Skip to main content

Advertisement

Log in

Hardware Security Device Facilitated Trusted Energy Services

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

We report on our experiences in developing a hardware based security solution for a novel, smart-grid enabled energy services system. In this paper, we first give a background to a new energy services model and then describe how we incorporated a CSIRO developed portable trusted computing platform into a practical, prototype system which assures that all transactions between the energy service company and the consumer are trustworthy, secure and private.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. An economic examination of the use of contracts in smart grid systems is presented in [29].

  2. Companies such as Gemalto and Spyrus already supply smart cards with a variety of interfaces, including card reader, USB and Near-Field Communications (NFC).

  3. The development environment for the device is OpenEmbedded, with the device’s operating system based on Linux.

References

  1. Anderson R, Fuloria S (2010) Who controls the off switch? In: 2010 First IEEE International conference on Smart grid communications (SmartGridComm), pp 96–101

  2. Bertoldi P, Hinnells M, Rezessey S (2006) Liberating the power of energy services and ESCOs in a liberalised energy market. In: Proceedings of the 4th international conference on energy efficiency in domestic appliances and lighting, vol 1. European CommissionDGJRC, pp 21–32. http://publications.jrc.ec.europa.eu/repository/handle/111111111/8392. Accessed 10 Mar 2012

  3. Billion (2011) Web site. www.billion.com/product/zigbee.html. Accessed 28 Nov 2011

  4. Certicom (2011) Web site. www.certicom.com. Accessed 27 Nov 2011

  5. Chan J, Nepal S, Moreland D, Hwang H, Chen S, Zic J (2007) User-controlled collaborations in the context of trust extended environments. In: WETICE. IEEE Computer Society, pp 389–394

  6. Comverge (2011) Web site. www.comverge.com. Accessed 27 Nov 2011

  7. Cuijpers C (2009) No to mandatory smart metering: does not equal privacy, Tilburg institute for law, technology and society web site. TILT Weblog Law & Technology. http://vortex.uvt.nl/TILTblog/?p=54. Accessed 30 Aug 2011

  8. Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  9. EnerNOC (2011) EnerNOC. Web Page. www.enernoc.com. Accessed 29 May 2011

  10. EPRI (2011) Communication modularity: a practical approach to enabling residential demand response. Whitepaper 1023245, EPRI. www.silverspringnet.com. Accessed 27 Nov 2011

  11. Figaro (2011) Web site. www.ict-figaro.eu. Accessed 28 Nov 2011

  12. Fung BCM, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surv 42(4)

  13. GE Nucleus (2011) Web site. www.geappliances.com/home-energy-manager. Accessed 28 Nov 2011

  14. Gridwise alliance (2011) Web site. www.gridwise.org. Accessed 27 Nov 2011

  15. Home Gateway Initiative (2011) Web site. www.homegatewayinitiative.org. Accessed 28 Nov 2011

  16. Lampson BW (2009) Privacy and security—usable security: how to get it. Commun ACM 52(11):25–27

    Article  Google Scholar 

  17. LeMay M, Gunter CA (2009) Cumulative attestation kernels for embedded systems. In: 14th European symposium on research in computer security, pp 655–670

  18. LeMay M, Gunter CA (2011) Enforcing executing-implies-verified with the integrity-aware processor. In: 4th International conference on trust and trustworthy computing, pp 202–216

  19. Lin K, Panahi M, Zhang Y, Zhang J, Chang S (2009) Building accountability middleware to support dependable SOA. IEEE Internet Computing 13(2):16–25

    Article  MATH  Google Scholar 

  20. Mocana (2011) Web site. www.mocana.com. Accessed 27 Nov 2011

  21. NAESCO (2011) National association of energy service companies. Web Page. www.naesco.org Accessed 28 May 2011

  22. Nepal S, Zic J, Liu D, Jang J (2011) A mobile and portable trusted computing platform. EURASIP Journal on Wireless Communications and Networking (JWCN). Springer Open Access. Web site: http://jwcn.eurasipjournals.com/content/2011/1/75. Accessed 3 Oct 2011. doi:10.1186/1687-1499-2011-75

  23. O’Hara EA (2008) Trustworthiness and contract. In: Zak PJ (ed) Moral markets: the critical role of values in the economy. Princeton University Press, pp 173–203

  24. Parker D, Hoak D, Meier A, Brown, R (2006) How much energy are we using? Potential of residential energy demand feedback devices. In: Proc. ACEEE. Summer study on energy efficiency in buildings, pp 2–11

  25. Piètre-Cambacéadè L, Tritschler M, Ericsson GN (2011) Cybersecurity myths on power control systems: 21 misconceptions and false beliefs. IEEE Trans Power Deliv 26(1):161–172

    Article  Google Scholar 

  26. Portus (2011) Web site. www.portushome.com. Accessed 26 Nov 2011

  27. Saturn South Pty Ltd. Web site. www.silverspringnet.com. Accessed 20 Jul 2011

  28. SilverSpring Networks (2011) Web site. www.silverspringnet.com. Accessed 2 Nov 2011

  29. Sorrell S (2007) The economics of energy service contracts. Energy Policy 35(1):507–521

    Article  Google Scholar 

  30. Trusted Computing Group (2011) Trusted Computing Group. Web site. www.trustedcomputinggroup.org. Accessed 18 Jul 2011

  31. US Department of Energy (2006) Benefits of demand response in electricity markets and recommendations for achieving them. Technical report, US Department of Energy

  32. US National Institute of Standards and Technology (NIST) (2012) NIST framework and roadmap for smart grid interoperability standards, release 2.0.Web page: http://www.nist.gov/smartgrid/upload/NIST_Framework_Release_2-0_corr.pdf. Accessed 9 Mar 2012

  33. Wang C, de Groot M (2010) Managing end-user preferences in the smart grid. In: e-Energy ’10: proceedings of the 1st international conference on energy-efficient computing and networking. ACM, New York, pp 105–114

    Chapter  Google Scholar 

  34. Wang C, de Groot M, Marendy P (2009) A service-oriented system for optimizing residential energy use. In: IEEE international conference on web services, 2009. ICWS 2009, pp 735–742, 6–10 July 2009

  35. Wang C, Nepal S, Chen S, Zic J (2008) Cooperative data management services based on accountable contract. In: Cooperative Information Systems (CoopIS) 2008 international conference, pp 301–318

  36. Watt ME, Morgan R, Passey RJ (2006) Experiences with residential grid-connected photovoltaic systems in Australia. Technical report, Centre for Energy and Environmental Markets (CEEM), University of New South Wales, Sydney 2052, Australia

  37. Weitzner DJ, Abelson H, Berners-Lee T, Feigenbaum J, Hendler J, Sussman GJ (2008) Information accountability. Commun ACM 51:82–87

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John J. Zic.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zic, J.J., de Groot, M., Liu, D. et al. Hardware Security Device Facilitated Trusted Energy Services. Mobile Netw Appl 17, 564–577 (2012). https://doi.org/10.1007/s11036-012-0363-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-012-0363-5

Keywords

Navigation