[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

In addition to changing service management, smart devices connect people and objects around them and collect data from them on and on, in order to construct the notion of a smart city. Such data produced by embedded devices and automatically transmitted over the Internet provides people with the information to make decisions. A smart grid is one of the most popular applications for a smart city. Due to the insecurity of the wireless channels, the security of data transmission in a smart grid has become a hot issue nowadays. Many schemes for data protection have been proposed, but weaknesses exist generally. We present a new data transmission scheme for a smart grid among the smart meter (SM), the electricity utility (EU), and the trusted authority (TA). The EU can obtain the power consumption of each SM, but cannot get the real identity of the SM. To keep the privacy of the user, if the consumption value is over the threshold in special time span or identity of SM is required for public affairs, TA could track the identity in time. Formal proof with random oracle model and security analysis are expressed to show the security of the proposed scheme. Via the performance and network simulation, it is easy to see that our scheme is practical for a smart city.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Li W, Chen Z, Gao X, Liu W, Wang J (2019) Multi-model framework for indoor localization under mobile edge computing environment. IEEE Internet Things J 6(3):4844–4853. https://doi.org/10.1109/JIOT.2018.2872133

    Article  Google Scholar 

  2. Wang J, Gao Y, Yin X, Li F, Kim HJ (2018) An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wirel Commun Mob Comput, 1–9. https://doi.org/10.1155/2018/9472075

  3. Wang J, Ju C, Gao Y, Sangaiah AK, Gj Kim (2018) A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comput Mater Continua 56(3):433–446

    Google Scholar 

  4. Wang J, Gao Y, Liu W, Wu W, Lim SJ (2019) An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput Mater Continua 58(3):711–725

    Google Scholar 

  5. Wang J, Gao Y, Liu W, Sangaiah AK, Kim HJ (2019) An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks. International Journal of Distributed Sensor Networks. https://doi.org/10.1177/1550147719839581

  6. Liang W, Fan Y, Li KC, Zhang D, Gaudiot JL (2020) Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics

  7. Liang W, Li KC, Long J, Kui X, Zomaya AY (2020) An industrial network intrusion detection algorithm based on multi-feature data clustering optimization model. IEEE Trans Industr Inform 16(3):2063–2071

    Google Scholar 

  8. He S, Xie K, Xie K, Xu C, Jin W (2019) Interference-aware multi-source transmission in multi-radio and multi-channel wireless network. IEEE Syst J 13 (3):2507–2518. https://doi.org/10.1109/JSYST.2019.2910409

    Article  Google Scholar 

  9. He S, Tang Y, Li Z, Li F, Xie K, Kim HJ, Kim GJ (2019) Interference-aware routing for difficult wireless sensor network environment with SWIPT. Sensors 19(18):3978. https://doi.org/10.3390/s19183978

    Article  Google Scholar 

  10. Zhang J, Wang W, Lu C, Wang J, Sangaiah AK (2019) Lightweight deep network for traffic sign classification. Ann Telecommun, 1–11. https://doi.org/10.1007/s12243-019-00731-9

  11. Zhang M, Lu Q, Li D, Kim J, Wang J (2019) A full convolutional network based on densenet for remote sensing scene classification. Math Biosci Eng: MBE 16(5):3345–3367

    Google Scholar 

  12. He S, Li Z, Tang Y, Liao Z, Wang J, Kim HJ (2019) Parameters compressing in deep learning. Comput Mater Continua, 1–16

  13. Zhang J, Jin X, Sum J, Wang J, Li K (2019) Dual model learning combined with multiple feature selection for accurate visual tracking. IEEE Access 7(1):43,956–43,969

    Google Scholar 

  14. Zhang J, Jin X, Sun J, Wang J, Sangaih AK (2018) Spatial and semantic convolutional features for robust visual object tracking. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-6562-8

  15. Liang W, Huang W, Long J, Zhang K, Li KC, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet of Things Journal

  16. Kumar N, Aujla GS, Das AK, Conti M (2019) Eccauth: a secure authentication protocol for demand response management in a smart grid system. IEEE Trans Industr Inform 15(12):6572– 6582

    Google Scholar 

  17. He D, Kumar N, Zeadally S, Wang H (2018) Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Trans Industr Inform 14(3):1232–1241

    Google Scholar 

  18. Gong Y, Cai Y, Guo Y, Fang Y (2016) A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans Smart Grid 7(3):1304–1313

    Google Scholar 

  19. Sui Z, Niedermeier M, de Meer H (2016) TAI: a threshold-based anonymous identification scheme for demand-response in smart grids. IEEE Trans Smart Grid 9(4):3496–3506

    Google Scholar 

  20. Ge S, Zeng P, Choo KKR (2017) An enhanced anonymous identification scheme for smart grids. In: International Conference on Applications and Techniques in Cyber Security and Intelligence. Springer, pp 329–337

  21. Cooper C (2017) Humanizing smart cities. https://inform.tmforum.org/features-and-analysis/2017/03/humanizing-smart-cities/

  22. Geisler K (2013) The relationship between smart grids and smart cities. IEEE Smart Grid Newsletter

  23. Kursawe K, Danezis G, Kohlweiss M (2011) Privacy-friendly aggregation for the smart-grid. In: International Symposium on Privacy Enhancing Technologies Symposium. Springer, pp 175–191

  24. He D, Kumar N, Zeadally S, Vinel A, Yang LT (2017) Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans Smart Grid 8(5):2411–2419

    Google Scholar 

  25. He D, Zeadally S, Wang H, Liu Q (2017) Lightweight data aggregation scheme against internal attackers in smart grid using elliptic curve cryptography. Wirel Commun Mob Comput, 2017. https://doi.org/10.1155/2017/3194845

  26. Wang Z (2017) An identity-based data aggregation protocol for the smart grid. IEEE Trans Industr Inform 13(5):2428–2435

    Google Scholar 

  27. Ni J, Zhang K, Lin X, Shen XS (2016) EDAT: efficient data aggregation without TTP for privacy-assured smart metering. In: 2016 IEEE International Conference on Communications (ICC). IEEE, pp 1–6

  28. Dong X, Zhou J, Cao Z (2016) Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications. Concurr Comput: Practice Exper 28(4):1145–1160

    Google Scholar 

  29. Ferrag MA (2017) EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications. Telecommun Syst 66(4):671–688

    Google Scholar 

  30. Badra M, Zeadally S (2017) Lightweight and efficient privacy-preserving data aggregation approach for the smart grid. Ad Hoc Netw 64:32–40

    Google Scholar 

  31. Li S, Xue K, Yang Q, Hong P (2018) PPMA: privacy-preserving multisubset data aggregation in smart grid. IEEE Trans Industr Inform 14(2):462–471

    Google Scholar 

  32. Li X, Liu S, Wu F, Kumari S, Rodrigues JJ (2019) Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J 6(3):4755–4763

    Google Scholar 

  33. Shen H, Zhang M, Shen J (2017) Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans Inform Forens Secur 12(6):1369–1381

    Google Scholar 

  34. Song J, Liu Y, Shao J, Tang C (2019) A dynamic membership data aggregation (DMDA) protocol for smart grid. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2019.2912415

  35. Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63:56–75

    Google Scholar 

  36. Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Industr Inform 14(9):4081–4092

    Google Scholar 

  37. Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2018) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Trans Industr Inform 14(8):3599–3609

    Google Scholar 

  38. Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen XS (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675–685

    Google Scholar 

  39. Mahmood K, Chaudhry SA, Naqvi H, Shon T, Ahmad HF (2016) A lightweight message authentication scheme for smart grid communications in power sector. Comput Electr Eng 52:114–124

    Google Scholar 

  40. Tsai JL, Lo NW (2016) Secure anonymous key distribution scheme for smart grid. IEEE Trans Smart Grid 7(2):906–914

    Google Scholar 

  41. Odelu V, Das AK, Wazid M, Conti M (2016) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9(3):1900–1910

    Google Scholar 

  42. He D, Wang H, Khan MK, Wang L (2016) Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun 10(14):1795–1802

    Google Scholar 

  43. Wu F, Xu L, Li X, Kumari S, Karuppiah M, Obaidat MS (2019) A lightweight and provably secure key agreement system for smart grid with elliptic curve cryptography. IEEE Syst J 13(3):2830–2838

    Google Scholar 

  44. Mahmood K, Chaudhry SA, Naqvi H, Kumari S, Li X, Sangaiah AK (2018) An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur Gener Comput Syst 81:557–565

    Google Scholar 

  45. Li X, Peng J, Niu J, Wu F, Liao J, Choo KKR (2018) A robust and energy efficient authentication protocol for industrial Internet of Things. IEEE Internet Things J 5(3):1606–1615

    Google Scholar 

  46. Diao F, Zhang F, Cheng X (2015) A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans Smart Grid 6(1):461–467

    Google Scholar 

  47. Kishimoto H, Yanai N, Okamura S (2017) An anonymous authentication protocol for smart grid. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, pp 62–67

  48. Zhang X, Wen M, Lu K, Lei J (2017) A privacy-aware data dissemination scheme for smart grid with abnormal data traceability. Comput Netw 117:32–41

    Google Scholar 

  49. Qu H, Shang P, Lin XJ, Sun L (2015) Cryptanalysis of a privacy-preserving smart metering scheme using linkable anonymous credential. IACR Cryptology ePrint Archive 2015:1066

    Google Scholar 

  50. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13 (3):361–396

    MATH  Google Scholar 

  51. Zeng S, Jiang S, Qin Z (2012) An efficient conditionally anonymous ring signature in the random oracle model. Theor Comput Sci 461:106–114

    MathSciNet  MATH  Google Scholar 

  52. Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur Gener Comput Syst 82:727–737

    Google Scholar 

  53. nsnamorg (2017) Ns-3.26. https://www.nsnam.org/ns-3-26/

Download references

Funding

This research was supported by the Program for New Century Excellent Talents in Fujian Province University (Year 2018). Dr. Li is supported by the Scientific Research Fund of Hunan Provincial Education Department under Grant No. 18A178 and the Natural Science Foundation of Hunan Province, China under Grant No. 2018JJ3191. Dingbao Lin is supported by University Distinguished Young Research Talent Training Program of Fujian Province (Year 2018). Prof. Joel Rodrigues is supported by FCT/MCTES through national funds and when applicable co-funded by EU funds under the project UIDB/EEA/50008/2020; and by the Brazilian National Council for Scientific and Technological Development (CNPq) via Grant No. 309335/2017-5.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiong Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, F., Li, X., Xu, L. et al. An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion. Ann. Telecommun. 75, 307–317 (2020). https://doi.org/10.1007/s12243-020-00765-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-020-00765-4

Keywords

Navigation