Anonymity - Background
Download
Report
Transcript Anonymity - Background
Privacy Issues in Smart Grid
R. Newman
Topics
Defining anonymity
Need for anonymity
Defining privacy
Threats to anonymity and privacy
Mechanisms to provide anonymity
Metrics for Anonymity
Applications of anonymity technology
Smart Grid
The electrical grid encompasses:
Electrical power generation
Electrical power distribution
Electrical power consumption
Originally
Generation plant produced power
Converted to high voltage AC for long distance
distribution
Converted to medium voltage AC for intermediate
distance distribution
Converted to low voltage AC to supply customers
Smart Grid
Now: Smart Grid
Multiple generation plants produce power
Must coordinate interconnected grid
Consumer power generation (solar power)
Consumer involvment in load manipulation
Incentives to reduce load at peak usage times
Power consumption monitoring for user control
Prices according to current and projected loads
All this requires reporting of power data
Smart Grid Threats
Consumer privacy
Usage may reveal lifestyle information
Usage may reveal occupation of home
Hence, need privacy!
Accurate data needed for utilities
Needed to project loads
Used for pricing – liars can game system!
Needed to coordinate interconnected grids
Innaccurate data can cause disruption!
Consumer Load Data
Loading patterns reveal usage
Usage reveals lifestyle, presence
Periodic loads = A/C, refridgerator, etc.
Load info can reveal appliance model!
Lighting, microwave use – show presence
Absence = attractive target for burglars
Hiding load information
Aggregate data
Use energy storage to balance load
Use energy generation to balance load
Load Balancing
Storage
Use batteries to increase load during low usage
periods (charge batteries)
Use batteries to decrease load during peak periods
(draw power from batteries)
Can use electric vehicle batteries for storage
Must take usage patterns into account
Desirable for economic reasons also
Generation
Use set points in PhotoVoltaic (solar) generation to
alter efficiency, hence output
Generator & batteries may be combined
Utility Sensor Information
Needed to assess current load & predict load
Pricing is based on predicted loads
Prices for energy consumption
Prices for energy generation (offer/bid)
Manipulation of data can cause economic losses
Need fair auction mechanisms
Sensor data needed for grid synchronization
Voltage
Frequency
Phase
Hiding Auction Information
Utility wants to pay lowest price
Pricing is based on predicted loads and bids
Protocol to offer rates, receive bids, then repeat
Must hold accepted bids as contracts
Suppliers want to get highest price
Information about other suppliers is valuable
If less supply, then can ask more for energy
Users want to preserve privacy
For safety and personal reasons
For economic reasons
Auction Model
Storage units
generate & store, buy low, sell high
Aggregator
Act as communication intermediary
Bidirectional
Utility company
Calculates loads and supply
Decides when to ask for more power
Decides how much to offer for power
Auction Model
Cryptographic Approach
Hide bids using crypto
Aggregate bid information
Utility obtains aggregate bids only
Initialization by trusted third party (TTP)
All parties supplied with public and private keys
All parties supplied with certificates
Auction Protocol
Utility sends power request to Aggregator
Offers prices per time slot for t slots
Bilinear pairing used for signature
Aggregator broadcasts request to suppliers
Validates freshness using timestamps
Verifies signature using utility public key
Suppliers offer bids
Aggregator combines bids
Utility assesses bids
Auction Protocol
Utility sends power request to Aggregator
Aggregator broadcasts request to suppliers
Suppliers offer bids
Amount of power offered per time slot
Zero if none available or prices is too low
Bids masked using one-time random shared key –
allows utilties to verify aggregate bids but not see
individual bids
Computes signature
Computes MAC
Auction Protocol
Utility sends power request to Aggregator
Aggregator broadcasts request to suppliers
Suppliers offer bids
Aggregator combines bids
Verifies signatures
Aggregates masked bids into masked aggreate bid
Aggregates signatures into aggregate signature
Aggregates MACs into aggregate MAC
Aggregation by summation
Care taken that there can be no overflow/carry
Auction Protocol
Utility sends power request to Aggregator
Aggregator broadcasts request to suppliers
Suppliers offer bids
Aggregator combines bids, sends to utility
Utility assesses bids
Verifies aggregate signature, MAC
Determines aggregated bid per slot
Take-away
Security receiving increasing attention in Smart
Grid operations
Conflicting needs between data resolution and
accuracy on one hand, and privacy on other
Mechanisms to hide load information
Mechanisms to allow grid synchronization
Mechanisms to support anonymous auctions and
other economic activities