Next Article in Journal
Online Parametric Estimation of Grid Impedance Under Unbalanced Grid Conditions
Next Article in Special Issue
Secure Communication Modeling for Microgrid Energy Management System: Development and Application
Previous Article in Journal
Wear Fault Diagnosis of Aeroengines Based on Broad Learning System and Ensemble Learning
Previous Article in Special Issue
Electricity Theft Detection in Smart Grid Systems: A CNN-LSTM Based Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Secure and Anonymous Metering Scheme for Smart Grid Communications

1
School of Data and Computer Science, Sun Yat-sen University, Guangzhou 510006, China
2
Guangdong Key Laboratory of Information Security, Guangzhou 510006, China
*
Authors to whom correspondence should be addressed.
Energies 2019, 12(24), 4751; https://doi.org/10.3390/en12244751
Submission received: 3 November 2019 / Revised: 3 December 2019 / Accepted: 7 December 2019 / Published: 12 December 2019
(This article belongs to the Special Issue Cybersecurity in Smartgrids)

Abstract

:
The smart meter is one of the most important components of the smart grid, which enables bi-directional communication between electric power providers and in-home appliances. However, the fine-grained metering mechanism that reports real-time electricity usage to the provider may result in some privacy and security issues for the owner of the smart meter. In this paper, we propose a new secure and anonymous smart metering scheme based on the technique of direct anonymous attestation and identity-based signatures. We utilize the trusted platform module to realize the tamper resistance of the smart meter. Moreover, our scheme is able to detect malfunctioning meters in which data is reported more than once in a time period. Finally, the performance and security results show that our proposed scheme is efficient and satisfies the security requirements of the smart grid communication system.

Graphical Abstract

1. Introduction

Electrical energy is one of the most important factors for the advancement of industrial development, urbanization, and economic globalization of any country [1]. Nowadays, the problems of climate change and electrical energy consumption are becoming more and more serious. The globe is facing an energy crisis because of the steadily increasing demand for electrical energy as well as high emissions of carbon dioxide (CO 2 ) [2]. Many countries in the world are seeking new technologies to develop renewable energies (derived from wind, sunlight, waters, etc) and to reduce CO 2 emissions and air pollution. Nevertheless, there also exists problems in dealing with the integration, system stability, and storage of different kinds of energy sources [3]. Fortunately, the emergence of smart grid techniques has provided solutions for such problems.
Smart grid, according to the studies [4,5,6], is a new generation of electric power grid infrastructure for improved efficiency, reliability, and safety, with smooth integration of renewable and alternative energy sources, through automated control and modern communications technologies. With the high development of industry 4.0 and the emergence of 5G mobile communications technology, the smart grid, which is concerned as an important part of Internet of Things and smart cities, has been playing an important role in people’s daily lives.
In order to efficiently use the electric power resources and utilize different kinds of renewable energies, in recent years, many different kinds of distributed energy management systems have been proposed by researchers [7,8,9,10]. Such kinds of energy management systems can be applied in facilities that need two or more kinds of energy usage, such as airports, hospitals, and hotel buildings [11,12].
However, in the smart grid communication network, the smart meter’s fine-grained metering mechanism, which reports real-time electricity usage to the utilities (the electricity providers or service providers), may result in privacy issues for the owner of the smart meter [13]. The inhabitants’ behavioral patterns (e.g., the appliances they use, the time they wake up, take a shower, or leave home, etc.) can be deduced from the fine-grained meter readings [14,15]. Moreover, it is essential to guarantee data security and integrity any time that the meter data is stored in the smart meter or transmitted in the channel of the smart grid network.
Over the past decade, in order to preserve privacy and security in the smart grid network, many privacy-preserving smart metering schemes have been proposed by researchers [16,17,18,19]. The schemes can be classified into two large categories. The first category involves concealing fine-grained metering data using symmetric/public encryption [20,21], homomorphic encryption [22,23,24,25], identity-based signcryption [26], secure multiparty computation [27], and other data masking techniques such as noise addition [15,28] and using rechargeable batteries [29,30,31]. The other category involves hiding the identity of the smart meter utilizing anonymity techniques, such as group signatures [32,33], ring signatures [34], zero knowledge signatures [35,36], and other pseudonym techniques [37,38,39]. In order to prevent the meter data from being manipulated or altered by the meter owner, a tamper-resistant trusted platform module (TPM chip) is adopted by the smart meter [40]. However, in most of the solutions, although they claimed that the smart meter was embedded with a TPM chip [32,35], they did not split the smart meter into two entities: A TPM and a host platform (the meter). Since the TPM has limited bandwidth and computational capability, most of the operations should be calculated in the computing module of the meter. Later, Zhao et al. [34] realized this problem, and in their solution, the TPM and the smart meter work together to generate a signature. However, they use ring signatures, where the computational complexity of smart meters will increase linearly with the total number of members in a ring; thus, their scheme will be inefficient for large-scale smart meter scenarios.
To solve this problem, in this paper, we design a new privacy-preserving scheme for the smart grid communication network. We use a pairing-based direct anonymous attestation (DAA) signature [41] to realize a tamper-resistant anonymous signature for smart meters. The DAA signature is adopted in the TPM version 2.0 [42]. To alleviate the computational burden on the TPM chip, the host (the computation module of the smart meter) and the TPM chip will jointly generate the anonymous signature of the meter data. Moreover, the computational efficiency of smart meters will not be affected by the group members in the assigned domain in a data aggregator. Meanwhile, an efficient and provably secure identity-based signature (IBS) [43] is used by the data aggregator to guarantee the data integrity and secure transmission of aggregated metering data.
Contributions: We propose a scheme which utilizes an efficient pairing-based DAA to realize the tamper resistance and anonymous signatures in smart meters. Moreover, in order to avoid accidents caused by smart meters, our scheme is able to detect malfunctioning meters that report twice during a time period, and to revoke such kinds of smart meters. In addition, we use identity-based signatures to ensure the secure communication between the data aggregator and operation center. Finally, the security results show that our scheme satisfies the security requirements of smart grid communications, namely, correctness, data integrity, authenticity, anonymity, and traceability of malfunctioning meters. The experimental results show that our scheme is efficient and practical, especially in the signing of smart meters.
Organization: The rest of this paper is organized as follows. The next section introduces the methodology of our paper. In Section 3, we present the security and performance results of our scheme. Finally, the discussion and conclusions are respectively presented in Section 4 and Section 5.

2. Methodology

In this section, we introduce our methodology, which includes the cryptographic primitive, mathematical hard problem, system model, and detailed constructions of our proposed scheme. The notations used in our paper are described in Table 1.

2.1. Bilinear Maps

The DAA signature and IBS signature used in our scheme are based on an bilinear pairings. Let G 1 and G 2 be two multiplicative cyclic groups of prime order q with the generator g 1 and g 2 , respectively. We claim that e ^ : G 1 × G 2 G T is a bilinear map if it satisfies the following properties [43,44,45]:
  • Bilinearity: ( g , h ) G 1 × G 2 , a n d a , b Z q * , e ^ ( g a , h b ) = e ^ ( g , h ) a b .
  • Non-degeneracy: g G 1 , e ^ ( g , h ) = 1 for all h G 2 iff g = 1 G T .
  • Computability: ( g , h ) G 1 × G 2 , e ^ ( g , h ) is efficiently computable.
  • There exists an efficient and publicly computable isomorphism ψ : G 2 G 1 such that ψ ( g 2 ) = g 1 .
Then, the two groups ( G 1 , G 2 ) in the above are considered as a bilinear map pair.

2.2. Mathematical Problem

Our scheme is based on the q-Strong Diffie–Hellman Problem. To introduce this problem, we follow the description given by Boneh and Boyen [46]. Let ( G 1 , G 2 , G T ) be the bilinear map groups of prime order q with two generators, g 1 G 1 and g 2 G 2 . The q-Strong Diffie–Hellman (q-SDH) problem in ( G 1 , G 2 ) is defined as follows: Given a (q+2)-tuple ( g 1 , g 2 , g 2 x , g 2 x 2 , , g 2 x q ) as input, the output is a pair ( g 1 1 / ( x + α ) , α ) where α Z q * . An algorithm A has advantage ϵ in solving the q-SDH in ( G 1 , G 2 ) if
Pr A ( g 1 , g 2 , g 2 x , , g 2 x q ) = ( 1 / ( x + α ) , α ) ϵ ,
where the probability is over the random choice of x in Z q * and random bits consumed by A .
We only introduce bilinear maps and the q-SDH problem here. For more detailed hard problems and detailed protocols of DAA and IBS, readers can refer to the references of DAA signatures [41] and IBS signatures [43].

2.3. System Model

In this paper, we adopt a three-level network model of a smart grid communication network according to [22,23,35]. As depicted in Figure 1, the system can be simply divided into three entities: Smart Meter (SM), Data Aggregator (DA), and Operation Center (OC). In our model, the OC covers m DAs, and each DA is assumed to be responsible for connecting n SMs. The detailed functionality of each entity is described as follows.
Smart Meter (SM): The smart meter, which is located in its owner’s house, plays the role of metering the household’s electricity consumption and continuously transmitting the near-real-time metering data to the data aggregator in each time period. Meanwhile, in order to guarantee the security of an SM, a tamper-resistant TPM chip is installed in each SM by the manufacturer when the SM is made.
Data Aggregator (DA): The data aggregator is responsible for aggregating the electricity consumption of smart meters in its specific domain. It verifies the signatures sent from smart meters, and relays the aggregated data to the operation center.
Operation Center (OC): The operation center is the backbone of the smart grid network; it controls the whole system of the smart grid communication network. It communicates with DAs and SMs, and collects the data from DAs for meter data management.
In addition, the communication channel between SM and DA, which can use the technology of WiFi or 3G/4G/5G, is wireless. The connection between DA and OC is wired, and uses the technology of fiber communication networks.

2.4. Construction of Our Proposed Scheme

This section presents our proposed secure and anonymous metering scheme. The scheme mainly consists of five phases: System initialization, membership registration, communications between the SM and DA, detection of malfunctioning meters, and communications between the DA and OC. The DAA signature is used in the communications between the SM and DA, while the IBS signature is used in the communications between the DA and OC. The detailed phases are described as follows.

2.4.1. System Initialization

The system initialization is similar to that of DAA [41] and IBS [43]. We used the same parameters for the initialization of DAA and IBS, since the security of both signature protocols that we used is based on the same assumption (q-strong Diffie–Hellman assumption [46]) and the same bilinear map groups [45]. Given a security parameter k, the system is initialized by OC as follows.
  • Find a prime q > 2 k , and select an asymmetric bilinear group pair ( G 1 , G 2 ) of order q to satisfy a pairing function as follows:
    e ^ : G 1 × G 2 G T ,
    along with the generators g 2 G 2 , g 1 = ψ ( g 2 ) G 1 , where ψ is a computable isomorphism from G 2 to G 1 .
  • Choose ξ 1 , ξ 2 G 1 and select a system master key s Z q * ; compute a system public key η where
    η : = g 2 s .
  • Select secure hash functions H 1 : { 0 , 1 } * Z q * , H 2 : { 0 , 1 } * G 1 , H 3 : { 0 , 1 } * × G T Z q * .
  • Pre-compute the following pairings:
    θ 1 = e ^ ( g 1 , g 2 ) ,
    θ 2 = e ^ ( ξ 1 , g 2 ) ,
    θ 3 = e ^ ( ξ 2 , g 2 ) ,
    θ 4 = e ^ ( ξ 2 , η ) .
  • Output the system public key and master key
    g p k = { G 1 , G 2 , G T , q , e ^ , g 1 , g 2 , ξ 1 , ξ 2 , η , H 1 , H 2 , H 3 , θ 1 , θ 2 , θ 3 , θ 4 }
    g s k = s .

2.4.2. Membership Registration

The membership registration includes smart meter registration and data aggregator registration. We assume that all of the registrations are executed through a secure channel.

A. Smart Meter Registration

This is a protocol between the SM and OC. In our model, the smart meter consists of two main components: A host (meter) and a tamper-resistant module (TPM chip). In order to protect the sensitive information of the SM, any operation related to the smart meter’s secret key should be calculated in the TPM chip. When a valid smart meter SM i (i = 1, 2,..., n) registers itself into the system, it will finally get a legal DAA credential from the OC, which is shown in Figure 2. In the original DAA scheme [41], the credential is issued by the issuer. The issuer can be the manufacturer, the third party service provider, or the electricity authority. In this paper, we assume that the credential is issued by the OC. Finally, the credential can be further used for anonymously signing the meter data. The protocol proceeds as follows.
  • The OC randomly chooses a nonce n I { 0 , 1 } * and sends n I to SM i .
  • The TPM i in the smart meter selects a secret key f Z q * , and computes the associated public key
    F = ξ 1 f .
    Then, the TPM i makes a zero-knowledge proof [47] to prove that the TPM i owns the secret key f, i.e.,
    PK { ( f ) : ξ 1 f = F } .
    Finally, the TPM i sends the proof message, c m t f and n I , to the OC.
  • Upon receiving the c m t f and n I , the OC checks F against the RL to verify the correctness of c m t f . RL is a rogue list, which is set to be empty at the system setup, and will contain the invalid secret key f of malfunctioning or rogue smart meters. Then, the OC computes a credential cre by calculating:
    A = ( g 1 · F ) 1 / x + s .
    A is a signature on the public key F (therefore on f). Then, the OC sends c r e = ( A , x ) to SM i .
  • SM i verifies the correctness of the credential cre such that
    e ^ ( A , η g 2 x ) = e ^ ( g 1 F , g 2 ) .
    Thus, SM i gets a membership credential cre on its secret key f.

B. Data Aggregator Registration

When a data aggregator DA j (j = 1,2,..., m) registers itself into the system, the OC computes the identity-based private key S I D j for each of them as follows:
S I D j = g 1 1 / ( s + H 1 ( I D j ) ) ,
where ID j is a unique identity string of ID j and s is the system master key. Then, the OC sends S I D j to each DA through a secure channel.

2.4.3. Communications between the SM and DA

The mutual communications contain the meter data signing protocol in the SM and verification algorithm in the DA.

A. The Signing Protocol

This is a protocol performed by SM i to produce an anonymous signature on fine-grained metering data. On input of the system public key g p k , membership credential c r e = ( A , x ) , membership key f, meter data m s g i , Meter i and TPM i in SM i jointly run the signing protocol. Since meter data should be uploaded to DA j without revealing the smart meter’s identity (f, F, and cre), the smart meter needs to prove the knowledge of f and cre (F is not used in this phase, so we do not need to prove the knowledge of it).
The protocol is depicted in Figure 3, which is similar to the sign protocol of the DAA scheme [41]. Firstly, to allow DA j to verify the identity of SM i and recognize the malfunctioning/rogue smart meter, SM i needs to generate a pseudonym K instead of public key F and a proof of knowledge that the pseudonym is generated by its own valid secret key f, where
K = J f ,
J = H 2 ( T S | | m s g i ) ,
where T S is a timestamp and m s g i is meter data generated in a timestamp. If ( J , K ) is generated more than one time in a time period, the smart meter will be linked; the details will be illustrated in Section 2.4.4 (Malfunctioning Meter Detection). Then, SM i needs to compute a blind credential T as follows:
T = A · ξ 2 a ,
where a Z q * . Also, SM i needs to provide a proof of knowledge that T is a blind credential on a valid secret key f. Finally, using the method of the Fiat–Shamir heuristic [48,49], SM i and TPM i jointly generate a signature of proof of knowledge
SPK { ( x , f , a ) : e ^ ( T , g 2 ) x · e ^ ( ξ 1 , g 2 ) f · e ^ ( ξ 2 , g 2 ) a x · e ^ ( ξ 2 , η ) a = e ^ ( T , η ) / e ^ ( g 1 , g 2 ) } ( m s g i ) .
The detailed signature is shown in Figure 3. Finally, SM i outputs the signature
σ i = ( J , K , T , c , T S , n t , v f , v x , v a , v b ) ,
and sends ( m s g i , σ i ) to the data aggregator DA j .

B. The Verification Algorithm

Upon receiving the anonymous signature σ i and message m s g i from SM i , DA j runs a verification algorithm to check the validity of SM i ’s signature σ i . Firstly, DA j checks if the pseudonym K is generated by an invalid f in the rogue list. Then, DA j checks if σ i does prove the knowledge of a secret key f and knowledge of a valid membership credential c r e on the same f. The detailed algorithm is described in Figure 4, which is identical to that in the DAA scheme [41]. However, in our algorithm, we check the validity of TS and J at the beginning. If σ i is correct and valid, DA j accepts the meter data m s g i .
However, before uploading all of the meters’ electricity consumptions to the operation center, DA j needs to perform a phase of detection of malfunctioning meters. If all of the meter data are honestly uploaded by the smart meters, this phase will be ignored.

2.4.4. Malfunctioning Meter Detection

Malfunctioning meter detection includes two phases: The linking algorithm and the tracing protocol. The linking algorithm is to check if there exists a smart meter signing a message more than once in a time period. If any two signatures are linked, the tracing protocol will help to identify the linked smart meter.

A. The Linking Algorithm

This algorithm is run by DA j . When DA j receives all of the meter data { m s g i } i = 1 n from SM i ( i = 1 , 2 , , n ) at a time period T S , it needs to check if there exists a smart meter signing a message more than once in a time period T S . If so, this smart meter may be malfunctioning, and we need to identify this meter. Firstly, DA j collects all of the messages and signatures generated in a time period T S . If there exist two identical messages ( m s g 0 = m s g 1 ), DA j runs the linking algorithm in Figure 5, and it is similar to the linking algorithm of the DAA scheme [41]. Otherwise, if there are no identical messages, this step as well as the next step are stopped.

B. The Tracing Protocol

After the linking phase, if DA j finds out that a suspected pair ( J R , K R ) was generated more than once in a time period, it will ask SM i ( i = 1 , 2 , , n ) for proof of knowledge that it did not generate ( J R , K R ) before. SM i needs to prove that its secret key f i log J R K R , and computes a zero-knowledge proof that
PK { ( f i ) : K i = J i f i K R J R f i } .
We use the zero-knowledge proof protocol designed by Camenisch and Shoup [50] for proving that two discrete logarithms are not equal. The method is as follows. The prover (the smart meter SM i ) and verifier (the tracer, which can be the OC) have common inputs J i , K i , J R , K R G 1 , where log J i K i log J R K R . SM i has an additional input f i , as follows:
f i = log J i K i .
Then, SM i shows proof to the tracer with the following steps.
  • SM i selects ι Z q * and computes τ by
    τ = ι · f i .
  • SM i executes the proof of knowledge that
    PK { ( τ , ι ) : C = J R τ · ( 1 / K R ) ι 1 = J i τ · ( 1 / K i ) ι }
    and sends the result to the tracer.
  • The tracer accepts that the smart meter is not a malfunctioning one if it accepts in step 2. Otherwise, the tracer rejects the meter, and ensures that the present SM i is the malfunctioning smart meter.
The detailed proof is shown in Figure 6. The malfunctioning smart meter will be revoked and replaced by the electricity provider.

2.4.5. Communications between the DA and OC

After the phases of verification and malfunctioning meter detection, the data collector DA j collects the meter data at the same timestamp sent from the smart meters in its domain area, and calculates the aggregated electricity consumptions M j as follows:
M j = i = 1 n m s g i .
Then, the DA j securely reports the aggregated meter data to the OC using the identity-based signature [43].

A. Signing

Using the identity-based private key S I D j , D A j signs the aggregated meter data M j as follows. It picks up a random value μ Z q * , and computes the following equations:
ν = θ 1 μ ,
h = H 3 ( M j | | I D j | | T S , ν ) Z q * ,
S = S I D j ( μ + h ) ,
where TS is the current timestamp.
Then, the signature on M j is σ j = ( h , S ) Z q * × G 1 . Finally, DA j forwards ( σ j , M j , I D j , T S ) to the OC.

B. Verification

After receiving ( σ j , M j , I D j , T S ) from each data aggregator DA j ( j = 1 , 2 , , m ) , the OC will check if the sender is valid. It verifies the validity of ID j and T S and checks the correctness of the message signature by computing
h ˜ = H 3 ( M j , e ^ ( S , g 2 H 1 ( I D j ) · η ) · θ 1 h ) .
If h ˜ = h , the OC accepts the message M j .
Lastly, the OC computes the entire meter consumption M O C , where
M O C = j = 1 m M j .
Then, the OC receives the meter consumptions of the whole smart grid network at timestamp TS.

3. Results

In this section, we present the results of our study, which contain the security results and performance results.

3.1. Security Results

In this section, we show that our proposed secure and anonymous metering scheme achieves the security requirements of correctness and data integrity, as well as authenticity, anonymity, and traceability.
  • Correctness: According to the verification procedures in our proposed security protocol, the anonymous signature generated by a valid smart meter and the signature generated by an honest data aggregator can surely pass the verification.
  • Data Integrity and Authenticity: The properties of integrity and authenticity require that the entity in the communications should be a valid registered membership, and that no attackers could tamper with or forge the data generated by the entity. In our scheme, all of the smart meters are equipped with a tamper-resistant TPM chip, which prevents meter data from being altered by the attacker. Meanwhile, secure DAA and IBS protocols are used in our scheme to ensure the authenticity. Without valid credentials, a smart meter cannot successfully sign the meter data or forge a valid signature. In addition, without a valid identity-based secret key, a fake data aggregator cannot produce a valid signature that can pass the verification by the operation center. Thus, our scheme satisfies data integrity and authenticity concerns.
  • Anonymity: Anonymity is the privacy requirement of our scheme. It requires that each valid signature is unable to expose any of the information of the signer, and no one can distinguish whether two normal signatures are generated by the same signer. In fact, as described in Section 2.4.3, during the data upload, SM i hides its credential and uses a pseudonym K instead of the real identity F; as a result, no adversary can recognize the identity of the data owner. Meanwhile, for any two different pairs ( J 1 , K 1 ) and ( J 2 , K 2 ) in signatures ( σ 1 , σ 2 ) , if the adversary can determine whether they are generated by the same SM i (i.e., determine whether f 1 = f 2 , where f 1 = log J 1 K 1 , f 2 = log J 2 K 2 ), then it will break the decisional Diffie–Hellman(DDH) problem [51]. Thus, our scheme satisfies the requirement of anonymity.
  • Malfunctioning Meter Traceability: As presented in Section 2.4.4, our scheme has the property of malfunctioning meter detection. If any two signatures are dishonestly generated by the SM, i.e., the SM signs a message twice in a time period—even though two such signatures can pass the verification—they can be linked and traced by the utilities.

3.2. Performance Results

In this section, we evaluate the computational cost of our proposed scheme, and compare the performance with Zhao et al.’s scheme [34].
To analyze our scheme, we mainly focus on six cost-expensive operations: Pairing, exponentiation, scalar multiplication, the map-to-point function, the hash function, and symmetric encryption/decryption. Other lightweight operations such as concatenation and modular addition are ignored due to their high efficiency.
The security level for the RSA public-key encryption algorithm in [34] is 1024 bits. In order to achieve the approximate cryptographic security level, in our scheme, we use the 80-bit security level elliptic curves (MNT curves) introduced in [52,53] by selecting a 170-bit prime q, with an embedding degree of 6.
The experiments were conducted on a personal computer with the Intel(R) Core(TM) i7-7820X CPU 3.60GHz and 16 GB memory. All of the operations were executed on a GNU Compiler Collection (version 7.1) with the Pairing-Based Cryptography library (PBC-0.5.14) and Openssl crypto library (version 1.1.1).
To simulate the scheme of [34], we adopted the AES-256 as the symmetric encryption–decryption algorithm and the SHA-256 as the hash function. For convenience, some notations are defined in the following list, and the average running time of each operation is presented in Table 2.
  • T p r : The execution time of a bilinear pairing operation e ^ : G 1 × G 2 G T .
  • T m u l : The execution time of a scalar multiplication in G 1 , G 2 .
  • T e x p : The execution time of a modular exponentiation operation.
  • T h p : The execution time of the map-to-point function in G 1 .
  • T s y m : The execution time of symmetric encryption or decryption.
  • T H : The execution time of the hash function.
Table 3 presents the comparisons with the scheme [34] on the computational cost of communications between the SM and DA. Since in [34], a protocol between the DA and OC was not designed, in Table 4, we only present the computational cost for the communications between the DA and OC in our scheme.
In Table 3, we can see that, for the communications between the SM and DA, the smart meter needs to calculate 1 T p r + 6 T m u l + 1 T e x p + 3 T h p operations in our scheme, while ( t + 3 ) T e x p + t × T s y m + 3 T H operations are computed in that of [34]. The computational complexity of the smart meter in [34] depends on the ring size t (i.e., the total number of smart meters in a domain). In this case, the execution time of the smart meter will increase linearly with the growing number of smart meters in a ring. In the real world, the number of smart meters in a domain belonging to a data aggregator will be at least 10. Most of the time, the average number of smart meters can be 50 or even 100. This means that when t = 10 100 , for each metering, the execution time of a SM in [34] will be at least 3.802 ms and at most 15.549 ms. However, in our scheme, the smart meter only need to spend 3.561 ms for each signing on the metering data. Therefore, for the same purpose of anonymous signatures based on TPM chips, our scheme has an advantage in the computational efficiency on the side of the smart meter. However, as shown in Table 3, our scheme has a drawback, in that the computational complexity in the DA is larger than that in [34]. Even so, this kind of disadvantage is not fatal. In the communications of a smart grid network, the efficient calculation complexity in the smart meter is more important than in the aggregator, since the aggregator has more powerful computational abilities than those of the smart meter.

4. Discussion

In our study, in order to design a tamper-resistant metering scheme, a trusted platform module (TPM chip) is embedded in each smart meter. The TPM is a trusted hardware module which is developed by the Trusting Computing Group (TCG). One of the goals of the TPM is to provide anonymous authentication with a remote verifier [54]. In the earlier version of the TPM, a privacy certification authority (Privacy CA) was adopted by TCG to act as a trusted third party to authenticate the TPM. However, in this solution, it was later found that the real identity of the TPM can be revealed with the help of the Privacy CA. Then, version 1.2 of the TPM Specification [55], the direct anonymous attestation (DAA) [54] was adopted. The construction of DAA prevents the leakage of the real identity of the TPM when anonymously signing a message. Later, the pairing-based DAA [41] was adopted in the TPM 2.0 Specification [56], which further reduced TPM resources; since the TPM has limited computational capacity, most of the operations should be calculated in the host of the TPM. In our paper, we use the property of strong anonymity of DAA to design an anonymous metering scheme. Though the TPM has the disadvantage that the capacity of storage and computation is limited, in our scheme, most of the operations are done in the smart meter (the host of the TPM). Meanwhile, in [34], Zhao et al. also shows that a TPM with cryptography primitives can be used to design a tamper-resistant smart meter. Therefore, our proposed smart metering scheme is practical.

5. Conclusions

In this paper, we propose a secure and anonymous smart metering scheme based on direct anonymous attestation (DAA) and identity-based signature schemes. Like many other works, the smart meter is equipped with a TPM chip to store the secret key and execute the anonymous signing of metering data using a DAA signature. However, on account of the limited capacity of the TPM, we divide the signer into two parts (the TPM and the host, i.e., the smart meter). We secure the communications between the data aggregator and the operation center by using identity-based signatures. We show that our scheme satisfies the properties of correctness, data integrity and authenticity, and anonymity. Moreover, our scheme is able to detect malfunctioning smart meters. The experimental results show that our scheme is efficient and practical. In our further work, we will consider how to improve the efficiency of verification in the data aggregator, and design a more secure and efficient metering scheme for smart grid communications.

Author Contributions

Conceptualization, F.Z.; Data curation, S.X. and H.L.; Formal analysis, S.X. and Y.T.; Funding acquisition, F.Z.; Investigation, S.X. and F.Z.; Methodology, S.X. and F.Z.; Project administration, F.Z.; Resources, S.X. and H.L.; Software, H.L. and Y.T.; Supervision, F.Z.; Validation, S.X., H.L., and Y.T.; Writing—original draft, S.X.; Writing—review & editing, S.X. and F.Z.

Funding

This research was funded by the National Key R&D Program of China (2017YFB0802500) and the National Natural Science Foundation of China (No. 61672550 and No. 61972429).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khan, M.W.; Wang, J.; Ma, M.; Xiong, L.; Li, P.; Wu, F. Optimal energy management and control aspects of distributed microgrid using multi-agent systems. Sustain. Cities Soc. 2019, 44, 855–870. [Google Scholar] [CrossRef]
  2. Khan, M.W.; Wang, J.; Xiong, L.; Ma, M. Modelling and optimal management of distributed microgrid using multi-agent systems. Sustain. Cities Soc. 2018, 41, 154–169. [Google Scholar] [CrossRef]
  3. Gungor, V.C.; Lu, B.; Hancke, G.P. Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans. Ind. Electron. 2010, 57, 3557–3564. [Google Scholar] [CrossRef] [Green Version]
  4. Amin, S.M.; Wollenberg, B.F. Toward a smart grid: Power delivery for the 21st century. IEEE Power Energy Mag. 2005, 3, 34–41. [Google Scholar] [CrossRef]
  5. Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. Smart grid technologies: Communication technologies and standards. IEEE Trans. Ind. Inform. 2011, 7, 529–539. [Google Scholar] [CrossRef] [Green Version]
  6. Cecati, C.; Citro, C.; Piccolo, A.; Siano, P. Smart operation of wind turbines and diesel generators according to economic criteria. IEEE Trans. Ind. Electron. 2011, 58, 4514–4525. [Google Scholar] [CrossRef]
  7. Belvedere, B.; Bianchi, M.; Borghetti, A.; Nucci, C.A.; Paolone, M.; Peretto, A. A microcontroller-based power management system for standalone microgrids with hybrid power supply. IEEE Trans. Sustain. Energy 2012, 3, 422–431. [Google Scholar] [CrossRef]
  8. Mashayekh, S.; Stadler, M.; Cardoso, G.; Heleno, M. A mixed integer linear programming approach for optimal DER portfolio, sizing, and placement in multi-energy microgrids. Appl. Energy 2017, 187, 154–168. [Google Scholar] [CrossRef] [Green Version]
  9. Klaimi, J.; Rahim-Amoud, R.; Merghem-Boulahia, L.; Jrad, A. A novel loss-based energy management approach for smart grids using multi-agent systems and intelligent storage systems. Sustain. Cities Soc. 2018, 39, 344–357. [Google Scholar] [CrossRef]
  10. Liu, G.; Jiang, T.; Ollis, T.B.; Zhang, X.; Tomsovic, K. Distributed energy management for community microgrids considering network operational constraints and building thermal dynamics. Appl. Energy 2019, 239, 83–95. [Google Scholar] [CrossRef]
  11. De Rubeis, T.; Nardi, I.; Paoletti, D.; Di Leonardo, A.; Ambrosini, D.; Poli, R.; Sfarra, S. Multi-year consumption analysis and innovative energy perspectives: The case study of Leonardo da Vinci International Airport of Rome. Energy Convers. Manag. 2016, 128, 261–272. [Google Scholar] [CrossRef]
  12. Isa, N.M.; Tan, C.W.; Yatim, A. A comprehensive review of cogeneration system in a microgrid: A perspective from architecture and operating system. Renew. Sustain. Energy Rev. 2018, 81, 2236–2263. [Google Scholar] [CrossRef]
  13. Li, X.; Liang, X.; Lu, R.; Shen, X.; Lin, X.; Zhu, H. Securing smart grid: Cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 2012, 50, 38–45. [Google Scholar] [CrossRef]
  14. Lisovich, M.A.; Mulligan, D.K.; Wicker, S.B. Inferring personal information from demand-response systems. IEEE Secur. Priv. 2010, 8, 11–20. [Google Scholar] [CrossRef]
  15. Barbosa, P.; Brito, A.; Almeida, H. Defending against load monitoring in smart metering data through noise addition. In Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, 13–17 April 2015; pp. 2218–2224. [Google Scholar]
  16. Fan, Z.; Kulkarni, P.; Gormus, S.; Efthymiou, C.; Kalogridis, G.; Sooriyabandara, M.; Zhu, Z.; Lambotharan, S.; Chin, W.H. Smart grid communications: Overview of research challenges, solutions, and standardization activities. IEEE Commun. Surv. Tutor. 2012, 15, 21–38. [Google Scholar] [CrossRef] [Green Version]
  17. Komninos, N.; Philippou, E.; Pitsillides, A. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 2014, 16, 1933–1954. [Google Scholar] [CrossRef]
  18. Pillitteri, V.Y.; Brewer, T.L. Guidelines for Smart Grid Cybersecurity; NIST Interagency/Internal Report (NISTIR)-7628 Rev 1; NIST: Gaithersburg, MD, USA, 2014.
  19. De Oliveira, F.B. On Privacy-Preserving Protocols for Smart Metering Systems; Springer: Berlin, Germany, 2015. [Google Scholar]
  20. Fouda, M.M.; Fadlullah, Z.M.; Kato, N.; Lu, R.; Shen, X.S. A lightweight message authentication scheme for smart grid communications. IEEE Trans. Smart Grid 2011, 2, 675–685. [Google Scholar] [CrossRef] [Green Version]
  21. Chim, T.W.; Yiu, S.M.; Li, V.O.; Hui, L.C.; Zhong, J. PRGA: Privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid. IEEE Trans. Dependable Secur. Comput. 2014, 12, 85–97. [Google Scholar]
  22. Li, H.; Lin, X.; Yang, H.; Liang, X.; Lu, R.; Shen, X. EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 2053–2064. [Google Scholar] [CrossRef] [Green Version]
  23. Jo, H.J.; Kim, I.S.; Lee, D.H. Efficient and privacy-preserving metering protocols for smart grid systems. IEEE Trans. Smart Grid 2015, 7, 1732–1742. [Google Scholar] [CrossRef]
  24. Liu, Y.; Guo, W.; Fan, C.I.; Chang, L.; Cheng, C. A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Ind. Informatics 2018, 15, 1767–1774. [Google Scholar] [CrossRef]
  25. Xue, K.; Yang, Q.; Li, S.; Wei, D.S.; Peng, M.; Memon, I.; Hong, P. PPSO: A privacy-preserving service outsourcing scheme for real-time pricing demand response in smart grid. IEEE Internet Things J. 2018, 6, 2486–2496. [Google Scholar] [CrossRef]
  26. Zhang, S.; Zheng, T.; Wang, B. A privacy protection scheme for smart meter that can verify terminal’s trustworthiness. Int. J. Electr. Power Energy Syst. 2019, 108, 117–124. [Google Scholar] [CrossRef]
  27. Mustafa, M.A.; Cleemput, S.; Aly, A.; Abidin, A. A secure and privacy-preserving protocol for smart metering operational data collection. IEEE Trans. Smart Grid 2019, 10, 6481–6490. [Google Scholar] [CrossRef] [Green Version]
  28. Barbosa, P.; Brito, A.; Almeida, H.; Clauß, S. Lightweight privacy for smart metering data by adding noise. In Proceedings of the 29th Annual ACM Symposium on Applied Computing, Gyeongju, Korea, 24–28 March 2014; pp. 531–538. [Google Scholar]
  29. McLaughlin, S.; McDaniel, P.; Aiello, W. Protecting consumer privacy from electric load monitoring. In Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 17–21 October 2011; pp. 87–98. [Google Scholar]
  30. Zhao, J.; Jung, T.; Wang, Y.; Li, X. Achieving differential privacy of data disclosure in the smart grid. In Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 504–512. [Google Scholar]
  31. Zhu, L.; Zhang, Z.; Qin, Z.; Weng, J.; Ren, K. Privacy protection using a rechargeable battery for energy consumption in smart grids. IEEE Netw. 2016, 31, 59–63. [Google Scholar] [CrossRef]
  32. Zargar, S.H.M.; Yaghmaee, M.H. Privacy preserving via group signature in smart grid. In Proceedings of the Electric Industry Automation Congress (EIAC), Mashhad, Iran, 13–14 February 2013. [Google Scholar]
  33. Kishimoto, H.; Yanai, N.; Okamura, S. An Anonymous Authentication Protocol for the Smart Grid. In Smart Micro-Grid Systems Security and Privacy; Springer: Berlin, Germany, 2018; pp. 29–52. [Google Scholar]
  34. Zhao, J.; Liu, J.; Qin, Z.; Ren, K. Privacy protection scheme based on remote anonymous attestation for trusted smart meters. IEEE Trans. Smart Grid 2016, 9, 3313–3320. [Google Scholar] [CrossRef]
  35. Diao, F.; Zhang, F.; Cheng, X. A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans. Smart Grid 2014, 6, 461–467. [Google Scholar] [CrossRef]
  36. Gong, Y.; Cai, Y.; Guo, Y.; Fang, Y. A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans. Smart Grid 2015, 7, 1304–1313. [Google Scholar] [CrossRef]
  37. Efthymiou, C.; Kalogridis, G. Smart grid privacy via anonymization of smart metering data. In Proceedings of the First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 238–243. [Google Scholar]
  38. Stegelmann, M.; Kesdogan, D. Gridpriv: A smart metering architecture offering k-anonymity. In Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 419–426. [Google Scholar]
  39. Finster, S.; Baumgart, I. Pseudonymous smart metering without a trusted third party. In Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Australia, 16–18 July 2013; pp. 1723–1728. [Google Scholar]
  40. LeMay, M.; Gross, G.; Gunter, C.A.; Garg, S. Unified architecture for large-scale attested metering. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS’07), Waikoloa, HI, USA, 3–6 January 2007; p. 115. [Google Scholar]
  41. Brickell, E.; Li, J. A pairing-based DAA scheme further reducing TPM resources. In Proceedings of the International Conference on Trust and Trustworthy Computing, Berlin, Germany, 21–23 June 2010; pp. 181–195. [Google Scholar]
  42. Chen, L.; Li, J. Flexible and scalable digital signatures in TPM 2.0. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 4–8 November 2013; pp. 37–48. [Google Scholar]
  43. Barreto, P.S.; Libert, B.; McCullagh, N.; Quisquater, J.J. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, 4–8 December 2005; pp. 515–532. [Google Scholar]
  44. Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; pp. 213–229. [Google Scholar]
  45. Boneh, D.; Boyen, X.; Shacham, H. Short group signatures. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 2004; pp. 41–55. [Google Scholar]
  46. Boneh, D.; Boyen, X. Short signatures without random oracles. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; pp. 56–73. [Google Scholar]
  47. Schnorr, C.P. Efficient identification and signatures for smart cards. In Proceedings of the Conference on the Theory and Application of Cryptology, Santa Barbara, CA, USA, 20–24 August 1989; pp. 239–252. [Google Scholar]
  48. Fiat, A.; Shamir, A. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Linköping, Sweden, 20–22 May 1986; pp. 186–194. [Google Scholar]
  49. Pointcheval, D.; Stern, J. Security proofs for signature schemes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Saragossa, Spain, 12–116 May 1996; pp. 387–398. [Google Scholar]
  50. Camenisch, J.; Shoup, V. Practical verifiable encryption and decryption of discrete logarithms. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 17–21 August 2003; pp. 126–144. [Google Scholar]
  51. Boneh, D. The decision diffie-hellman problem. In Proceedings of the International Algorithmic Number Theory Symposium, Portland, OR, USA, 21–25 June 1998; pp. 48–63. [Google Scholar]
  52. Miyaji, A.; Nakabayashi, M.; Takano, S. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2001, 84, 1234–1243. [Google Scholar]
  53. Scott, M. On the efficient implementation of pairing-based protocols. In Proceedings of the IMA International Conference on Cryptography and Coding, Cirencester, UK, 17–19 December 2011; pp. 296–308. [Google Scholar]
  54. Brickell, E.; Camenisch, J.; Chen, L. Direct anonymous attestation. In Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 25–29 October 2004; pp. 132–145. [Google Scholar]
  55. Trusted Computing Group. TPM 1.2 Main Specification. Available online: https://trustedcomputinggroup.org/resource/tpm-main-specification (accessed on 3 December 2019).
  56. Trusted Computing Group. TPM 2.0 Library Specification. Available online: https://www.idtechex.com/research/reports/rfid-forecasts-players-and-opportunities-2018-2028-000642.asp (accessed on 3 December 2019).
Figure 1. System model of the smart grid communication network.
Figure 1. System model of the smart grid communication network.
Energies 12 04751 g001
Figure 2. Membership registration of smart meter.
Figure 2. Membership registration of smart meter.
Energies 12 04751 g002
Figure 3. The signing protocol of the smart meter.
Figure 3. The signing protocol of the smart meter.
Energies 12 04751 g003
Figure 4. The verification algorithm of the data aggregator.
Figure 4. The verification algorithm of the data aggregator.
Energies 12 04751 g004
Figure 5. The linking algorithm for malfunctioning smart meters.
Figure 5. The linking algorithm for malfunctioning smart meters.
Energies 12 04751 g005
Figure 6. The tracing protocol for malfunctioning smart meters.
Figure 6. The tracing protocol for malfunctioning smart meters.
Energies 12 04751 g006
Table 1. The notations used in the paper.
Table 1. The notations used in the paper.
NotationsDescriptions
DAADirect anonymous attestation
IBSIdentity-based signature
SMSmart meter
DAData aggregator
OCOperation center
TPMTrusted platform module
SM i The i-th smart meter
DA j The j-th data aggregator
TPM i The TPM chip embedded in SM i
ID j The identity of DA j
msmillisecond
nThe total number of SMs in a domain
mThe total number of DAs
e ^ Bilinear map
G 1 , G 2 , G T Multiplicative cyclic groups
kThe security parameter
qPrime order of G 1 and G 2
g 1 A generator of G 1
g 2 A generator of G 2
ψ A computable isomorphism from G 2 to G 1
gskThe system master key
gpkThe system public key
fThe secret key of the SM
FThe public key of the SM
creThe credential of the SM
H 1 A secure hash function that H 1 : { 0 , 1 } * Z q *
H 2 A secure hash function that H 2 : { 0 , 1 } * G 1
H 3 A secure hash function that H 3 : { 0 , 1 } * × G T Z q *
RLThe list of rogue/malfuctioning smart meters
TSThe current timestamp
msg i Metering data of SM i
M j Aggregated meter data of DA j
S I D j Identity-based private key of DA j
M OC The entire meter consumption of the OC
JA base point of elliptive curve
KPseudonym of the SM
TThe blind credential of the SM
| | Concatenation operation
{ 0 , 1 } l The set of all binary strings of length l
RSAThe public-key encryption algorithm
AES-256The symmetric encryption–decryption algorithm
SHA-256The hash function
Table 2. The average execution time of operations (ms).
Table 2. The average execution time of operations (ms).
T pr T mul T exp T hp T sym T H
1.2380.3250.2860.0290.007790.00198
Table 3. Comparisons of computational cost for the communications between the SM and DA.
Table 3. Comparisons of computational cost for the communications between the SM and DA.
SchemeCost on SMTime (ms)Cost on DATime (ms)
[34] ( t 1 + 3 ) T e x p + t × T s y m + 3 T H ≈0.2938 t + 0.8639 3 T e x p + 2 T H ≈0.862
Ours 1 T p r + 6 T m u l + 1 T e x p + 3 T h p ≈3.561 1 T p r + 4 T m u l + 4 T e x p + 3 T h p ≈3.769
1 t is the ring size (total number of SMs) in [34]. t is set to be 10, 50, and 100. When t = 10, the cost on the SM is 3.802 ms; when t = 50, the cost on the SM is 15.549 ms; when t = 100, the cost on the SM is 30.243 ms.
Table 4. Computational cost of the communications between the DA and OC.
Table 4. Computational cost of the communications between the DA and OC.
Cost on DATime (ms)Cost on OCTime (ms)
2 T m u l + 1 T e x p + 2 T h p ≈0.994 1 T p r + 1 T m u l + 1 T e x p + 2 T h p ≈1.907

Share and Cite

MDPI and ACS Style

Xie, S.; Zhang, F.; Lin, H.; Tian, Y. A New Secure and Anonymous Metering Scheme for Smart Grid Communications. Energies 2019, 12, 4751. https://doi.org/10.3390/en12244751

AMA Style

Xie S, Zhang F, Lin H, Tian Y. A New Secure and Anonymous Metering Scheme for Smart Grid Communications. Energies. 2019; 12(24):4751. https://doi.org/10.3390/en12244751

Chicago/Turabian Style

Xie, Shaohao, Fangguo Zhang, Huizhi Lin, and Yangtong Tian. 2019. "A New Secure and Anonymous Metering Scheme for Smart Grid Communications" Energies 12, no. 24: 4751. https://doi.org/10.3390/en12244751

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop