Measurements gathered by Smart Meters and collected through the Automatic Metering Infrastructure of Smart Grids can be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring and management. Therefore, metering data must be securely handled, in order to protect the users’ privacy and to prevent the disclosure of personal information through the analysis of energy consumption patterns. This paper proposes the implementation of a protocol for privacy-preserving aggregation of metering data in a distributed scenario, which relies on communication Gateways located in the customers’ households. Measurements are encrypted by using a secret sharing scheme. The routing of the information flows is performed exploiting a variant of the Chord protocol. We evaluate the performance of the protocol and discuss how they are affected by two well known attacks to the Chord routing, namely the Sybil and Eclipse attacks.
Implementation of a Protocol for Secure Distributed Aggregation of Smart Metering Data
ROTTONDI, CRISTINA EMMA MARGHERITA;SAVI, MARCO;VERTICALE, GIACOMO;
2012-01-01
Abstract
Measurements gathered by Smart Meters and collected through the Automatic Metering Infrastructure of Smart Grids can be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring and management. Therefore, metering data must be securely handled, in order to protect the users’ privacy and to prevent the disclosure of personal information through the analysis of energy consumption patterns. This paper proposes the implementation of a protocol for privacy-preserving aggregation of metering data in a distributed scenario, which relies on communication Gateways located in the customers’ households. Measurements are encrypted by using a secret sharing scheme. The routing of the information flows is performed exploiting a variant of the Chord protocol. We evaluate the performance of the protocol and discuss how they are affected by two well known attacks to the Chord routing, namely the Sybil and Eclipse attacks.File | Dimensione | Formato | |
---|---|---|---|
distributed_impl.pdf
Accesso riservato
:
Pre-Print (o Pre-Refereeing)
Dimensione
558.71 kB
Formato
Adobe PDF
|
558.71 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.