Skip to main content

Privacy-Preserving Demand Response in Smart Grids

  • Chapter
  • First Online:
Enabling Secure and Privacy Preserving Communications in Smart Grids

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

Recently, smart grids have attracted increasing attention [1–4]. Compared with the traditional power grid, smart grids are featured with many attractive characteristics, e.g., self-monitoring, self-healing, remote check, pervasive control and more customer choices [5–8]. One appealing feature of smart grids is demand response (DR), which can assist users to use energy efficiently and transfer non-emergent power demand from on-peak time to off-peak time [9]. DR can also bring various benefits to users. For example, users can reduce their electricity expenditure by matching the operation time of different electric appliances in their places to the period with the cheapest price.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Deng, J. Chen, X. Cao, Y. Zhang, S. Maharjan, and S. Gjessing, “Sensing-performance tradeoff in cognitive radio enabled smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 302–310, 2013.

    Article  Google Scholar 

  2. H. Liang, B. Choi, W. Zhuang, and X. Shen, “Towards optimal energy store-carry-and-deliver for phevs via v2g system,” in IEEE INFOCOM, 2012, pp. 1674–1682.

    Google Scholar 

  3. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “Eppa: An efficient and privacy preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012.

    Article  Google Scholar 

  4. H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, “Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, http://www.computer.org/csdl/trans/td/preprint/06506075-abs.html.

  5. H. Liang, B. Choi, A. Abdrabou, W. Zhuang, and X. Shen, “Decentralized economic dispatch in microgrids via heterogeneous wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 6, pp. 1061–1074, 2012.

    Article  Google Scholar 

  6. M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, “Ecq: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid,” in IEEE GLOBECOM, Atlanta, GA, USA, 2013.

    Google Scholar 

  7. X. Lu, W. Wang, and J. Ma, “An empirical study of communication infrastructures towards the smart grid: Design, implementation, and evaluation,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 170–183, 2013.

    Article  Google Scholar 

  8. M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, “Sesa: An efficient searchable encryption scheme for auction in emerging smart grid marketing,” Security and Communication Networks, http://onlinelibrary.wiley.com/doi/10.1002/sec.699/full.

  9. F. Rahimi and A. Ipakchi, “Demand response as a market resource under the smart grid paradigm,” IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 82–88, 2010.

    Article  Google Scholar 

  10. X. Li, X. Liang, R. Lu, H. Zhu, X. Lin, and X. Shen, “Securing smart grid: Cyber attacks, countermeasures and challenges,” IEEE Communications Magazine, vol. 58, no. 8, pp. 38–45, 2012.

    Article  Google Scholar 

  11. X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Udp: Usage-based dynamic pricing with privacy preservation for smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 141–150, 2013.

    Article  Google Scholar 

  12. H.Li, R.Lu, L.Zhou, B.Yang, and X.Shen, “An efficient merkle tree based authentication scheme for smart grid,” IEEE Systems Journal, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6563123.

  13. H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, “Edr: An efficient demand response scheme for achieving forward secrecy in smart grid,” in IEEE GLOBECOM, 2012, pp. 929–934.

    Google Scholar 

  14. J. Xia and Y. Wang, “Secure key distribution for the smart grid,” IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1437–1443, 2012.

    Article  Google Scholar 

  15. R. Canetti, S. Halevi, and J. Katz, “A forward-secure public-key encryption scheme,” Advances in Eurocrypt 2003, pp. 646–646, 2003.

    Google Scholar 

  16. F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption,” in 2010 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010, pp. 327–332.

    Google Scholar 

  17. M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 675–685, 2011.

    Article  Google Scholar 

  18. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in EUROCRYPT, 1999, pp. 223–238.

    Google Scholar 

  19. D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001, pp. 213–229.

    Google Scholar 

  20. B. Libert, J. Quisquater, and M. Yung, “Key evolution systems in untrusted update environments,” ACM Transactions on Information and System Security, vol. 13, no. 4, p. 37, 2010.

    Google Scholar 

  21. B. Libert and J. Quisquater, “The exact security of an identity based signature and its applications,” Preprint available at http://eprint.iacr.org/2004/102, 2004.

  22. D. Stinson, Cryptography: theory and practice. CRC press, 2006.

    Google Scholar 

  23. J. Kelsey, “Compression and information leakage of plaintext,” in Fast Software Encryption 2002. Springer, 2002, pp. 95–102.

    Google Scholar 

  24. S. Katti and A. Rao, “Handbook of the poisson distribution,” Technometrics, vol. 10, no. 2, pp. 412–412, 1968.

    Article  Google Scholar 

  25. D. Seo, H. Lee, and A. Perrig, “Secure and efficient capability-based power management in the smart grid,” in IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011, pp. 119–126.

    Google Scholar 

  26. I. Blake, G. Seroussi, and N. Smart, “Pairings,” Advances in elliptic curve cryptography, pp. 183–213, chapter 9, Cambridge University Press, 2005.

    Google Scholar 

  27. W. Dai, “Crypto++ 5.6.0 benchmarks,” http://www.cryptopp.com/benchmarks.html, 2009.

  28. “Miracl crypto,” https://certivox.com/solutions/miracl-crypto-sdk/.

  29. B. Lynn, “Pbc library,” http://crypto.stanford.edu/pbc/.

  30. A. Kate, G. Zaverucha, and I. Goldberg, “Pairing-based onion routing with improved forward secrecy,” ACM Transactions on Information and System Security, vol. 13, no. 4, p. 29, 2010.

    Google Scholar 

  31. C. Chen, S. Huang, and I. Lin, “Providing perfect forward secrecy for location-aware wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2012, no. 1, p. 241, 2012.

    Google Scholar 

  32. Z. Liu, J. Ma, Q. Pei, L. Pang, and Y. Park, “Key infection, secrecy transfer, and key evolution for sensor networks,” IEEE Transactions on Wireless Communications, vol. 9, no. 8, pp. 2643–2653, 2010.

    Article  Google Scholar 

  33. J. Shi, R. Zhang, Y. Liu, and Y. Zhang, “Prisense: privacy-preserving data aggregation in people-centric urban sensing systems,” in INFOCOM, 2010, pp. 1–9.

    Google Scholar 

  34. X. Lin, R. Lu, and X. Shen, “Mdpa: multidimensional privacy-preserving aggregation scheme for wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 10, no. 6, pp. 843–856, 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Li, H. (2014). Privacy-Preserving Demand Response in Smart Grids. In: Enabling Secure and Privacy Preserving Communications in Smart Grids. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04945-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04945-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04944-1

  • Online ISBN: 978-3-319-04945-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics