the DLMS/COSEM suite - part 6–1: Object Identification System (OBIS). IEC standard 62056-6-1:2017, International Electrotechnical Commission (2017). https://webstore.iec.ch/publication/32782
Electricity metering data exchange - the DLMS/COSEM suite - part 6–2: COSEM interface classes. IEC standard 62056-6-2:2017, International Electrotechnical Commission (2017). https://webstore.iec.ch/publication/34317
International Telecommunication Union: Recommendation V.44 - Series V: Data Communication over the Telephone Network - Error Control - Data Compression Procedures (2000). https://www.itu.int/rec/T-REC-V.44-200011-I/en
Kelsey, J.: Compression and information leakage of plaintext. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 263–276. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45661-9_21
Langley, A.: Compression contexts and privacy considerations. spdy-dev mailing list (2011). https://groups.google.com/g/spdy-dev/c/B_ulCnBjSug/m/rcU-SIFtTKoJ
Lempel, A., Ziv, J.: On the complexity of finite sequences. IEEE Trans. Inf. Theory 22(1), 75–81 (1976). https://doi.org/10.1109/TIT.1976.1055501
Liander N.V.: Datasets slimme meter, “Zonnedael”. https://www.liander.nl/partners/datadiensten/open-data/data, https://www.liander.nl/sites/default/files/Over-Liander-slimme-meter-dataset-2013-levering.zip
Liao, J., Stankovic, L., Stankovic, V.: Detecting household activity patterns from smart meter data. In: 2014 International Conference on Intelligent Environments, pp. 71–78 (2014). https://doi.org/10.1109/IE.2014.18
Python Software Foundation: lzma - compression using the LZMA algorithm. https://docs.python.org/3.9/library/lzma.html
Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61–66. ACM (2010). https://doi.org/10.1145/1878431.1878446
Rizzo, J., Duong, T.: The CRIME attack. In: Ekoparty Security Conference (2012). https://docs.google.com/presentation/d/11eBmGiHbYcHR9gL5nDyZChu_-lCa2GizeuOfaLU2HOU/
Van Aubel, P., Poll, E.: Smart metering in the Netherlands: what, how, and why. Int. J. Electric. Power Energy Syst. 109, 719–725 (2019). https://doi.org/10.1016/j.ijepes.2019.01.001
Vereniging Nederlandse EnergieDataUitwisseling: Profielen elektriciteit (2016–2020). https://www.nedu.nl/documenten/verbruiksprofielen/
Vestergaard, R., Zhang, Q., Lucani Rötter, D.E.: Lossless compression of time series data with generalized deduplication. In: IEEE Global Communications Conference (GLOBECOM) (2019). https://doi.org/10.1109/GLOBECOM38437.2019.9013957
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Van Aubel, P., Poll, E. (2021). Compromised Through Compression. In: Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M. (eds) Security and Privacy in Communication Networks. SecureComm 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 399. Springer, Cham. https://doi.org/10.1007/978-3-030-90022-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-90022-9_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90021-2
Online ISBN: 978-3-030-90022-9
eBook Packages: Computer ScienceComputer Science (R0)