Skip to main content

A Holistic View of Security and Privacy Issues in Smart Grids

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7823))

Abstract

The energy system is undergoing a radical transformation. The coupling of the energy system with advanced information and communication technologies is making it possible to monitor and control in real-time generation, transport, distribution and consumption of energy. In this context, a key enabler is represented by smart meters, devices able to monitor in near real-time the consumption of energy by consumers.

If, on one hand, smart meters automate the process of information flow from endpoints to energy suppliers, on the other hand, they may leak sensitive information about consumers. In this paper, we review the issues at stake and the research challenges that characterise smart grids from a privacy and security standpoint.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. NIST, Smart grid: A beginner’s guide, http://www.nist.gov/smartgrid/beginnersguide.cfm (last accessed October 28, 2012)

  2. Wiki, Smart meter, http://en.wikipedia.org/wiki/File:Intelligenter_zaehler-_Smart_meter.jpg (last accessed February 18, 2013)

  3. Han, D.-M., Lim, J.-H.: Design and implementation of smart home energy management systems based on zigbee. IEEE Transactions on Consumer Electronics 56, 1417–1425 (2010)

    Article  Google Scholar 

  4. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM (2010) 639. Energy 2020 A Strategy for Competitive, Sustainable and Secure Energy (October 2010)

    Google Scholar 

  5. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM (2011) 885. Energy Roadmap 2050 (December 2011)

    Google Scholar 

  6. Massey, R., Russo, M.: Clarification of data controller and data processor under eu privacy directive new opinion of article 29 data protection working party, http://www.mwe.com/publications/uniEntity.aspx?xpST=PublicationDetail&pub=4959 (last accessed February 18, 2013)

  7. Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  8. Ács, G., Castelluccia, C.: Dream: Differentially private smart metering. CoRR abs/1201.2531 (2012)

    Google Scholar 

  9. Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. In: The Sixth International Conference on Availability, Reliability and Security, ARES 2011, pp. 99–108 (August 2011)

    Google Scholar 

  11. Asghar, M.R., Russello, G., Crispo, B.: Poster: ESPOON ERBAC : Enforcing security policies in outsourced environments with encrypted RBAC. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 841–844. ACM (2011)

    Google Scholar 

  12. Asghar, M.R., Ion, M., Russello, G., Crispo, B.: Securing data provenance in the cloud. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 145–160. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  13. European Communities: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. (November 1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML (last accessed October 27, 2012)

  14. Personal data protection act. (November 1999), http://www.dutchdpa.nl/Pages/en_wetten_wbp.aspx (last accessed October 29, 2012)

  15. Asghar, M.R., Russello, G.: Flexible and dynamic consent-capturing. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 119–131. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  16. Asghar, M., Russello, G.: Actors: A goal-driven approach for capturing and managing consent in e-health systems. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, pp. 61–69 (July 2012)

    Google Scholar 

  17. Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)

    Article  Google Scholar 

  18. Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON ERBAC : Enforcing security policies in outsourced environments. Computers & Security (2012)

    Google Scholar 

  19. Wood, G., Newborough, M.: Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design. Energy and Buildings 35(8), 821–841 (2003)

    Article  Google Scholar 

  20. Quinn, E.: Privacy and the new energy infrastructure. Available at SSRN 1370731 (2009)

    Google Scholar 

  21. Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys 2010, pp. 61–66. ACM, New York (2010)

    Chapter  Google Scholar 

  22. Bohli, J., Sorge, C., Ugus, O.: A privacy model for smart metering. In: 2010 IEEE International Conference on Communications Workshops (ICC), pp. 1–5. IEEE (2010)

    Google Scholar 

  23. Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: First IEEE International Conference on Smart Grid Communications, SmartGridComm 2010, pp. 238–243 (October 2010)

    Google Scholar 

  24. Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011, pp. 49–60. ACM, New York (2011)

    Google Scholar 

  25. Sundramoorthy, V., Cooper, G., Linge, N., Liu, Q.: Domesticating energy-monitoring systems: Challenges and design concerns. IEEE Pervasive Computing 10, 20–27 (2011)

    Article  Google Scholar 

  26. Anderson, R., Fuloria, S.: On the security economics of electricity metering. In: WEIS (2010)

    Google Scholar 

  27. Metke, A., Ekl, R.: Security technology for smart grid networks. IEEE Transactions on Smart Grid 1(1), 99–107 (2010)

    Article  Google Scholar 

  28. Lee, A., Brewer, T.: Smart grid cyber security strategy and requirements (September 2009), http://www.meits.us/MEITS-SECURE/MS-EAP/Download/Cyber_Security_Coordination_Task_Group.pdf (last accessed on August 28, 2012)

  29. Annex, V.: Smart grid security (March 2012), http://www.thecre.com/fisma/wp-content/uploads/2012/07/ENISA_Annex-V-Smart-grid-Security-Related-Initiatives.pdf (last accessed October 25 , 2012)

  30. Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-grid security issues. IEEE Security and Privacy 8, 81–85 (2010)

    Article  Google Scholar 

  31. Cavoukian, A., Polonetsky, J., Wolf, C.: Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3(2), 275–294 (2010)

    Article  Google Scholar 

  32. McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy 7(3), 75–77 (2009)

    Article  Google Scholar 

  33. Kostyk, T., Herkert, J.: Societal implications of the emerging smart grid. Commun. ACM 55, 34–36 (2012)

    Article  Google Scholar 

  34. Baumeister, T.: Literature review on smart grid cyber security. Tech. rep., Collaborative Software Development Laboratory, Department of Information and Computer Sciences, University of Hawaii (December 2010) (last accessed October 28, 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Asghar, M.R., Miorandi, D. (2013). A Holistic View of Security and Privacy Issues in Smart Grids. In: Cuellar, J. (eds) Smart Grid Security. SmartGridSec 2012. Lecture Notes in Computer Science, vol 7823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38030-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38030-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38029-7

  • Online ISBN: 978-3-642-38030-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics