{"title":"A Secure Data Aggregation Scheme Enabling Abnormal Smart Meters Traceback for Smart Grid","authors":"Shiying Yao, Jian Zeng, Shuang Wang, Xiaolong Yang, Jingtang Luo, Ziqi Wang","doi":"10.1145/3573428.3573780","DOIUrl":null,"url":null,"abstract":"In order to prevent smart meter data from being stolen by attackers during transmission, it is common practice to securely aggregate the data and report it to the power company. Although the existing aggregation scheme can protect users' electricity consumption privacy, it cannot distinguish the data that has been attacked by false data injection (FDI), meaning it is difficult to trace and exclude abnormal data sources. To solve this problem, the study proposes a smart meter data aggregation scheme that can trace abnormal nodes. The aggregation center (AC) divides the smart meter (SM) into multiple groups, and the SM in the same group detect the abnormal behavior with each other by calculating whether the Hellinger distance of the power consumption of two adjacent timespan of their counterparts exceeds the set threshold, then feedback to the AC. Through multiple “grouping-detection” iterations, AC locates the groups which contains abnormal SMs. Then AC excludes the abnormal nodes and calculates the normal SMs’ power consumption aggregate value in the group by employing EC-EIGamal homomorphic encryption. Experimental results show that the detection accuracy is 73.3%∼100% under multiple FDI attacks, and attacked SMs can be effectively traced and excluded.","PeriodicalId":314698,"journal":{"name":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","volume":"136 9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3573428.3573780","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In order to prevent smart meter data from being stolen by attackers during transmission, it is common practice to securely aggregate the data and report it to the power company. Although the existing aggregation scheme can protect users' electricity consumption privacy, it cannot distinguish the data that has been attacked by false data injection (FDI), meaning it is difficult to trace and exclude abnormal data sources. To solve this problem, the study proposes a smart meter data aggregation scheme that can trace abnormal nodes. The aggregation center (AC) divides the smart meter (SM) into multiple groups, and the SM in the same group detect the abnormal behavior with each other by calculating whether the Hellinger distance of the power consumption of two adjacent timespan of their counterparts exceeds the set threshold, then feedback to the AC. Through multiple “grouping-detection” iterations, AC locates the groups which contains abnormal SMs. Then AC excludes the abnormal nodes and calculates the normal SMs’ power consumption aggregate value in the group by employing EC-EIGamal homomorphic encryption. Experimental results show that the detection accuracy is 73.3%∼100% under multiple FDI attacks, and attacked SMs can be effectively traced and excluded.