Skip to main content

A Privacy Mitigating Framework for the Smart Grid Internet of Things Data

  • Chapter
  • First Online:
Data Analytics for Smart Grids Applications—A Key to Smart City Development

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 247))

  • 210 Accesses

Abstract

Smart Grid systems have the potential to meet the needs of modern system. The capacity of the smart grid is often underutilized since in most of the cases we cannot deal with security in an effective way. The issue that no single solution completely safeguards the smart grid environment remains even though various solutions have been put out for smart grid security. We propose an architecture to protect the data and privacy of smart grid connected through IoT. This technique functions by means of a privacy-monitoring component that watches unencrypted info and notifies the smart grid controller upon discovery. Mitigation Framework, which has two different implementation options. First mode, used to capture traffic before it enters the smart grid network and has the ability to accept or reject packets as it analyses them. Second mode, used only passively detect threats in this configuration because it does not stand in line with the flow. Although it warns the user, threats cannot be stopped the Mitigation Framework can be deployed inside a router. Mitigation Framework functions as a protection system that may identify risks regarding privacy of data, stop them, and notify smart grid controller.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Avancini, D.B., Rodrigues, J.J., Rabêlo, R.A., Das, A.K., Kozlov, S., Solic, P.: A new IoT-based smart energy meter for smart grids. Int. J. Energy Res. 45(1), 189–202 (2021)

    Article  Google Scholar 

  2. Srinivas, J., Das, A.K., Li, X., Khan, M.K., Jo, M.: Designing anonymous signature-based authenticated key exchange scheme for internet of things-enabled smart grid systems. IEEE Trans. Ind. Inf. 17(7), 4425–4436 (2020)

    Article  Google Scholar 

  3. Wazid, M., Das, A.K., Kumar, N., Rodrigues, J.J.: Secure three-factor user authentication scheme for renewable-energy-based smart grid environment. IEEE Trans. Ind. Inf. 13(6), 3144–3153 (2017)

    Article  Google Scholar 

  4. Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R., Srivastava, G.: P2tif: a blockchain and deep learning framework for privacy-preserved threat intelligence in industrial IoT. IEEE Trans. Ind. Inf. 1, 1 (2022)

    Google Scholar 

  5. Odelu, V., Das, A.K., Wazid, M., Conti, M.: Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900–1910 (2016)

    Google Scholar 

  6. Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992–8004 (2019)

    Article  Google Scholar 

  7. Bera, B., Saha, S., Das, A.K., Vasilakos, A.V.: Designing blockchain-based access control protocol in IoT-enabled smart-grid system. IEEE Internet Things J. 8(7), 5744–5761 (2021)

    Article  Google Scholar 

  8. Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., den Hartog, F.T.H.: Ton_IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion datasets. IEEE Internet Things J. 1, 1 (2021)

    Google Scholar 

  9. Wang, C., Chow, S.S.M., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  10. Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8, 92–106 (2015)

    Article  Google Scholar 

  11. Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24, 1182–1191 (2013)

    Article  Google Scholar 

  12. Zhu, Y., Ahn, G.-J., Hu, H., et al.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6, 227–238 (2013)

    Google Scholar 

  13. Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)

    Google Scholar 

  14. Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., den Hartog, F.T.: Ton_IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet Things J. 9(1), 485–496 (2021)

    Article  Google Scholar 

  15. Darzi, S., Akhbari, B., Khodaiemehr, H.: LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. Clust. Comput. 25(1), 263–278 (2022)

    Google Scholar 

  16. Wang, T., Yang, Q., Shen, X., Gadekallu, T.R., Wang, W., Dev, K.: A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Trans. Industr. Inform. 18(7), 4981–4989 (2022)

    Article  Google Scholar 

  17. Chen, F., Liu, A.X.: Privacy- and integrity-preserving range queries in sensor networks. IEEE/ACM Trans. Netw. 20(6), 1774–1787 (2012)

    Google Scholar 

  18. Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)

    Article  Google Scholar 

  19. Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: Proceeding of the 10th IEEE International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341 (2015)

    Google Scholar 

  20. Kumar, R., Gupta, R., Kumar, S.: IOT security on Smart Grid: threats and mitigation frameworks. ECS Trans. 107(1), 14623–14630 (2022)

    Article  MathSciNet  Google Scholar 

  21. Alladi, T., Chamola, V., Sikdar, B.: Choo KKRConsumer IoT: security vulnerability case studies and solutions. IEEE Consum. Electron. 9(2), 17–25 (2020)

    Article  Google Scholar 

  22. Ghosal, A., Conti, M.: Key management systems for Smart Grid advanced metering infrastructure: a survey. IEEE Commun. Surv. Tutor. 21(3), 2831–2848 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ranjit Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kumar, R., Gupta, R., Kumar, S., Gupta, N., Gaur, P. (2023). A Privacy Mitigating Framework for the Smart Grid Internet of Things Data. In: Kumar Sharma, D., Sharma, R., Jeon, G., Kumar, R. (eds) Data Analytics for Smart Grids Applications—A Key to Smart City Development. Intelligent Systems Reference Library, vol 247. Springer, Cham. https://doi.org/10.1007/978-3-031-46092-0_9

Download citation

Publish with us

Policies and ethics