Skip to main content

Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids

  • Conference paper
  • First Online:
Ubiquitous Security (UbiSec 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1557))

Included in the following conference series:

Abstract

Secure multidimensional data aggregation (SMDA) has been widely investigated to meet the requirement of protecting individual users’ real-time electricity consumption data privacy in smart grid. However, most previous proposals require decryption of encrypted data to obtain the mean and variance, which leads to the inefficient and insecure in the protocols. This article presents an efficient and privacy-enhanced mean-variance scheme (namely PMVS) to provide the privacy-preserving, in which the Paillier cryptosystem is adopted in a fog-based architecture. To achieve efficient authentication functionality, batch verification technology is applied in our scheme. Our scheme provides two new features: Firstly, Electricity Service Provider (ESP) can directly obtain the mean and variance by decrypting the received ciphertext. Secondly, the PMVS can also resist malicious signature attacks. By identifying invalid signatures, the verified signatures can be aggregated, effectively preventing malicious signature attacks from causing batch verification to fail all the time and failing to enter the secure computing stage. The security analysis shows that the proposed scheme is secure and can preserve the meters’ privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moslehi, K., Kumar, R.: A reliability perspective of the smart grid. IEEE Trans. Smart Grid 1(1), 57–64 (2010)

    Article  Google Scholar 

  2. Desai, S., Alhadad, R., Chilamkurti, N., Mahmood, A.: A survey of privacy preserving schemes in IoE enabled smart grid advanced metering infrastructure. Clust. Comput. 22(1), 43–69 (2019). https://doi.org/10.1007/s10586-018-2820-9

    Article  Google Scholar 

  3. Meng, W., Ma, R., Chen, H.-H.: Smart grid neighborhood area networks: a survey. IEEE Netw. 28(1), 24–32 (2014)

    Article  Google Scholar 

  4. Wei, Yu., An, D., Griffith, D., Yang, Q., Guobin, X.: Towards statistical modeling and machine learning based energy usage forecasting in smart grid. ACM SIGAPP Appl. Comput. Rev. 15(1), 6–16 (2015)

    Article  Google Scholar 

  5. Chen, L., Rongxing, L., Cao, Z., AlHarbi, K., Lin, X.: MuDA: multifunctional data aggregation in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. 8(5), 777–792 (2015). https://doi.org/10.1007/s12083-014-0292-0

    Article  Google Scholar 

  6. Zhao, S., et al.: Smart and practical privacy-preserving data aggregation for fog-based smart grids. IEEE Trans. Inf. Forensics Secur. 16, 521–536 (2020)

    Article  Google Scholar 

  7. Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 327–332. IEEE (2010)

    Google Scholar 

  8. Rongxing, L., Xiaohui Liang, X., Li, X.L., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)

    Article  Google Scholar 

  9. Liu, Y., Guo, W., Fan, C.-I., Chang, L., Cheng, C.: A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Ind. Inform. 15(3), 1767–1774 (2018)

    Article  Google Scholar 

  10. Karampour, A., Ashouri-Talouki, M., Ladani, B.T.: An efficient privacy-preserving data aggregation scheme in smart grid. In: 2019 27th Iranian Conference on Electrical Engineering (ICEE), pp. 1967–1971. IEEE (2019)

    Google Scholar 

  11. Shen, H., Liu, Y., Xia, Z., Zhang, M.: An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Inf. Sci. 526, 289–300 (2020)

    Article  MathSciNet  Google Scholar 

  12. Guo, C., Jiang, X., Choo, K.-K.R., Tang, X., Zhang, J.: Lightweight privacy preserving data aggregation with batch verification for smart grid. Future Gener. Comput. Syst. 112, 512–523 (2020)

    Article  Google Scholar 

  13. Zuo, X., Li, L., Peng, H., Luo, S., Yang, Y.: Privacy-preserving multidimensional data aggregation scheme without trusted authority in smart grid. IEEE Syst. J. 15(1), 395–406 (2021)

    Article  Google Scholar 

  14. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001). https://doi.org/10.1007/s102070100002

    Article  Google Scholar 

  15. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30

    Chapter  Google Scholar 

  16. Shen, H., Zhang, M., Shen, J.: Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans. Inf. Forensics Secur. 12(6), 1369–1381 (2017)

    Article  Google Scholar 

  17. Merad-Boudia, O.R., Senouci, S.M.: An efficient and secure multidimensional data aggregation for fog computing-based smart grid. IEEE Internet Things J. 8(8), 6143–6153 (2020)

    Article  Google Scholar 

  18. Chen, Y., Martínez-Ortega, J.-F., Castillejo, P., López, L.: A homomorphic-based multiple data aggregation scheme for smart grid. IEEE Sens. J. 19(10), 3921–3929 (2019)

    Article  Google Scholar 

  19. Ding, Y., Wang, B., Wang, Y., Zhang, K., Wang, H.: Secure metering data aggregation with batch verification in industrial smart grid. IEEE Trans. Ind. Inform. 16(10), 6607–6616 (2020)

    Article  Google Scholar 

  20. Ge, S., Zeng, P., Lu, R., Choo, K.-K.R.: FGDA: fine-grained data analysis in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. 11(5), 966–978 (2018). https://doi.org/10.1007/s12083-017-0618-9

    Article  Google Scholar 

  21. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  22. Antipa, A., Brown, D., Gallant, R., Lambert, R., Struik, R., Vanstone, S.: Accelerated verification of ECDSA signatures. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 307–318. Springer, Heidelberg (2006). https://doi.org/10.1007/11693383_21

    Chapter  Google Scholar 

  23. Macdonald, I.G.: Symmetric Functions and Hall Polynomials. Oxford University Press, Oxford (1998)

    MATH  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Natural Science Foundation of China under grants 62072134 and U2001205, and the Key projects of Guangxi Natural Science Foundation under grant 2019JJD170020.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Zhang, P., Zhan, H., Zhang, M. (2022). Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds) Ubiquitous Security. UbiSec 2021. Communications in Computer and Information Science, vol 1557. Springer, Singapore. https://doi.org/10.1007/978-981-19-0468-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0468-4_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0467-7

  • Online ISBN: 978-981-19-0468-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics