Abstract
The energy system is undergoing a radical transformation. The coupling of the energy system with advanced information and communication technologies is making it possible to monitor and control in real-time generation, transport, distribution and consumption of energy. In this context, a key enabler is represented by smart meters, devices able to monitor in near real-time the consumption of energy by consumers.
If, on one hand, smart meters automate the process of information flow from endpoints to energy suppliers, on the other hand, they may leak sensitive information about consumers. In this paper, we review the issues at stake and the research challenges that characterise smart grids from a privacy and security standpoint.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
NIST, Smart grid: A beginner’s guide, http://www.nist.gov/smartgrid/beginnersguide.cfm (last accessed October 28, 2012)
Wiki, Smart meter, http://en.wikipedia.org/wiki/File:Intelligenter_zaehler-_Smart_meter.jpg (last accessed February 18, 2013)
Han, D.-M., Lim, J.-H.: Design and implementation of smart home energy management systems based on zigbee. IEEE Transactions on Consumer Electronics 56, 1417–1425 (2010)
Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM (2010) 639. Energy 2020 A Strategy for Competitive, Sustainable and Secure Energy (October 2010)
Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, COM (2011) 885. Energy Roadmap 2050 (December 2011)
Massey, R., Russo, M.: Clarification of data controller and data processor under eu privacy directive new opinion of article 29 data protection working party, http://www.mwe.com/publications/uniEntity.aspx?xpST=PublicationDetail&pub=4959 (last accessed February 18, 2013)
Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557–570 (2002)
Ács, G., Castelluccia, C.: Dream: Differentially private smart metering. CoRR abs/1201.2531 (2012)
Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)
Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. In: The Sixth International Conference on Availability, Reliability and Security, ARES 2011, pp. 99–108 (August 2011)
Asghar, M.R., Russello, G., Crispo, B.: Poster: ESPOON ERBAC : Enforcing security policies in outsourced environments with encrypted RBAC. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 841–844. ACM (2011)
Asghar, M.R., Ion, M., Russello, G., Crispo, B.: Securing data provenance in the cloud. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 145–160. Springer, Heidelberg (2012)
European Communities: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. (November 1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML (last accessed October 27, 2012)
Personal data protection act. (November 1999), http://www.dutchdpa.nl/Pages/en_wetten_wbp.aspx (last accessed October 29, 2012)
Asghar, M.R., Russello, G.: Flexible and dynamic consent-capturing. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 119–131. Springer, Heidelberg (2012)
Asghar, M., Russello, G.: Actors: A goal-driven approach for capturing and managing consent in e-health systems. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2012, pp. 61–69 (July 2012)
Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)
Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON ERBAC : Enforcing security policies in outsourced environments. Computers & Security (2012)
Wood, G., Newborough, M.: Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design. Energy and Buildings 35(8), 821–841 (2003)
Quinn, E.: Privacy and the new energy infrastructure. Available at SSRN 1370731 (2009)
Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys 2010, pp. 61–66. ACM, New York (2010)
Bohli, J., Sorge, C., Ugus, O.: A privacy model for smart metering. In: 2010 IEEE International Conference on Communications Workshops (ICC), pp. 1–5. IEEE (2010)
Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: First IEEE International Conference on Smart Grid Communications, SmartGridComm 2010, pp. 238–243 (October 2010)
Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011, pp. 49–60. ACM, New York (2011)
Sundramoorthy, V., Cooper, G., Linge, N., Liu, Q.: Domesticating energy-monitoring systems: Challenges and design concerns. IEEE Pervasive Computing 10, 20–27 (2011)
Anderson, R., Fuloria, S.: On the security economics of electricity metering. In: WEIS (2010)
Metke, A., Ekl, R.: Security technology for smart grid networks. IEEE Transactions on Smart Grid 1(1), 99–107 (2010)
Lee, A., Brewer, T.: Smart grid cyber security strategy and requirements (September 2009), http://www.meits.us/MEITS-SECURE/MS-EAP/Download/Cyber_Security_Coordination_Task_Group.pdf (last accessed on August 28, 2012)
Annex, V.: Smart grid security (March 2012), http://www.thecre.com/fisma/wp-content/uploads/2012/07/ENISA_Annex-V-Smart-grid-Security-Related-Initiatives.pdf (last accessed October 25 , 2012)
Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-grid security issues. IEEE Security and Privacy 8, 81–85 (2010)
Cavoukian, A., Polonetsky, J., Wolf, C.: Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3(2), 275–294 (2010)
McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy 7(3), 75–77 (2009)
Kostyk, T., Herkert, J.: Societal implications of the emerging smart grid. Commun. ACM 55, 34–36 (2012)
Baumeister, T.: Literature review on smart grid cyber security. Tech. rep., Collaborative Software Development Laboratory, Department of Information and Computer Sciences, University of Hawaii (December 2010) (last accessed October 28, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Asghar, M.R., Miorandi, D. (2013). A Holistic View of Security and Privacy Issues in Smart Grids. In: Cuellar, J. (eds) Smart Grid Security. SmartGridSec 2012. Lecture Notes in Computer Science, vol 7823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38030-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-38030-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38029-7
Online ISBN: 978-3-642-38030-3
eBook Packages: Computer ScienceComputer Science (R0)