Abstract
Smart Grid systems have the potential to meet the needs of modern system. The capacity of the smart grid is often underutilized since in most of the cases we cannot deal with security in an effective way. The issue that no single solution completely safeguards the smart grid environment remains even though various solutions have been put out for smart grid security. We propose an architecture to protect the data and privacy of smart grid connected through IoT. This technique functions by means of a privacy-monitoring component that watches unencrypted info and notifies the smart grid controller upon discovery. Mitigation Framework, which has two different implementation options. First mode, used to capture traffic before it enters the smart grid network and has the ability to accept or reject packets as it analyses them. Second mode, used only passively detect threats in this configuration because it does not stand in line with the flow. Although it warns the user, threats cannot be stopped the Mitigation Framework can be deployed inside a router. Mitigation Framework functions as a protection system that may identify risks regarding privacy of data, stop them, and notify smart grid controller.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Avancini, D.B., Rodrigues, J.J., Rabêlo, R.A., Das, A.K., Kozlov, S., Solic, P.: A new IoT-based smart energy meter for smart grids. Int. J. Energy Res. 45(1), 189–202 (2021)
Srinivas, J., Das, A.K., Li, X., Khan, M.K., Jo, M.: Designing anonymous signature-based authenticated key exchange scheme for internet of things-enabled smart grid systems. IEEE Trans. Ind. Inf. 17(7), 4425–4436 (2020)
Wazid, M., Das, A.K., Kumar, N., Rodrigues, J.J.: Secure three-factor user authentication scheme for renewable-energy-based smart grid environment. IEEE Trans. Ind. Inf. 13(6), 3144–3153 (2017)
Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R., Srivastava, G.: P2tif: a blockchain and deep learning framework for privacy-preserved threat intelligence in industrial IoT. IEEE Trans. Ind. Inf. 1, 1 (2022)
Odelu, V., Das, A.K., Wazid, M., Conti, M.: Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900–1910 (2016)
Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992–8004 (2019)
Bera, B., Saha, S., Das, A.K., Vasilakos, A.V.: Designing blockchain-based access control protocol in IoT-enabled smart-grid system. IEEE Internet Things J. 8(7), 5744–5761 (2021)
Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., den Hartog, F.T.H.: Ton_IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion datasets. IEEE Internet Things J. 1, 1 (2021)
Wang, C., Chow, S.S.M., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013)
Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8, 92–106 (2015)
Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24, 1182–1191 (2013)
Zhu, Y., Ahn, G.-J., Hu, H., et al.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6, 227–238 (2013)
Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)
Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., den Hartog, F.T.: Ton_IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet Things J. 9(1), 485–496 (2021)
Darzi, S., Akhbari, B., Khodaiemehr, H.: LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. Clust. Comput. 25(1), 263–278 (2022)
Wang, T., Yang, Q., Shen, X., Gadekallu, T.R., Wang, W., Dev, K.: A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Trans. Industr. Inform. 18(7), 4981–4989 (2022)
Chen, F., Liu, A.X.: Privacy- and integrity-preserving range queries in sensor networks. IEEE/ACM Trans. Netw. 20(6), 1774–1787 (2012)
Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)
Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: Proceeding of the 10th IEEE International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341 (2015)
Kumar, R., Gupta, R., Kumar, S.: IOT security on Smart Grid: threats and mitigation frameworks. ECS Trans. 107(1), 14623–14630 (2022)
Alladi, T., Chamola, V., Sikdar, B.: Choo KKRConsumer IoT: security vulnerability case studies and solutions. IEEE Consum. Electron. 9(2), 17–25 (2020)
Ghosal, A., Conti, M.: Key management systems for Smart Grid advanced metering infrastructure: a survey. IEEE Commun. Surv. Tutor. 21(3), 2831–2848 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kumar, R., Gupta, R., Kumar, S., Gupta, N., Gaur, P. (2023). A Privacy Mitigating Framework for the Smart Grid Internet of Things Data. In: Kumar Sharma, D., Sharma, R., Jeon, G., Kumar, R. (eds) Data Analytics for Smart Grids Applications—A Key to Smart City Development. Intelligent Systems Reference Library, vol 247. Springer, Cham. https://doi.org/10.1007/978-3-031-46092-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-46092-0_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-46091-3
Online ISBN: 978-3-031-46092-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)