Abstract
We report on our experiences in developing a hardware based security solution for a novel, smart-grid enabled energy services system. In this paper, we first give a background to a new energy services model and then describe how we incorporated a CSIRO developed portable trusted computing platform into a practical, prototype system which assures that all transactions between the energy service company and the consumer are trustworthy, secure and private.
Similar content being viewed by others
Notes
An economic examination of the use of contracts in smart grid systems is presented in [29].
Companies such as Gemalto and Spyrus already supply smart cards with a variety of interfaces, including card reader, USB and Near-Field Communications (NFC).
The development environment for the device is OpenEmbedded, with the device’s operating system based on Linux.
References
Anderson R, Fuloria S (2010) Who controls the off switch? In: 2010 First IEEE International conference on Smart grid communications (SmartGridComm), pp 96–101
Bertoldi P, Hinnells M, Rezessey S (2006) Liberating the power of energy services and ESCOs in a liberalised energy market. In: Proceedings of the 4th international conference on energy efficiency in domestic appliances and lighting, vol 1. European CommissionDGJRC, pp 21–32. http://publications.jrc.ec.europa.eu/repository/handle/111111111/8392. Accessed 10 Mar 2012
Billion (2011) Web site. www.billion.com/product/zigbee.html. Accessed 28 Nov 2011
Certicom (2011) Web site. www.certicom.com. Accessed 27 Nov 2011
Chan J, Nepal S, Moreland D, Hwang H, Chen S, Zic J (2007) User-controlled collaborations in the context of trust extended environments. In: WETICE. IEEE Computer Society, pp 389–394
Comverge (2011) Web site. www.comverge.com. Accessed 27 Nov 2011
Cuijpers C (2009) No to mandatory smart metering: does not equal privacy, Tilburg institute for law, technology and society web site. TILT Weblog Law & Technology. http://vortex.uvt.nl/TILTblog/?p=54. Accessed 30 Aug 2011
Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
EnerNOC (2011) EnerNOC. Web Page. www.enernoc.com. Accessed 29 May 2011
EPRI (2011) Communication modularity: a practical approach to enabling residential demand response. Whitepaper 1023245, EPRI. www.silverspringnet.com. Accessed 27 Nov 2011
Figaro (2011) Web site. www.ict-figaro.eu. Accessed 28 Nov 2011
Fung BCM, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surv 42(4)
GE Nucleus (2011) Web site. www.geappliances.com/home-energy-manager. Accessed 28 Nov 2011
Gridwise alliance (2011) Web site. www.gridwise.org. Accessed 27 Nov 2011
Home Gateway Initiative (2011) Web site. www.homegatewayinitiative.org. Accessed 28 Nov 2011
Lampson BW (2009) Privacy and security—usable security: how to get it. Commun ACM 52(11):25–27
LeMay M, Gunter CA (2009) Cumulative attestation kernels for embedded systems. In: 14th European symposium on research in computer security, pp 655–670
LeMay M, Gunter CA (2011) Enforcing executing-implies-verified with the integrity-aware processor. In: 4th International conference on trust and trustworthy computing, pp 202–216
Lin K, Panahi M, Zhang Y, Zhang J, Chang S (2009) Building accountability middleware to support dependable SOA. IEEE Internet Computing 13(2):16–25
Mocana (2011) Web site. www.mocana.com. Accessed 27 Nov 2011
NAESCO (2011) National association of energy service companies. Web Page. www.naesco.org Accessed 28 May 2011
Nepal S, Zic J, Liu D, Jang J (2011) A mobile and portable trusted computing platform. EURASIP Journal on Wireless Communications and Networking (JWCN). Springer Open Access. Web site: http://jwcn.eurasipjournals.com/content/2011/1/75. Accessed 3 Oct 2011. doi:10.1186/1687-1499-2011-75
O’Hara EA (2008) Trustworthiness and contract. In: Zak PJ (ed) Moral markets: the critical role of values in the economy. Princeton University Press, pp 173–203
Parker D, Hoak D, Meier A, Brown, R (2006) How much energy are we using? Potential of residential energy demand feedback devices. In: Proc. ACEEE. Summer study on energy efficiency in buildings, pp 2–11
Piètre-Cambacéadè L, Tritschler M, Ericsson GN (2011) Cybersecurity myths on power control systems: 21 misconceptions and false beliefs. IEEE Trans Power Deliv 26(1):161–172
Portus (2011) Web site. www.portushome.com. Accessed 26 Nov 2011
Saturn South Pty Ltd. Web site. www.silverspringnet.com. Accessed 20 Jul 2011
SilverSpring Networks (2011) Web site. www.silverspringnet.com. Accessed 2 Nov 2011
Sorrell S (2007) The economics of energy service contracts. Energy Policy 35(1):507–521
Trusted Computing Group (2011) Trusted Computing Group. Web site. www.trustedcomputinggroup.org. Accessed 18 Jul 2011
US Department of Energy (2006) Benefits of demand response in electricity markets and recommendations for achieving them. Technical report, US Department of Energy
US National Institute of Standards and Technology (NIST) (2012) NIST framework and roadmap for smart grid interoperability standards, release 2.0.Web page: http://www.nist.gov/smartgrid/upload/NIST_Framework_Release_2-0_corr.pdf. Accessed 9 Mar 2012
Wang C, de Groot M (2010) Managing end-user preferences in the smart grid. In: e-Energy ’10: proceedings of the 1st international conference on energy-efficient computing and networking. ACM, New York, pp 105–114
Wang C, de Groot M, Marendy P (2009) A service-oriented system for optimizing residential energy use. In: IEEE international conference on web services, 2009. ICWS 2009, pp 735–742, 6–10 July 2009
Wang C, Nepal S, Chen S, Zic J (2008) Cooperative data management services based on accountable contract. In: Cooperative Information Systems (CoopIS) 2008 international conference, pp 301–318
Watt ME, Morgan R, Passey RJ (2006) Experiences with residential grid-connected photovoltaic systems in Australia. Technical report, Centre for Energy and Environmental Markets (CEEM), University of New South Wales, Sydney 2052, Australia
Weitzner DJ, Abelson H, Berners-Lee T, Feigenbaum J, Hendler J, Sussman GJ (2008) Information accountability. Commun ACM 51:82–87
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zic, J.J., de Groot, M., Liu, D. et al. Hardware Security Device Facilitated Trusted Energy Services. Mobile Netw Appl 17, 564–577 (2012). https://doi.org/10.1007/s11036-012-0363-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-012-0363-5