TY - GEN
T1 - Privacy-Preserving Collection of Power Consumption Data for Enhanced AMI Networks
AU - Alsharif, Ahmad
AU - Nabil, Mahmoud
AU - Mahmoud, Mohamed
AU - Abdallah, Mohamed
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/9/13
Y1 - 2018/9/13
N2 - In this paper, we propose a privacy-preserving data collection scheme for enhanced AMI networks. The idea is that each cluster of meters is divided into members and heads. A cluster member should send encrypted subreadings with lifetime values to a number of cluster heads where the lifetime permits the cluster heads to reuse the received subreading for future reporting cycles. Then cluster heads should aggregate all the received/stored subreadings and send the result to a local aggregator which performs a further aggregation process and then send an aggregated reading for the cluster to the utility. If the reading of a cluster member does not change, it should run a countermeasure to traffic analysis to determine whether it needs to send a subreading to one of the cluster heads or not, whereas if the power reading changes or the lifetime of a subreading expires, the cluster member needs to update only one subreading to make the summation of all its subreadings gives the correct reading. In addition, the proposed scheme is more resistive to collusion attacks than existing schemes. Our analysis demonstrates that the proposed scheme can preserve consumers privacy and resist collusion attacks. Our measurements confirm that the proposed scheme can reduce the communication bandwidth by 30%.
AB - In this paper, we propose a privacy-preserving data collection scheme for enhanced AMI networks. The idea is that each cluster of meters is divided into members and heads. A cluster member should send encrypted subreadings with lifetime values to a number of cluster heads where the lifetime permits the cluster heads to reuse the received subreading for future reporting cycles. Then cluster heads should aggregate all the received/stored subreadings and send the result to a local aggregator which performs a further aggregation process and then send an aggregated reading for the cluster to the utility. If the reading of a cluster member does not change, it should run a countermeasure to traffic analysis to determine whether it needs to send a subreading to one of the cluster heads or not, whereas if the power reading changes or the lifetime of a subreading expires, the cluster member needs to update only one subreading to make the summation of all its subreadings gives the correct reading. In addition, the proposed scheme is more resistive to collusion attacks than existing schemes. Our analysis demonstrates that the proposed scheme can preserve consumers privacy and resist collusion attacks. Our measurements confirm that the proposed scheme can reduce the communication bandwidth by 30%.
UR - http://www.scopus.com/inward/record.url?scp=85054487347&partnerID=8YFLogxK
U2 - 10.1109/ICT.2018.8464835
DO - 10.1109/ICT.2018.8464835
M3 - Conference contribution
AN - SCOPUS:85054487347
SN - 9781538623213
T3 - 2018 25th International Conference on Telecommunications, ICT 2018
SP - 196
EP - 201
BT - 2018 25th International Conference on Telecommunications, ICT 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 25th International Conference on Telecommunications, ICT 2018
Y2 - 26 June 2018 through 28 June 2018
ER -