Securing Smart Grid In-Network Aggregation through False Data Detection
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2017, Vol 4, Issue 10
Abstract
Existing prevention-based secure in-network data aggregation schemes for the smart grids cannot eectively detect accidental errors and falsified data injected by malfunctioning or compromised meters. In this work, we develop a light-weight anomaly detector based on kernel density estimator to locate the smart meter from which the falsified data is injected. To reduce the overhead at the collector, we design a dynamic grouping scheme, which divides meters into multiple interconnected groups and distributes the verification and detection load among the root of the groups. To enable outlier detection at the root of the groups, we also design a novel data re-encryption scheme based on bilinear mapping so that data previously encrypted using the aggregation key is transformed in a form that can be recovered by the outlier detectors using a temporary re-encryption key. Therefore, our proposed detection scheme is compatible with existing in-network aggregation approaches based on additive homomorphic encryption. We analyze the security and eÿciency of our scheme in terms of storage, computation and communication overhead, and evaluate the performance of our outlier detector with experiments using real-world smart meter consumption data. The results show that the performance of the light-weight detector yield high precision and recall.
Authors and Affiliations
Lei Yang, Fengjun Li
SMC-I with Approach Angle Method for Slip Suppression of Electric Vehicles
This study presents SMC-I (sliding mode control with integral action) with approach angle method applied to slip suppression problem of electric vehicles (EVs). In SMC, chattering phenomenon always occurs through high fr...
Performance evaluation of composite Web services
Composite Web service architectures are demanding much guarantee on the Quality of Service (QoS) in order to meet user requirements. Performance evaluation of these architectures has become therefore a very challenging i...
Exact Outage Analysis of Cognitive Energy Harvesting Relaying Networks under Physical Layer Security
In this paper, we study the secure communication of cognitive energy harvesting relay networks when there exist multiple eaves droppers who can overhear the message of the second hop, and multiple primary users are prese...
Information seeking behaviour and purchasing decision: case study in digital cameras
This case study explores the information seeking behaviour of digital camera consumers based on Assael’s consumer information acquisition and processing model. 135 responses were received from potential target group who...
Constructing a Knowledge Base for Entertainment by Interlinking Multiple Data Sources
This paper describes a knowledge base for entertainment domains, including movies, music, and celebrities. We present an ontology model for representing graph-based knowledge, and describe knowledge processing techniques...