Abstract
The traditional energy consumption calculation heavily relies on manual work, which is inefficient and error-prone. The Smart Grid, which integrates information and communication technologies into the electrical grid to gather information and manage energy production and consumption, may be a solution to this challenge. However, the resulting complex infrastructure and profusion of information may open up new attack vectors exploitable by malicious parties that could attack the grid itself or violate its consumers’ privacy. In this paper, we indicate the increasing interests in providing conditionally anonymous authentication in the Smart Grid systems. While the consumption report stays anonymous, the consumers who voluntarily curtail their energy consumption, can confirm their curtailments in the scheme. Moreover, compared with the existing conditionally anonymous authentication schemes, our scheme is more efficient in computational and communication overhead for Smart Grid systems.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Litos Strategic Communication, The Smart Grid: An Introduction, Tech. rep., U.S. Department of Energy, pp. 7, 14–19, 22 (2008)
Yarali, A., Rahman, S.: Smart grid networks: Promises and challenges. Journal of Communications 7, 409–417 (2012)
Eckert, C., Krau, C., Schoo, P.: Sicherheit im Smart Grid - Eckpunkte fuer ein Energieinformationsnetz. Stiftung-Verbundkolleg/Projekt Newise (90) (2011)
Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: First IEEE International Conference on Smart Grid Communications (SmartGrid-Comm), pp. 238–243. IEEE (2010)
Fan, Z., Kalogridis, G., Efthymiou, C., Sooriyabandara, M., Serizawa, M., McGeehan, J.: The new frontier of communications research: smart grid and smart metering. In: Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, pp. 115–118. ACM (2010)
McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy 7(3), 75–77 (2009)
Lo, Y.-L., Huang, S.-C., Lu, C.-N.: Non-technical loss detection using smart distribution network measurement data. In: Innovative Smart Grid Technologies - Asia (ISGT Asia), pp. 1–5. IEEE (2012)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
So, H.K.-H., Kwok, S.H.M., Lam, E.Y., Lui, K.-S.: Zero-configuration identity-based signcryption scheme for smart grid. In: IEEE First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 321–326 (2010)
Nicanfar, H., Jokar, P., Beznosov, K., Leung, V.C.: Efficient authentication and key management mechanisms for smart grid communications. IEEE Systems Journal (6), 1–12 (2013)
Li, H., Liang, X., Lu, R., Lin, X., Shen, X.: EDR: An efficient demand response scheme for achieving forward secrecy in smart grid. In: IEEE Global Communications Conference (GLOBECOM), pp. 929–934 (2012)
He, D., Chen, C., Bu, J., Chan, S., Zhang, Y., Guizani, M.: Secure service provision in smart grid communications. IEEE Communications Magazine 50(8), 53–61 (2012)
Chu, C.-K., Liu, J.K., Wong, J.W., Zhao, Y., Zhou, J.: Privacy-preserving smart metering with regional statistics and personal enquiry services. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 369–380 (2013)
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(1), 186–208 (1989)
Schnorr, C., Claus, P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161–174 (1991)
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111–125. Springer, Heidelberg (2006)
Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 372–386. Springer, Heidelberg (2004)
Chen, L., Ng, S.L., Wang, G.: Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications 29(3), 605–615 (2011)
Zeng, S., Jiang, S., Qin, Z.: An efficient conditionally anonymous ring signature in the random oracle model. Theoretical Computer Science 461, 106–114 (2012)
Komano, Y., Ohta, K., Shimbo, A., Kawamura, S.-i.: Toward the fair anonymous signatures: Deniable ring signatures. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 174–191. Springer, Heidelberg (2006)
Lynn, B.: PBC library, http://crypto.stanford.edu/pbc/
Multiprecision integer and rational arithmetic c/c++ library, http://www.shamus.ie/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sui, Z., Alyousef, A., de Meer, H. (2015). IAA: Incentive-Based Anonymous Authentication Scheme in Smart Grids. In: Tiropanis, T., Vakali, A., Sartori, L., Burnap, P. (eds) Internet Science. INSCI 2015. Lecture Notes in Computer Science(), vol 9089. Springer, Cham. https://doi.org/10.1007/978-3-319-18609-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-18609-2_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18608-5
Online ISBN: 978-3-319-18609-2
eBook Packages: Computer ScienceComputer Science (R0)