Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.8.1701

Secure Data Transaction Protocol for Privacy Protection in Smart Grid Environment  

Go, Woong (순천향대학교)
Kwak, Jin (순천향대학교)
Abstract
Recently, it has been found that it is important to use a smart grid to reduce greenhouse-gas emissions worldwide. A smart grid is a digitally enabled electrical grid that gathers, distributes, and acts on information regarding the behavior of all participants (suppliers and consumers) to improve the efficiency, importance, reliability, economics, and sustainability of electricity services. The smart grid technology uses two-way communication, where users can monitor and limit the electricity consumption of their home appliances in real time. Likewise, power companies can monitor and limit the electricity consumption of home appliances for stabilization of the electricity supply. However, if information regarding the measured electricity consumption of a user is leaked, serious privacy issues may arise, as such information may be used as a source of data mining of the electricity consumption patterns or life cycles of home residents. In this paper, we propose a data transaction protocol for privacy protection in a smart grid. In addition, a power company cannot decrypt an encrypted home appliance ID without the user's password.
Keywords
Smart Grid; Smart Meter; Privacy Protection; Data Transaction Protocol;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 National Energy Technology Laboratory, Appendix B1: A systems view of the modern grid integrated communications v2.0, 2007.
2 전용희, "스마트 그리드의 취약성, 특성, 설계 원칙 및 보안 요구사항 분석," 정보보호학회지, 제20권, 제3호, pp.79-89, 2010.   과학기술학회마을
3 W.Wang, Y.Xu and M.Khanna, "A Survey on the Communication Architectures in Smart Grid," Computer Networks, vol.55, no.15, pp.3604-3629, 2011.   DOI   ScienceOn
4 S.D'Antonio, L.Coppolino, I.A.Elia and V.Formicola, "Security Issues of a phasor data concentrator for smart grid infrastructure," Proc. 13th European Workshop on Dependable Computing, pp.3-8, 2011.
5 F.Sun, M.Lei and C.Yang, Establishing Smart Power Grid and Innovating Management Method-A New thought of the Development of Electric in China, IBM Corp, 2006. Available: http://www-900.ibm. com/cn/services/bcs/iibv/industry/utilities.shtml.
6 NIST, Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, DRAFT NISTIR 7628, pp.1-236, 2010.
7 S.Drenker. "Nonintrusive Monitoring of Electric Loads," IEEE Computer Applications in Power, vol.12, no.4, pp.47-51, 1999.   DOI   ScienceOn
8 E.L.Quinn, Smart Metering and Privacy: Existing Laws and Competing Policies, Colorado Public Utitlies Commision, 2009. Available at SSRN: http://ssrn.com/abstract=1462285 or http://dx.doi.org/10.2139/ssrn.1462285, (2009)
9 H.Tai and E.O.Hogain, "Behind the Buzz [In My View]," IEEE Power and Energy Magazine, vol.7, no.2, pp.87-92, 2009.   DOI   ScienceOn
10 R.M.Anthony and L.E.Randy, "Smart Grid Security Technology," Innovative Smart Grid Technologies (ISGT), pp.1-6, 2010.
11 NIST, Guidelines for Smart Grid Cyber Security vol. 1, Smart Grid Cyber Security Strategy, DRAFT NISTIR 7628, pp.1-236, 2010.
12 이건희, 서정택, 이철원, "스마트그리드와 사이버 보안", 한국통신학회지, 제27권, 제4호, pp.23-30, 2010.   과학기술학회마을