Next Article in Journal
Error Analysis of Narrowband Power-Line Communication in the Off-Grid Electrical System
Next Article in Special Issue
Sensor Networks: Physical and Social Sensing in the IoT
Previous Article in Journal
Quantum Readout of Imperfect Classical Data
Previous Article in Special Issue
Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks

1
Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan
2
Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia
3
Department of Software and Communications Engineering, Hongik University, Sejong 30016, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2022, 22(6), 2269; https://doi.org/10.3390/s22062269
Submission received: 3 December 2021 / Revised: 1 March 2022 / Accepted: 14 March 2022 / Published: 15 March 2022
(This article belongs to the Special Issue Sensor Networks: Physical and Social Sensing in the IoT)

Abstract

:
Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network. A novel privacy-preserving method for smart grid-based home area networks (HAN) is proposed in this research. To aggregate data from diverse household appliances, the proposed approach uses homomorphic Paillier encryption, Chinese remainder theorem, and one-way hash function. The privacy in Internet of things (IoT)-enabled smart homes is one of the major concerns of the research community. In the proposed scheme, the sink node not only aggregates the data but also enables the early detection of false data injection and replay attacks. According to the security analysis, the proposed approach offers adequate security. The smart grid distributes power and facilitates a two-way communications channel that leads to transparency and developing trust.

1. Introduction

The term power grid is commonly referred to as an electricity distribution system that supplies energy to a territory. A power grid actually comprises power generation, distribution, and transmission [1]. The traditional power grid just supplies energy to the consumer which results in simplified management but at the cost of short falls when supply and demand do not catch up. There are certain limitations of the traditional grid such as the losses at transmission lines and lack of information, or we can say that lack of demand knowledge, which further leads to inefficient power management [2,3]. For example, the traditional grid feeds constant power during peak and off peak hours. To overcome the limitations of the traditional power grid, certain changes must be made in traditional grid [4]. The power sector needs to be revolutionized to meet the needs of modern living. A smart grid promises to replace the traditional grid with better performance and is also open enough to meet the upcoming revolution in the power sector. The SG consists of a power generation unit, power transmission and distribution units, smart meter (SM), smart homes, smart energy management systems, and smart appliances [5]. The communication among power generation, transmission, distribution, and customers is usually a two way communication managed by the CC and service provider enabling real time communications between consumers and the utility/service provider [6,7].
An SM senses the energy consumption of a home and sends it to a substation or the gateway or control room of that region. There may be a number of devices between the SM and service provider. The SM reports the energy consumption about every 15 min to the service provider [8]. The control room receives data from all the SMs in the neighborhood and transmits the combined energy usage report to the control center. The control center uses the consumption report to run load management and power distribution and uses the information for billing purposes [9]. Abbreviations contains all the terminologies and their definition used in the paper.

1.1. Architecture of Smart Grid

Smart grid refers to the electricity distribution network that uses communication channels to detect any change in local power usage and acts accordingly without external interference. It uses smart home appliances, SM, and green energy resources. The smart grid utilizes a two-way communication channel and allows consumer to interact with the grid. It facilitates the consumers, service provider, and government establishment by overcoming the drawbacks of traditional grid. It reduces the energy consumption and decreases the consumer’s cost of electricity by smart means.

1.2. Working Architecture

The smart meter works inside a HAN as follows:
  • The SMs are installed at the home, offices, and factory premises. The SM communicates to the local control center (CC), which is the nearest data gathering center. An SM can provide instantaneous consumption, cumulative energy, time of day energy data, and maximum demand (in kW).
  • The local data center transmits information gathered from SMs in a locality to the data center at the utility provider or any third-party service provider using wired or wireless means.
  • The data at the utility provider side can be accessed using a web portal. The utility providers gather data from local CC in real time and process it. It reports any tampering of meters, billing information, energy usage, load status, etc.

1.3. Our Contributions

The communication that makes up the grid smart is one of the obstacles that the smart grid deployment faces. To date, several schemes have been proposed and review surveys have been published, for example, [10,11,12,13,14]. Most of these schemes highlight either communication, technology standards, and infrastructure or home energy management and security. To the best of our knowledge, however, privacy is a big issue that still has to be thoroughly examined.
Since the smart grid is designed to facilitate its consumers, keeping the privacy of end users in a HAN is important. To date, a few schemes have been proposed, such as [15,16,17,18,19,20,21,22,23] to create a safe communication route over vulnerable public networks. These schemes are aimed at establishing a framework that can potentially protect end users’ privacy. The majority of the plans cover the smart grid in basic terms, but they leave out smart homes and HANs. As it runs in the field, a HAN is the most vulnerable to cyber threats, theft, and data tampering. Because a consumer may be unaware of cyber security standards, it is critical to have built-in security to protect HANs from various cyber threats. In short, the issues associated with smart homes are rarely explored in published articles. This paper discusses smart homes and gathers the prominent articles in this domain, and proposes a novel privacy preserving scheme. Here, we highlight the following points:
  • The development of smart grids is discussed along with the architecture of smart grids.
  • Data aggregation, privacy preservation, key management, and user authentication are discussed within the scope of a smart home.
  • A comprehensive literature review along with the pros and cons of existing schemes is discussed in addition to presenting some advanced literature to solve these issues.
  • The paper tries to focus on smart homes and the privacy concerns of consumers along with discussing the future directions for faster transformation from traditional to smart grids.
  • Finally, a privacy preserving data aggregation scheme is proposed for HANs that gathers the readings from all home appliances at the sink node, performs an early stage fault tolerance and aggregates the received reading data into one, and sends the result to the SM for further analysis.
The remainder of the paper is laid out as follows: The smart home is introduced in Section 2. Section 3 discusses the notion of privacy, its parameters, goals and attacks, and the threats to privacy. Section 4 presents a comparative analysis of advanced privacy-preserving techniques, including their benefits and drawbacks, as well as countermeasures. Section 5 describes a privacy-preserving data aggregation technique for fault-tolerant smart homes. Section 6 examines the proposed scheme’s security measures, followed by a performance evaluation in Section 7. Future study directions are discussed in Section 8, and the work is concluded in Section 9.

2. Smart Home

A smart home consists of an SM and various appliances. Appliances may be a low voltage devices or high voltage devices which aggregate their energy consumption and send information to SMs, as shown in Figure 1. The SM receives energy consumption from appliances and forward to utilities for further processing [24,25]. Home energy management system (HEMS) is an automated system consist of hardware and software which controls and monitors the various devices and their operations. Users manually manage and control the electricity generation and production [26]. Different hourly block rates are offered for 24 h. Needless devices are automatically turn off with a short notification. Demand side management, demand response, direct load control, real time pricing, time of use, and real time peak pricing are recent examples of HEMS [27].

2.1. Smart Meter

An SM is an electric meter that performs the following functions: (i) measuring energy consumption, (ii) measuring energy consumption, (iii) report consumption data to meter management system, (iv) receiving electricity consumption cost or control signals, and (v) inform all the home appliances [28]. The SM data is one of the major sources of information similar to other actors, e.g., distribution system, transmission system, and generation sources for smooth running and construction of smart grid. As per European commission report around 80 percent of energy meters will be replaced with SM in 2020 [29].

2.2. Home Appliances

Home appliances are household devices installed in user home or apartments. These devices are connected to SM for monitoring and reporting [30]. Users can schedule appliances per use. In [16], the appliances are classified into four groups: Group 1 includes light load normal appliances, e.g., light bulbs and phone chargers; Group 2 consists of nonstoppable home appliances, e.g., microwave ovens, Group 3 comprises schedule-oriented appliances, e.g., washing machines and heaters; Group 4 includes electrical vehicles. Consumer can also schedule their appliances with different hourly changing rates to control their electricity cost [16]. Appliances monitor their energy readings and send to the SM after every time interval, which is usually 15 min duration [28].

2.3. Wireless Sensor

With the invention of new technologies, wireless sensors are being used in industries, health care, education, and utility grids. Due to their sensing capabilities, it makes them able to interact with machines, devices, and various appliances for controlling and monitoring [17,31]. Similarly, with the deployment of smart grids, wireless sensors are being deployed in smart homes and also at utility. Wireless sensor performs conversion of analog signals to digital, analog signal processing, transformation of information via bidirectional bus, manipulation of sensor derived signals, and addressing [32]. In a HAN, kitchen appliances, heating system, security frameworks, lighting system, theater setups, and water and sewage systems are totally instrumented with wireless sensors performing various operations. Access to these systems is through a home management system (HMS), which could be through the Internet or a cell phone application [32,33].

2.4. Consumer

Consumer is the main stakeholder for which the smart grid is designed. Consumers can schedule energy consumption, generate green energy for themselves, and store energy for future purposes [34]. Consumers can control their appliances’ function and information flows, such as home automation, home energy management system, and industrial automation system [24].

2.5. Advanced Smart Home Applications

To upgrade the functionality of conventional grids, smart grids have introduced various new applications in smart homes, e.g., energy generation and storage and demand response. Smart grids have enabled the consumer to control their electricity bill. Other benefits that smart home applications have provided are scheduling power usage during the on/off peak hours, they can demand extra energy from the grid in advance, and, if required, they can also feed any green energy generated back to the national grid.

2.5.1. Two-Way Communications

A smart grid establishes a communications channel between consumers and service providers. A consumer can request peak and off-peak hours tariff rates to schedule the electricity usage appropriately. The SP can also obtain a future consumption forecast and can therefore control the energy production [35].

2.5.2. Renewable Energy Resources

With renewable energy resources an individual home can generate its own energy using mostly solar panels, but also with windmills or biogas. A consumer uses part of the energy for their own purpose and can feed the extra energy into the national grid. Hence, a consumer can also participate in the national grid and play a useful role for the national cause [36].

2.5.3. Energy Generation and Storage

With the invention of energy renewable resources such as solar, biogas, wind, and electricity storage sources such as electrical vehicles, smart transformers, and appliances, many home users generate electricity using photovoltaic panels for their daily use and sell extra electricity to the national power grid [35]. In each area, every application of SG is based on necessities such as voltage support, power quality, and service reliability [36]. However, smart grids have a serious issue with generating and storing electricity and, similarly, with the evaluation of the distribution system and integration of the evaluated grid components. Currently, gas and diesel generators, tides, and solar and wind are conventional energy generation resources, which provide power whenever natural resources are not available. The authors of [37] proposed optimization techniques for domestic users to control the operations in a HAN. Similarly, in [38], the integer-programming model is presented for electricity storage based on electric vehicles and photovoltaic panels.

2.5.4. Demand Response

With the rapid increase in population and wireless devices in HAN, demand for electricity has also increased. In a conventional grid system, it is hard to accommodate the electricity needs because conventional systems have various challenges, such as maintenance, erection, operation, and design [39]. This strategy is used to control or reduce the electricity consumption at peak hours. It does not only reduce the use of electricity consumption at peak hours but also reduces the electricity consumption cost. Different rates have already been offered for various hours [18,19].

3. Privacy

Smart grids are a promising technology describing electrical power infrastructure for transmission and distribution with integrated information and communications technologies [40]. The purpose of a smart grid is to bill the customers accurately and manage and distribute electrical energy in an efficient way. In a smart grid, an SM is the key entity. When an SM is deployed, the concern regarding meter tempering and consumer privacy is raised. There is a need for legislation of SMs. In compliance with privacy requirements, certain properties ensuring the privacy are confidentiality, integrity, authenticity, and availability [24,41]. An SM is prone to data tempering where an adversary can invade the SM. If an SM is compromised, it is then easy to access a cryptographic key. By exploiting a common vulnerability, a large number of SMs can be compromised and can result in manipulating real-time consumption. Therefore, a scalable access control is needed to prevent meter compromises and make sure that any stored information is used for the purpose of billing operations and other value-added services [42]. The major benefit of an SM is accurate billing, but the frequent sharing of consumption information with the utility might leak some private information. In order to protect billing information techniques—e.g., battery management—a zero knowledge homomorphic encryption technique is proposed in [43].

3.1. Privacy Goals

An SM collects the energy consumption from home appliances usually after a 15 min duration. An SM then generates a consumption report and sends it to the utility company. There might be an adversary peeking at energy consumption of a smart home that can further predict the lifestyle and routine of a homeowner. This poses a threat to security as well as privacy of the smart home. Therefore, to preserve privacy and security, energy consumption is encrypted either at the appliance level or before it leaves the HAN. The energy consumption sent by the HAN is further processed and the CC receives energy consumption details from various SMs. Each meter reports either its own consumption or an aggregation technique is used to sum-up the consumption reports from all meters in a sub-region/zone and send a bulk consumption report after the aggregation. Based on this, the CC generates monthly bills and maintains a profile picture of that region to show that how much electricity consumption is required [44]. The CC continuously collects consumption details from different devices. The received consumption is encrypted or aggregated because if an intruder changes the message, it could easily be identified [20]. This section describes various privacy goals.

3.1.1. Confidentiality

Home appliances send their energy detail to aggregator, SM or SP. This detail may reflect a users’ personal profile. Privacy and confidentiality are interdependent of each other [45]. By securing messages from unauthorized access, privacy of home incumbents will be retained. If privacy of home users is compromised, then confidentiality is automatically violated. To ensure confidentiality, various schemes for HAN are employed, e.g., homomorphic encryption, blind signature, in-network aggregation, etc. [16,21].

3.1.2. Integrity

Smart appliances continuously send consumption patterns to an aggregator or SM after an interval. It may be possible that an aggregator or an SM are physically secure but vulnerable to different attacks such as man-in-middle attacks, alteration attacks, or replay attacks [46]. If integrity is compromised, precious information will be compromised and wrong decisions for managing and controlling the network might be made. Integrity refers to the message sent by sender; the same message without any modification is received by receiver. The following schemes are used for HAN data integrity: message digest, MAC, digital signature, and H-MAC [16,22].

3.1.3. Anonymity

Anonymity refers to the situation where the real identity of a person is kept secret. During sharing of secret control signals or reading, a device may protect their real identity from other appliances or devices [47]. Even an appliance or SM cannot recognize other devices communicating with them in a HAN. The purpose of anonymity is to hide one’s identity from appliance to appliance, appliance to SM, SM to SP, and SP to appliance. Various techniques for anonymity include PALK, ASF, and TAI [48,49].

3.1.4. Availability

Availability indicates that data, applications, and systems are available to end-users when they are required. Availability is compromised if someone pretends to be an authorized user to access the system and make the network busy [50]. Distributed denial of service (DDoS) is the most basic availability attack. In DDoS attacks, the incoming traffic is originated from multiple sources; therefore, making it difficult for offensive measures to identify a single malfunctioning device. A DDoS attack in IoT devices happens due to lack of security measures. The alternating direction method of multipliers [51] and honeypot game models [52] are used to protect the systems from DDoS attacks.

3.2. Cyber Attacks on Smart Homes

In a HAN, various heterogeneous devices are connected to each other. The devices are interoperable and are managed remotely. An adversary is always searching to find an entry point to enter the network for different attacks.

3.2.1. Impersonation Attack

Each device’s status—ON/OFF—is saved in the SM memory. Every 15 min the appliance sends its consumption to the SM. If an appliance is compromised and impersonates another device, this can result in a false reading for a time period unless it is detected and recovered, for example, if AC is switched ON and impersonates a fan or light bulb and vice versa, then it has a huge impact on power billing [53]. Even if an appliance impersonates itself as the SM and requests that the other appliances send consumption reports every 15 min, the result could be dangerous and can lead to some disaster or might lead to electricity theft [54].

3.2.2. Eavesdropping

Smart grids are meant not for the electricity supply from grid to home or home to grid but also as a communication channel between a smart home to the SG and also sends various control messages and forecasts the power demand in advance [53]. If an adversary eavesdrops or sneaks into someone’s SM, he or she can easily know the homeowner’s routine/lifestyle, living habits, and interests (tuned TV channel) as well as the time they go to work and when a person is at home or not. This information may result in compromising the customer’s privacy and also can also be used to plan for theft and other activities.

3.2.3. Replay Attack

Smart homes and SG are continuously communicating and sharing information about electricity usage and forecasting the future power demands. If there is a compromised appliance or SM, an adversary can see the consumption report and can replay an old report in place of the current report and can also change the demand-to-supply report or even replay an old control message. For example, if extra power is demanded or an appliance asks to be scheduled for off peak hours, a replay attack could alter the demand to low power or the appliance can be switched ON at once and cause an inconvenience [55].

3.2.4. Alteration Attack

An alteration attack happens when the HAN, an appliance, or the SM is compromised and an adversary maliciously alters the consumption report or forges a message. The forged message or consumption report can lead to false execution, for example, if a message is sent to set the oven to 120 °C but when altered sets the water heating system to 120 °C then it might lead to injuring a person at home or can also lead to system failure or short circuit. Even if a consumption report is forged, it may cause the customer to pay for electricity that he has not consumed [56].

3.2.5. Message Modification Attack

Communication is a key way in which the SG differs from a traditional grid. If there is an adversary between SG and HAN, it can modify the messages sent to or received from the SG/HAN, which may result in a trust deficit between the working entities and thus leading to serious damage at either side [23].

3.2.6. Energy Import/Export Attack

The SG allows for distributed power generation, where a consumer can install the renewable power generation resources at the consumer’s premises. It feeds the surpass energy into the national grid and can also demand extra energy resources from the grid when needed [23]. For example, an adversary demands the energy import from the grid, which is not needed, and exports the energy from home to the grid even when it is needed at home [56]. Similarly, if a plug-in electrical vehicle is charged and imports unnecessary energy from the grid, which is not needed at peak hours, it can lead to power shortfalls and load shedding.

4. Advanced Privacy Preserving Scheme and Its Countermeasures

In this section, we study the latest privacy preserving schemes related to user authentication, data aggregation, key management, and CIA triad.
In [32], the authors have reviewed security issues related to smart homes. The purpose is to portray the scenarios that pose a threat to smart homes, which are an essential part of the smart grid. The smart grid security objectives adopted in this paper are confidentiality, integrity, availability, authenticity, authorization, and nonrepudiation attacks. Furthermore, in [32], the authors examine potential cyber and physical security threats in terms of security objectives.
The communication infrastructure of the smart grid, while considering reliability and challenges to security in the smart grid, is provided in [57]. In [58], an emerging technology, i.e., software defined network (SDN), is discussed. A complete overview of the HEMS literature with reference to main principles, setups, and enabling technologies is offered in [59]. The scheme in [60] comprises existing architectures, applications, and prototypes of IoT-assisted SG systems, and provides an overview of IoT-assisted SG systems.
In the studied literature, the following points have been observed:
  • The security challenges of the smart grid are discussed and threats are evaluated.
  • The existing architectures, prototypes, and communications challenges are discussed.
  • The challenges related to interoperability of various technologies at the hardware level of the smart grid are discussed.
In [61], big data collection and management is surveyed. The authors have used an analytical method to study big data and its applications associated with smart grids. The paper gives an insight about the sources of big data in smart grids and real-time processing to predict a pattern for decision making. In [62], a detailed survey on the future wireless communications systems is performed. The authors have reviewed the energy utilization, redistribution, and trading. The authors have performed a comprehensive study of the current literature and have observed the concern about security vulnerabilities of smart grids. In [63], with the use of new IoT technologies, an overview of smart grid security improvements and weaknesses is provided.

4.1. Data Aggregation

Data aggregation is the process of gathering data from several sources and combining it into a variable or report. In smart homes, various appliances are connected to an SM and send their demand/consumption report to the SM. It creates a communications overhead and privacy hole [64]. To avoid this issue, an aggregator is used that collects messages from various appliances and aggregates them into a single message. The following techniques are discussed for data aggregation while preserving the privacy.
In [22], a scheme has been presented, which is based on incremental hash operation. This scheme reports the cost to the operation center instead of energy consumption readings. After an interval of time, the SM calculates the cost of the recorded reading using hash function and sends it to an operation center. The operation center first receives all the consumption costs from different residential areas and then aggregates them for forwarding to utility providers for the verification of integrity. Utility providers sum up all the received values and compare it with the power distribution for that time interval to validate the integrity. If the value of cost and distribution is not equal, the entire consumption reading is discarded automatically.
A framework based on Shamir’s secret sharing is proposed in [65] in order to effectively reduce computational overhead and dependency on a single dedicated aggregator. The scheme also prevents the electrical utility from linking its data to a single SM. The architecture describes that the area under the supply of one service provider is divided into subregions. Each SM divides its reading into shares and connects it to several aggregators. The scheme masks the SM form the utility by sending the aggregated reading and reduces the dependency on a single aggregator.
An in-network data aggregation scheme is proposed in [30], which aggregates the data hop by hop. Each appliance has its own chip code and spreads the energy consumption using these chip codes, which are sent to the SM after every time interval. These chip codes are unique among appliances. The SM can extract each appliance’s consumption by knowing the chip codes. Since each appliance has its own chip code, any malfunctioning appliance cannot alter the consumption of other appliances.
In [66], a multidimensional aggregation scheme is used to save the communication bandwidth and increase the computational speed of the SM. There is a gateway between the CC and HAN, which receives the encrypted data from a large number of SMs and then aggregates the data before sending it to CC. A TTP is used to mask the gateway from HANs to avoid any mishandling. Any failure or attack on the TTP end can lead to a serious disturbance in communications between the CC and HAN.
Summary:Table 1 provides a detailed aggregation summary of the above analyzed techniques. It is perceived that the majority of the aggregation steps are performed by a separate third party device or CC [22,65,66,67]. Similarly, in [65,66], the selection of devices for aggregation and their group header nomination also increases computation overhead. The authors of [67] assume that all entities taking part in the communications are secure and resistant to tampering and modification attacks.

4.2. CIA Triad and Anonymity

In this section, we present schemes that ensure CIA triad and anonymity while preserving the privacy of HAN. A scheme proposed in [68] divides the users of a residential area in subsets based on the energy consumption ranges over a period of time. The energy consumption is then summed up for each subset. The TTP and Paillier homomorphic schemes are used to ensure the privacy of data. However, a damaged SM may not report the data correctly and the malfunctioning or misuse of TTP can lead to serious concerns regarding the authenticity of aggregation reports.
In [69], a Q-learning technique, which is based on artificial intelligence, is proposed and presented. The structure is that there are three kinds of information shared between a HAN/BAN or SCC: control flow, data flow, and power flow. Smart appliances and SMs constitute the HAN. Different HANs that are in the same building constitute a BAN. The regional power supplier which manages multiple BANs is called NAN. The NAN sends information such as dispatch instruction, billing, real-time reporting, and uploads the data to the SCC. Before sending data to the control center, the data is distributed to uniformly random secret shares. SCC outsources information to professional cloud server operators to train the Q-Learning model using edge computing. The secret shares are randomly distributed so that cloud servers could not obtain the information. However, if the two servers collude, then it can be a very serious privacy breach. The scheme also has it own protocols for selection and addition and subtraction but, as we know, the honest but curious entities in the network can access the information from the secret shares anytime.
Similarly, in [16], a homomorphic scheme is proposed for smart homes, which consists of home appliances, SM, and a third-party aggregator. The third party aggregator assigns an ID to every appliance at the time of installation. All appliances in a home are similarly arranged in a sequence order as per given IDs. All appliances report their consumption report to an SM. Before sending their consumption, they add homomorphic features and forward data to the aggregator for the current round. The aggregator appliances sum up all received readings, encrypt it with SM’s public key, and send to the SM. The SM authenticates the aggregator appliance using a private key.
The SM encrypts the consumption and gives the identity to the SS. After verifying the identity, SS generates the group blind signature and generates the tags for each data block which the CC acquires and matches with the corresponding data block. In this way CC verifies the data integrity. The author supports the scheme by following that if an adversary or SS somehow can obtain the encrypted consumption but could not obtain the CC’s private key. This is because in order to guess the private key prime numbers must be used and exact prime numbers are difficult to match in a polynomial equation. Thus, the possibility of compromising the CC’s private key is almost negligible. However, the CC is assumed to be honest in this scheme [21].
In many privacy preserving schemes, TTP is certification authority to generate public and private keys. To avoid TTP, Xiaoli et al. presented a secure privacy preserving scheme. At the time of physical configuration each SM is assigned an ID by the CC [70]. The same ID is also registered with the CC. Every time the CC sends a request message to the SM for sending the energy consumption pattern, the request message includes SM, CC ID, and the key material. Using ID and key material, the SM first generates a random number and then a secret key. The SM will encrypt the energy consumption report by using their secret key and current time stamp. The encrypted message is then forward to CC for identity verification and decryption. The CC first verifies the SM identity by its ID and then decrypts the message using the same secret key.
Summary: PPMA [68], LiPSG [69], and lattice-based homomorphic schemes [16] provide confidentiality and integrity, but not anonymity and availability (see Table 2). PPMA and lattice-based homomorphic schemes are resistant against passive and active attacks, but blind signature [21] fails to do this. Similarly, [16,21,68,70] do not update their encryption key.

4.3. User Authentication

Authentication is a process of associating the incoming activation requests with the already set authentication rights [71]. These authentication rights are stored in file systems or databases. When any device sends its consumption to the SM based on the designed schemes, the system allows or denies the request.
In [72], a scheme is designed, which is based on elliptic curve cryptography and consists of three phases, i.e., system-setup phase, registration phase, and key agreement and authentication phase. Initially, in the system setup phase, the trust anchor shares the system parameters using an elliptic curve and publishes these parameters. In the registration phase, the trust anchor generates the private key for both the SM and the SP using Schnorr’s signature. After registration, the SM and SP communicate directly without the involvement of a trust anchor. In the last phase, the SM and SP automatically generate a session key and authenticate each other via session and private keys.
In [15], data source authentication and data aggregation are performed for a particular residential area over a defined time period while ensuring the privacy of each user’s data aggregation and fault tolerance. This scheme provides a high level of control over data collection and the processing phase in addition to verifying the integrity of the data and validates the data source.
To eradicate computations and communication resources, a lightweight authentication scheme is presented in [73], which is based on a physically-unclonable function. Before any communications, the SM and neighborhood gateway authenticate each other. The SM sends the ID to the neighborhood gateway. The neighborhood gateway checks the SM ID in its database and creates two random numbers, concatenates these numbers with the time stamp, and the result is XoRed with R-response and sent to the SM. The SM authenticates the neighborhood gateway for further communications.
In [21], an SG is divided into three layers. The CC lies in the middle layer and is responsible for generating system parameters, user registrations, and the verification of data. The SM is placed at the lowest layer and monitors/sends real-time consumption; therefore, it is prone to data being tampered or manipulated.
Similarly, in [74], elliptic curve cryptography is used to authenticate the entities in the SG to preserve the communication between them over a public and insecure channel. First of all, TTP generates all system parameters and then authenticates the SG device and UC in an offline mode. The scheme is robust against certain attacks; however, the pre-loaded system information may affect the computation power of the smart devices.
In [75], the authors have proposed a scheme to achieve anonymity for the SM to avail all the services provided by the UC, without the involvement of TTP. TTP is only responsible for the registration phase, and its role is limited. The SM is supposed to send the consumption report and control signals to UC, which is an aggregator as well as controller for monitoring the energy consumption trends. Authentication will take place between the UC and the SM.
Summary:Table 3 contains a summary of the analyzed techniques for authentication. In [21,74,75], the SM and CC authenticate each other but the appliances are not authenticated. In [72], only the CC performs authentication; the SM and appliance are just relay nodes. Similarly, [74,75] are prone to cyber security attacks and require higher computational cost.

4.4. Key Management

A key is a bit of code encrypting and decrypting the message. Each key has a specific length of code. A strong encryption process requires a high key size [76]. In cryptography, private keys, session keys, and public kesy are frequently used. Below, different HAN models are discussed to illustrate how they used the cryptographic techniques.
In [55], a HAN sends its consumption to the NAN gateway, which is a trusted service provider and an interface between the HAN and utility provider. A NAN is distributed over a village, city, and sometimes over a residential or commercial area. The communication between the utility provider and the SM takes place via a gateway. The gateway should communicate with the SM in an offline mode. However, the proposed scheme establishes a session key using mutual authentication between the SM and gateway.
In HAN, appliances are arranged in two groups [77]. The first group is for one-way communication devices such as light bulbs, chargers, etc., while the second one consists of two-way communication appliances, e.g., electric vehicles, AC, etc. Before deployment, every smart appliance is assigned with an ID and master key. On the basis of the master key, the group header assigns a unique key and group controller key to every smart appliance and SM. The appliances encrypt their consumption using a unique key and send it to the group controller, which forwards it to the SM for further processing and verification. This scheme prevents man-in-the-middle attacks, Sybil attacks, and replay attacks, but ignores key updating.
Similarly, a cloud-based security scheme is proposed in [33] for smart homes, where home appliances are categorized into two different groups. Appliances which performs simple basic functions are placed in group 1. Group 2 contains controllable and monitoring devices which have two-way communication. Both groups have a group header. In this architecture, the SMs are not considered as the part of the smart home. The SM is considered as part of the AMI smart grid. Group headers are responsible for communicating with a home management system or cloud server. HMS is placed in a local cloud, which is controlled by a remote or simple device. Before deployment, every appliance and group header is assigned an ID. Using this ID, HMS generates a group key and shares it with the appliances and the group controller. Appliances use groups to further generate a unique key for communication inside the group. Every appliance before sending consumption or control signals, encrypts the data with unique key that is automatically generated by HMS.
IEC 61850 standard transmits a message in the time limit of 4 ms, which was more suitable than the existing schemes. To overcome the time bounded activity and privacy issues in existing schemes some proposals have been outlined. In [78], an authentication scheme is proposed, which comprises two phases: registration and key agreement. In the registration phase, a secure channel is established between the substation and data center, while in the key agreement phase—on the basis of a secure channel—unique session keys are created for communication and authentication. In the key agreement phase, the substation and data center authenticate each other and then a unique session key is established on the basis of passed parameters, i.e., certificate, ID, random number, and time stamp.
Summary:Table 4 presents the summary of key generation, key updating, and key sharing in [33,55,77,78,79] schemes. Schemes in [77,78] update their secret keys, but in the schemes discussed in [33,55,79], the secret keys remain the same.

4.5. Observations

This section highlights various shortcomings of the schemes discussed under data aggregation, CIA triad and anonymity, user authenticity, and key management. According to the findings, some issues are at hardware level and we need an international standard for the equipment used for the deployment of smart grids. Moreover, the hardware cost is another issue whereby the most important is that a majority of the proposed schemes discuss only one problem—e.g., authenticity or key management—and ignore other features, especially in the HAN context. If a proposed scheme does not consider the HAN model or some of the threads, then during the implementation phase of the smart grid, it can bring a number of severe issues such as cyber security concerns at the application level.

5. Proposed Scheme

In this section, we present a privacy preserving data aggregation scheme that employs the Chinese remainder theorem, one-way hash chain, and properties of modulo n 2 to aggregate the data [68,80,81].

5.1. System Model

In the proposed model, we consider smart home appliances, a dedicated sink node, a smart meter, and a third party trusted authority.
  • Smart Home Appliances: Every smart appliance deployed in a HAN is equipped with sensing and communication equipment, which enables the sensing device to report its reading to the smart meter through a dedicated sink node. For simplicity, we can group home appliances based on their functionalities, e.g., lighting, fans, or kitchen appliances (microwave, refrigerator, toaster), etc. All devices with the same functionalities will be placed in the same group. There can be another grouping strategy such as by room with appliances as a separate group. Let us we have N number of appliances, AP. We can divide these appliances into k subsets such as G 1 , G 2 , G 3 , G 4 G k where the size of subset G i is | G i | = G i . Since the smart appliances have limited computational power, we do not apply any time consuming and computationally extensive encryption algorithms.Therefore, lightweight security mechanisms are desired for smart appliances.
  • Sink Node: First, we will make it clear, that we have a dedicated aggregator device with computational ability installed in each home. This dedicated device will be called a sink node. The sink node is really important as it acts as a relay device between home appliances and the smart meter. In particular, the sink node will aggregate the reading data from all the home appliances and forward the aggregated data to the smart meter. The sink node also applies some rules that help smart meters to identify any external attacks.
  • Smart Meter: The smart meter receives the data from the sink node and does some data analytics. Since the data comes from heterogeneous devices, it is not appropriate to directly operate on all data. Therefore, the smart meter first calculates the mean and variance for each subset, which is a group of particular appliances. For the mean, we have the following equation:
    M ( G k ) = G i ϵ G k x i / N k ;
    While for the variance, we can calculate it with:
    V a r ( G k ) = G i ϵ G k x i 2 / N k M ( G k ) 2 ;
  • Trusted Authority: Trusted authority is a trusted third party which initializes the system and manages key generation and other parameters for each entity in the network and assign keys to all the entities in the network including home appliances, sink nodes, and smart meters. Trusted authority will only be active while initiating the system and adding new appliances. It will will be offline afterwards. The trusted party will not participate in the following actions.

5.2. Threat Model

We assume that the trusted authority is a trusted third party and it will not be involved in any misconduct that can compromise the privacy of the HAN while the smart meter and sink node are honest but curious. The smart meter and sink node may be affected by undetected malware and those malware might eavesdrop on the smart appliances. The smart meter and sink node are honest, meaning that they will follow the design protocols. They are also curious, that is, they are also curious about smart appliance’s data privacy. They will not collude with each other. Smart appliances are not resourceful, so they are vulnerable to attacks. The attacks that might affect the smart appliances are false data injection by an external attacker or attacks may prevent a device from reporting readings or replay an old message. However, we have a resourceful smart meter and sink node, and the sink node will apply some techniques to check whether an appliance is malfunctioning or it is simply inactive at the time. If an appliance is inactive it will simply send a zero in its reading. The sink node can filter out the false data and will not include false data during the aggregation process.

5.3. Proposed Scheme

In this section, we present the proposed scheme, which consists of system initialization, appliance report, data aggregation, and analysis phases.

System Initialization

The trusted authority is a completely trustworthy party that starts the system. The trusted authority chooses two random prime numbers m and n, where m = 2m’ + 1 and n = 2n’ + 1 and |m| = |n| = k 0 , compute p = mn, and λ = lcm(m−1, n−1) = 2m’n’; and defines a function, as in [82]
L ( x ) = x 1 / m
Then, consider that there are N home appliances inside a HAN. The trusted authority chooses N + 2 random numbers such that
i = 0 N + 1 p i = 0 m o d λ
Suppose that there are k subgroups in the home area network and the maximum communications range for any group is [0, X j ], then we can define the range of data sensing for an appliance as X = max( X 1 , X 2 , X 3 , …, X k ). Note that, the range [0, X k ] is a small message space as compared to Z n . With this knowledge, the trusted authority chooses k + 1 prime numbers α 0 , n 1 , n 2 , n 3 , n k , and computes
R = n 1 × n 2 × × n k R i = R n i , y i 1 R i mod n i σ i = R i · y i
where all the prime numbers are of the same length, i.e., | n i | = k 1 for 1 i k . The condition of parameters is as follows (as taken from [82])
N · X 2 σ 0 , N · ( X 2 + X · σ 0 ) < n i k 1 · ( k + 1 ) + lg k < | n |
which enables us to gather all data in one cipher text. The trusted authority then chooses two secure hash functions h, H where h = ( 0 , 1 ) l and H = (0,1)* ϵ Z n * and a random number t 0 ϵ ( 0 , 1 ) l as the secret key. As the system initializes, the home appliance will report the power consumption periodically after a specific time. Thus, we divide the reporting time into w time slots for ease. At each time slot, the reporting appliance reports its reading and will send zero when a device is off or inactive. Thus, the trusted authority chooses a random number t 0 and generates a chain of N one way hash functions such as H C 1 , H C 2 , H C 3 , , H C N where each chain contains H C N = h i 1 , h i 2 , , h i w which is of length (w+1), and h i w ϵ ( 0,1 ) l is a randomly chosen number.
h i j = h ( h i ( j + 1 ) T j ) j = 0 , 1 , 2 , , w 1
For each h i j , 1 ≤ j ≤ w, the trusted authority will also compute its corresponding key
k e y i j = h ( h i j t 0 )
The proposed scheme utilizes the property of a one-time password for authentication and encryption. For that purpose, we have h i j and k e y i j in time slot T j . The header of each hash chain h 10 , h 20 , , h N 0 will be signed with α by the third party trusted authority to ensure the validity of the hash chains for authentication. The scheme employs the AES algorithm for home appliances for encrypting the reading before sending it to the sink node. We have public parameters for the system, parameter: N, n i : i = 1, 2, 3, …, k, σ j : (j = 1, 2, 3, …, k), h, H, L(x), AES. Then, we have the public parameters for the system, so we will calculate key and assign it to the network entities.
  • Every smart home appliance is assigned with a private key p i , secret hash chain H C i , corresponding keys K = k e y i 0 , k e y i 1 , k e y i 2 , …, k e y i w , and public parameter, which are shared over a secure channel.
  • Then, a random number is chosen as the shared key sk between the sink node and the smart meter, which we assign to the sink node along with signed hash chain heads h 10 , h 20 , h 30 , …, h N 0 , α , and secret key p N + 1 , t 0 and corresponding public parameters to the sink node.
  • The smart meter is assigned the same key that is shared between the sink node and the smart meter and a secret key p 0 , β , along with the public parameters.

5.4. Home Appliance Reporting

At every time slot T s , each appliance will report its reading to the sink node by calculating the following:
  • Step 1: Appliance uses its secret key p i and ( σ 0 , σ j ) to compute
    c i p = [ 1 + n · σ j · ( x i · σ 0 + x i 2 ) ] · H ( T s ) n · p i mod n 2
    and uses the key k e y i p to compute C i p = A E S k e y i p ( c i p ). This method is used to prevent any external attacker from knowing the readings or to avoid the worst-case scenario that HAN might communicate with an unauthorized or compromised sink node.
  • Step 2: A P i uses the hash value h i p from hash chain vector to compute
    m a c i p = h ( C i p | | h i p )
  • Step 3: The appliance then forwards the ( C i p , h i p , m a c i p ) to the sink node. The appliance can efficiently compute these parameters, especially if H ( T s ) n · p i is computed in advance.

5.5. Sink Node Data Aggregation

Upon receiving the ( C i p , h i p , m a c i p ) in time slot T s , the sink node checks whether the data is sent by an authenticated sender.
  • Step 1: The sink node holds h i 0 from α ; thus, the authenticity of each h i j on the hash chain H C i is simple to check. The sink node compares the freshness of the received hash value with the previously received hash values. If h i p has never been received before, h i p is accepted, otherwise, it is refused.
  • Step 2: If h i p is valid, the sink node will compute m a c i p by comparing it with the received value to check whether C i p has been altered or not.
    m a c i p = h ( C i p | | h i p )
  • Step 3: If C i p is accepted, the sink node computes k e y i p = h( h i p || t 0 ) and uses k e y i p to reproduce c i p from C i p = A E S k e y i p ( c i p ).
After verifying the encrypted readings received from all home appliances, the sink node runs the following data aggregation operation and calculates a single cipher text C p and sends ( C p , m a c p ) to the smart meter.
C p = i = 1 N c i p · H ( T s ) n · p N + 1 mod n 2 m a c s = h ( C p | | T s | | s k )

5.6. Smart Meter

Upon receiving the ( C p , m a c p ) in time slot T s , the smart meter verifies m a c p using the shared key between the sink node and smart meter, as in [82]. Then, it validates the C p . If C p is valid, the smart meter performs a report reading and analyses the received aggregated reading. Moreover, it calculates H ( T s ) n · p 0 through its secret keys. Next, the smart meter computes using the following equations (as adapted from [82])
C p = C p · H ( T s ) n · p 0 mod n 2
C p = i = 1 N c i p · H ( T s ) n · ( p 0 + p N + 1 ) mod n 2
C p = i = 1 N [ 1 + n · σ j · ( x i · σ 0 + x i 2 ) ] · H ( T s ) n · p i mod n 2 · H ( T s ) n · ( p 0 + p N + 1 ) mod n 2
C p = i = 1 N [ 1 + n · σ j · ( x i · σ 0 + x i 2 ) ] · i = 1 N + 1 H ( T s ) n · p i mod n 2
C p = i = 1 N [ 1 + n · σ j · ( x i · σ 0 + x i 2 ) ] · H ( T s ) n · i = 1 N + 1 p i mod n 2
C p = i = 1 N [ 1 + n · σ j · ( x i · σ 0 + x i 2 ) ] · H ( T s ) n · λ · k mod n 2
C p = i = 1 N [ 1 + n · σ j · ( x i · σ 0 + x i 2 ) ] mod n 2
C p = 1 + n · i = 1 N [ σ j · ( x i · σ 0 + x i 2 ) ] mod n 2
C p = 1 + n · j = 1 k σ j ( G i ϵ G j ( x i · σ 0 + x i 2 ) ) mod n 2
The smart meter has the ability to calculate its mean and variance as
M j = M mod n j = i = 1 N j ( x i · σ 0 + x i 2 )
E ( G j ) = M j ( M j mod σ 0 ) σ 0 · N j
V a r ( G j ) = M j mod σ 0 N j E ( G j ) 2

Fault Tolerance

In cases where an appliance is not reporting according to protocols, the sink node will aggregate the data received from other appliances and send the results to the smart meter and inform the smart meter that the appliance A P a is malfunctioning. The smart meter then uses the following method to calculate the mean and variance for the malfunctioning device.
  • Step 1: C p is mathematically represented as
    C p = ( 1 + n · i = 1 , i a N σ j · ( x i · σ 0 + x i 2 ) ) · i = 1 , i a N + 1 H ( T s ) n · p i mod n 2
    Therefore, the smart meter computes
    M s = C p λ mod n 2       ( 1 + n · x ) λ ( 1 + n · λ x ) mod n 2 , x λ n 1 mod n 2 = 1 + n · λ · i = 1 , i a N σ j · ( x i · σ 0 + x i 2 ) mod n 2
    and M can be calculated as
    M = M s 1 n · λ mod n mod Q
  • Step 2: Except for the subset containing malfunctioning devices, the smart meter calculates mean and variance using Equations (13) and (15).
  • Step 3: For the subset containing malfunctioning devices, the smart meter computes M b from Equation (13) and gains the mean and variance through
    E ( G b ) = M b ( M b mod σ 0 ) σ 0 · ( N b 1 )
    V a r ( G b ) = M b mod σ 0 N b 1 E ( G b ) 2
Hence, the proposed approach is still workable even if some devices are malfunctioning. As a result, the proposed approach satisfies the need for fault tolerance.

6. Security Analysis

Here, we will determine that how the proposed approach can achieve the prevention of false data injection attacks and privacy preserving data aggregation.

6.1. Prevent False Data Injection

In the proposed scheme, the trusted authority uses one-way hash function, generates hash chains, and assigns a hash chain to each device for every time slot T s . For every home appliance and for each time slot T s 1 , we have a hash value h i ( p 1 ) . From h i ( p 1 ) = h ( h i p | | T s ) , we can authenticate h i p from T s . However, because of the one-way nature of the hash function, we cannot obtain the h i p from h i ( p 1 ) . Moreover, since every device reports its reading directly to the sink node—and only if a device reports the correct data—we will receive the fresh h i p as we have assumed that the device will not act abnormally. If the h i p is not fresh in the time slot T s , it means that it has been attacked and the false data is injected externally or the device is compromised and a replay attack has been launched externally. Therefore, the sink node will reject the false data. Thus, it is ensured that the proposed scheme is resistant to false data injection attacks.

6.2. Privacy Preserving

In the proposed scheme, if we consider the encrypted text by a home appliance
c i p = [ 1 + n · σ j · ( x i · σ 0 + x i 2 ) ] · H ( T s ) n · p i mod n 2
and that of the aggregated cipher text [82]
C p * = 1 + n · i = 1 , i a N σ j * · ( x i · σ 0 + x i 2 ) · i = 1 , i a N + 1 H ( T s ) n · p i mod n 2
and take σ j · ( x i · σ 0 + x i 2 ) as a m e s s a g e ¯ and · H ( T s ) · p i as a random number r a n d ¯ and i = 1 , i a N σ j * · ( x i · σ 0 + x i 2 ) as M e s s a g e ¯ and i = 1 , i a N + 1 H ( T s ) · p i as R a n d ¯ then
c i p = [ 1 + n · m e s s a g e ¯ ] · r a n d ¯ n mod n 2
and
C p * = 1 + n · M e s s a g e ¯ · R a n d ¯ n mod n 2
are valid Paillier ciphers. Under the chosen plaintext attack, Paillier encryption is indistinguishable, and an external attacker cannot obtain the exact message. The sink node may be curious about the exact message. However, without the knowledge of secret keys p 0 and λ , the sink node has no knowledge of the information. Whereas the smart meter can recover M e s s a g e ¯ and may want to recover the message sent by individual devices. For that purpose, it has to collude with the sink node, which is not possible under the threat model. Hence, the suggested technique protects aggregated data privacy.

7. Performance Evaluation

In this section, we analyze the communication and processing overhead of household appliances, sink nodes, and smart meters.

7.1. Communication Overhead

The proposed privacy preserving scheme aggregates the data from different subsets into one and the smart meter can recover the mean and variance of the individual subset. To demonstrate the efficiency of the proposed technique, we compare it to the basic Paillier encryption [80] in which the bit length of n 2 is 2048 and that of n is 1024. Therefore, the communication overhead from N devices to sink node is 2048 × N bits, because each home appliance encrypts both x i and x i 2 into one cipher text, as shown in Equation (9). However, because the data in the BPE is encrypted into two cipher texts, the transmission cost is doubled, and the overhead is 4096 × N bits.
In the proposed scheme, the sink node and smart meter are independent of the number of devices as the aggregation is undertaken at the sink node. In BPE, the communications cost is dependent on the number of subsets. If there are k subsets, then the communications cost is 4096 × k bits, while in the proposed scheme, all data have been aggregated in one cipher text. Therefore, the communications overhead from the sink node to the SM is only 2048 bits. Figure 2 plots a graph for the communications overhead from the home appliances to the sink node, and Figure 3 shows the communications overhead pattern of the sink node to the SM. As a result, it is obvious that the suggested method is superior to BPE in terms of communication costs. We use the Chinese remainder theorem that enables a careful parameter choice and, hence, in real-time scenarios the message size is small.

7.2. Computation Overhead

The suggested system is lightweight in terms of communication costs since we only use the time-consuming modulo operation, and each node in the network, such as a sink node, a smart meter, and a home appliance, has at least one modulo operation. The proposed approach will become more efficient if the modulo exponent is computed ahead of time.

8. Future Directions and Challenges

In this paper, we have discussed smart grids and the relation among different entities of the smart grid and how they interact with each other. After that, we reviewed the literature regarding countermeasures to the posed threats and discussed some promising solutions that are suggested in order to overcome privacy related issues and threats. Lastly, we proposed a novel privacy preservation scheme for HANs. To complete the effort, we have devised a direction for future research and challenges, which are discussed below.

8.1. A Safe and Secure Trust Mechanism for Home Incumbents in Smart Grid

As discussed in Section 1, smart grids work through the coordination of different entities. The smart gird is a network of different entities and different subnetworks working together. Each entity and subnetwork has its own requirements. The continuous communication is essential to ensure the smart grid remains active. Iinteroperable and uninterrupted communication between the different subnetworks is an intimidating task. Therefore, a universal standardized trusted framework is essential for any communication.

8.2. Government Authorities to Regulate and Maintain Smart Grids

Most of the research work performed is voluntary and in order to make smart grids a success, it is necessary to have a government authority to evaluate the standard and conformity of the research undertaken on smart grids. Thus, the authorities can make the necessary decisions and improvements needed to regulate smart grids.

8.3. New Goals and Standards to Evaluate Privacy Preserving Mechanism and Solution

The authorities should set standards and new metrics to evaluate any new research or protocols. Each new research idea should be evaluated on common standards and then a decision should be made whether to make it a standard or revise an old standard.

8.4. Legal Code for Preserving the Privacy

A legal framework through the contributions of both governments and business authorities should be made to protect the privacy of consumers and other network entities. The legal framework would help to set the standard to what extent a user’s data can be collected and how it can be manipulated to further increase the efficiency of the smart grid. In cases of breach of this contract, the legal framework should outline what the consequences would be faced by the entity breaching the contract.

8.5. A Framework for Aggregation without Third Party Involvement

The third-party involvement in the aggregation can be compromised anytime. A scheme should be devised that could aggregate the data without knowing the meaning of the aggregated data that could not harm or lead the smart grid to instability.

9. Conclusions

We proposed a novel privacy-preserving data aggregation approach for HANs in a smart grid in this paper. The proposed approach deploys a sink node between the household appliances and the smart meter, which not only filters false data injection attacks but also provides for early fault tolerance. The technology also combines data from several home appliances, which may belong to distinct subsets, into a single stream and sends it to the smart meter. The suggested technique is secure, and the performance evaluation reveals that it is more efficient in terms of communications and computation overhead than aggregation using basic Paillier encryption. Detecting and avoiding new threats, IDS architectures for smart grid privacy, IoT-driven smart grids, new privacy metrics, and privacy for IoT are all demanding research fields that need to be further explored in the future.

Author Contributions

Conceptualization, W.A., I.U.D., and A.A.; methodology, I.U.D. and A.A.; software, W.A.; validation, A.A.; formal analysis, I.U.D. and B.-S.K.; investigation, A.A. and B.-S.K.; resources, B.-S.K.; data curation, W.A.; writing—original draft preparation, W.A.; writing—review and editing, I.U.D. and A.A.; visualization, B.-S.K. and A.A.; supervision, I.U.D.; project administration, A.A.; funding acquisition, B.-S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Research Foundation (NRF), Korea, under Project BK21 FOUR (F21YY8102068) and in part by King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Project Number RSP-2021/184.

Acknowledgments

This work was supported in part by the National Research Foundation (NRF), Korea, under Project BK21 FOUR (F21YY8102068) and in part by King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Project Number RSP-2021/184.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

AbbreviationDefinition
ADDMDistributed State Estimation
Aggr:Aggregator
Auth:Authentication
BANBuilding area network
BPEBasic Paillier Encryption
CCControl center
CIAConfidentiality, integrity, and availability
COTClouds-of-things
COT-HANCOT home-area-network
DDOSDenial-of-service attack
DRDemand respond
EPPAEfficient Privacy-Preserving Aggregation
HANHome-area-network
H-MACHashed based MAC
HMSHome management system
IBSIdentity based signature
IDIdentification
KMPKey-Management protocol
LAKALightweight Authentication key agreement
LPPSLightweight privacy preservation
LWPPSLightweight-privacy-preserving
MACMessage authentication code
MLANMetropolitan LAN
MLTDMultidimensional aggregation
MPCMultiparty computations
NANNeighbour area network
PALKPassword-based anonymous lightweight key
PKPrivate key
PPCRPrivacy-preserving cheat resilient
PPMAPrivacy-preserving multi-subset
PSPower supplier
PUCPhysical unclonable function
SASmart Appliance
SGSmart grid
SMSmart meter
SPService provider
TAIThreshold-Based Anonymous Identification
TTPTrusted third party
WANWide area network

References

  1. Bagri, D.; Rathore, S.K. Research Issues Based on Comparative Work Related to Data Security and Privacy Preservation in Smart Grid. In Proceedings of the 2018 4th IEEE International Conference on Computing Sciences (ICCS), Phagwara, India, 30–31 August 2018; pp. 88–91. [Google Scholar]
  2. Dileep, G. A survey on smart grid technologies and applications. Renew. Energy 2020, 146, 2589–2625. [Google Scholar] [CrossRef]
  3. Lopez, G.; Matanza, J.; De La Vega, D.; Castro, M.; Arrinda, A.; Moreno, J.I.; Sendin, A. The role of power line communications in the smart grid revisited: Applications, challenges, and research initiatives. IEEE Access 2019, 7, 117346–117368. [Google Scholar] [CrossRef]
  4. Saxena, N.; Choi, B.J. Integrated distributed authentication protocol for smart grid communications. IEEE Syst. J. 2016, 12, 2545–2556. [Google Scholar] [CrossRef]
  5. Boyapally, H.; Mathew, P.; Patranabis, S.; Chatterjee, U.; Agarwal, U.; Maheshwari, M.; Dey, S.; Mukhopadhyay, D. Safe is the new Smart: PUF-based Authentication for Load Modification-Resistant Smart Meters. IEEE Trans. Dependable Secur. Comput. 2020, 19, 663–680. [Google Scholar]
  6. Greer, C.; Wollman, D.; Prochaska, D.; Boynton, P.; Mazer, J.; Nguyen, C.; FitzPatrick, G.; Nelson, T.; Koepke, G.; Hefner, A., Jr.; et al. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0, Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD. 2014. Available online: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=916755 (accessed on 2 December 2021). [CrossRef]
  7. Kumar, A.; Agarwal, A. Research issues related to cryptography algorithms and key generation for smart grid: A survey. In Proceedings of the 2016 7th IEEE India International Conference on Power Electronics (IICPE), Patiala, India, 17–19 November 2016; pp. 1–5. [Google Scholar]
  8. Alahakoon, D.; Yu, X. Smart electricity meter data intelligence for future energy systems: A survey. IEEE Trans. Ind. Inform. 2015, 12, 425–436. [Google Scholar] [CrossRef]
  9. Alamatsaz, N.; Boustani, A.; Jadliwala, M.; Namboodiri, V. Agsec: Secure and efficient cdma-based aggregation for smart metering systems. In Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2014; pp. 489–494. [Google Scholar]
  10. Kumar, P.; Lin, Y.; Bai, G.; Paverd, A.; Dong, J.S.; Martin, A. Smart grid metering networks: A survey on security, privacy and open research issues. IEEE Commun. Surv. Tutorials 2019, 21, 2886–2927. [Google Scholar] [CrossRef] [Green Version]
  11. Desai, S.; Alhadad, R.; Chilamkurti, N.; Mahmood, A. A survey of privacy preserving schemes in IoE enabled smart grid advanced metering infrastructure. Clust. Comput. 2019, 22, 43–69. [Google Scholar] [CrossRef]
  12. Llaria, A.; Dos Santos, J.; Terrasson, G.; Boussaada, Z.; Merlo, C.; Curea, O. Intelligent Buildings in Smart Grids: A Survey on Security and Privacy Issues Related to Energy Management. Energies 2021, 14, 2733. [Google Scholar] [CrossRef]
  13. Tan, S.; De, D.; Song, W.Z.; Yang, J.; Das, S.K. Survey of security advances in smart grid: A data driven approach. IEEE Commun. Surv. Tutorials 2016, 19, 397–422. [Google Scholar] [CrossRef]
  14. Ferrag, M.A.; Babaghayou, M.; Yazici, M.A. Cyber security for fog-based smart grid SCADA systems: Solutions and challenges. J. Inf. Secur. Appl. 2020, 52, 102500. [Google Scholar] [CrossRef]
  15. Guan, Z.; Zhang, Y.; Zhu, L.; Wu, L.; Yu, S. EFFECT: An efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 2019, 62, 32103. [Google Scholar] [CrossRef] [Green Version]
  16. Abdallah, A.; Shen, X.S. A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans. Smart Grid 2016, 9, 396–405. [Google Scholar] [CrossRef]
  17. Akila, V.; Sheela, T. Preserving data and key privacy in Data Aggregation for Wireless Sensor Networks. In Proceedings of the 2017 2nd IEEE International Conference on Computing and Communications Technologies (ICCCT), Russia, Moscow, 20–22 September 2017; pp. 282–287. [Google Scholar]
  18. Kement, C.E.; Gultekin, H.; Tavli, B. A Holistic Analysis of Privacy Aware Smart Grid Demand Response. IEEE Trans. Ind. Electron. 2020, 68, 7631–7641. [Google Scholar] [CrossRef]
  19. Chen, Z.; Wu, L. Residential appliance DR energy management with electric privacy protection by online stochastic optimization. IEEE Trans. Smart Grid 2013, 4, 1861–1869. [Google Scholar] [CrossRef]
  20. Liu, Y.; Guo, W.; Fan, C.I.; Chang, L.; Cheng, C. A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Ind. Inform. 2018, 15, 1767–1774. [Google Scholar] [CrossRef]
  21. Kong, W.; Shen, J.; Vijayakumar, P.; Cho, Y.; Chang, V. A practical group blind signature scheme for privacy protection in smart grid. J. Parallel Distrib. Comput. 2020, 136, 29–39. [Google Scholar] [CrossRef]
  22. Yip, S.C.; Wong, K.; Phan, R.C.W.; Tan, S.W.; Ku, I.; Hew, W.P. A Privacy-Preserving and Cheat-Resilient electricity consumption reporting Scheme for smart grids. In Proceedings of the 2014 IEEE International Conference on Computer, Information and Telecommunication Systems (CITS), Jeju, Korea, 7–9 July 2014; pp. 1–5. [Google Scholar]
  23. Diao, F.; Zhang, F.; Cheng, X. A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans. Smart Grid 2014, 6, 461–467. [Google Scholar] [CrossRef]
  24. Asghar, M.R.; Dán, G.; Miorandi, D.; Chlamtac, I. Smart meter data privacy: A survey. IEEE Commun. Surv. Tutorials 2017, 19, 2820–2835. [Google Scholar] [CrossRef]
  25. Bedi, G.; Venayagamoorthy, G.K.; Singh, R. Internet of Things (IoT) sensors for smart home electric energy usage management. In Proceedings of the 2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), St. Gallen, Switzerland, 16–19 December 2016; pp. 1–6. [Google Scholar]
  26. Gholinejad, H.R.; Loni, A.; Adabi, J.; Marzband, M. A hierarchical energy management system for multiple home energy hubs in neighborhood grids. J. Build. Eng. 2020, 28, 101028. [Google Scholar] [CrossRef]
  27. Son, Y.S.; Pulkkinen, T.; Moon, K.D.; Kim, C. Home energy management system based on power line communication. IEEE Trans. Consum. Electron. 2010, 56, 1380–1386. [Google Scholar] [CrossRef]
  28. Chen, Y.; Martínez-Ortega, J.F.; Castillejo, P.; López, L. A homomorphic-based multiple data aggregation scheme for smart grid. IEEE Sens. J. 2019, 19, 3921–3929. [Google Scholar] [CrossRef] [Green Version]
  29. Agarkar, A.; Agrawal, H. R-LWE based lightweight privacy preserving scheme for Smart Grid. In Proceedings of the 2016 IEEE International Conference on Computing, Analytics and Security Trends (CAST), Pune, India, 19–21 December 2016; pp. 410–415. [Google Scholar]
  30. Yan, Y.; Qian, Y.; Sharif, H. A secure data aggregation and dispatch scheme for home area networks in smart grid. In Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, Houston, TX, USA, 5–9 December 2011; pp. 1–6. [Google Scholar]
  31. Tizazu, G.A.; Hussen, H.R.; Kim, K.H. Secure session key exchange scheme for smart grid home area networks. In Proceedings of the 2013 IEEE International Conference on ICT Convergence (ICTC), Jeju Island, Korea, 20–22 October 2013; pp. 1116–1120. [Google Scholar]
  32. Komninos, N.; Philippou, E.; Pitsillides, A. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Commun. Surv. Tutorials 2014, 16, 1933–1954. [Google Scholar] [CrossRef]
  33. Alohali, B.; Merabti, M.; Kifayat, K. A secure scheme for a smart house based on Cloud of Things (CoT). In Proceedings of the 2014 6th IEEE Computer Science and Electronic Engineering Conference (CEEC), Colchester, UK, 25–26 September 2014; pp. 115–120. [Google Scholar]
  34. Li, T.; Ren, J.; Tang, X. Secure wireless monitoring and control systems for smart grid and smart home. IEEE Wirel. Commun. 2012, 19, 66–73. [Google Scholar]
  35. Gong, H.; Ionel, D.M. Optimization of Aggregated EV Power in Residential Communities with Smart Homes. In Proceedings of the 2020 IEEE Transportation Electrification Conference & Expo (ITEC), Chicago, IL, USA, 23–26 June 2020; pp. 779–782. [Google Scholar]
  36. Martins, P.E.T.; Oleskovicz, M.; da Silva Pessoa, A.L. A Survey on Smart Grids: Concerns, advances, and trends. In Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), Gramado City, Brazil, 15–18 September 2019; pp. 1–6. [Google Scholar]
  37. Molderink, A.; Bakker, V.; Bosman, M.G.; Hurink, J.L.; Smit, G.J. Domestic energy management methodology for optimizing efficiency in smart grids. In Proceedings of the 2009 IEEE Bucharest PowerTech, Bucharest, Romania, 28 June–2 July 2009; pp. 1–7. [Google Scholar]
  38. Thomas, D.; Deblecker, O.; Ioakimidis, C.S. Optimal operation of an energy management system for a grid-connected smart building considering photovoltaics’ uncertainty and stochastic electric vehicles’ driving schedule. Appl. Energy 2018, 210, 1188–1206. [Google Scholar] [CrossRef]
  39. Shakeri, M.; Pasupuleti, J.; Amin, N.; Rokonuzzaman, M.; Low, F.W.; Yaw, C.T.; Asim, N.; Samsudin, N.A.; Tiong, S.K.; Hen, C.K.; et al. An Overview of the Building Energy Management System Considering the Demand Response Programs, Smart Strategies and Smart Grid. Energies 2020, 13, 3299. [Google Scholar] [CrossRef]
  40. Pindoriya, N.M.; Dasgupta, D.; Srinivasan, D.; Carvalho, M. Infrastructure security for smart electric grids: A survey. In Optimization and Security Challenges in Smart Power Grids; Springer: Berlin/Heidelberg, Germany, 2013; pp. 161–180. [Google Scholar]
  41. Walgama, S.; Hasinthara, U.; Herath, A.; Daranagama, K.; Kumarawadu, S. An Optimal Electrical Energy Management Scheme for Future Smart Homes. In Proceedings of the 2020 IEEE 8th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 12–14 August 2020; pp. 137–141. [Google Scholar]
  42. Paukstadt, U. A Survey of Smart Energy Services for Private Households. In Proceedings of the 14th International Conference on Wirtschaftsinformatik, Siegen, Germany, 24–27 February 2019; pp. 1448–1462. [Google Scholar]
  43. Li, H.; Lu, R.; Zhou, L.; Yang, B.; Shen, X. An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 2013, 8, 655–663. [Google Scholar] [CrossRef]
  44. Shen, H.; Liu, Y.; Xia, Z.; Zhang, M. An Efficient Aggregation Scheme Resisting on Malicious Data Mining Attacks for Smart Grid. Inf. Sci. 2020, 526, 289–300. [Google Scholar] [CrossRef]
  45. Fan, X.; Gong, G. Security challenges in smart-grid metering and control systems. Technol. Innov. Manag. Rev. 2013, 3, 42–49. [Google Scholar] [CrossRef]
  46. Ge, L.; Yu, W.; Moulema, P.; Xu, G.; Griffith, D.; Golmie, N. Detecting Data Integrity Attacks in Smart Grid. Secur. Priv. Cyber-Phys. Syst. Found. Princ. Appl. 2017, 281–303. [Google Scholar] [CrossRef]
  47. Sui, Z.; Niedermeier, M. TAI: A threshold-based anonymous identification scheme for demand-response in smart grids. IEEE Trans. Smart Grid 2016, 9, 3496–3506. [Google Scholar] [CrossRef]
  48. Kumar, P.; Braeken, A.; Gurtov, A.; Iinatti, J.; Ha, P.H. Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 2017, 12, 968–979. [Google Scholar] [CrossRef] [Green Version]
  49. Khan, A.A.; Kumar, V.; Ahmad, M.; Rana, S.; Mishra, D. PALK: Password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 2020, 121, 106121. [Google Scholar] [CrossRef]
  50. Kim, M. A survey on guaranteeing availability in smart grid communications. In Proceedings of the 2012 14th IEEE International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea, 19–22 February 2012; pp. 314–317. [Google Scholar]
  51. Du, D.; Li, X.; Li, W.; Chen, R.; Fei, M.; Wu, L. ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1698–1711. [Google Scholar] [CrossRef]
  52. Wang, K.; Du, M.; Maharjan, S.; Sun, Y. Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 2017, 8, 2474–2482. [Google Scholar] [CrossRef]
  53. Mahmud, R.; Vallakati, R.; Mukherjee, A.; Ranganathan, P.; Nejadpak, A. A survey on smart grid metering infrastructures: Threats and solutions. In Proceedings of the 2015 IEEE International Conference on Electro/Information Technology (EIT), DeKalb, IL, USA, 21–23 May 2015; pp. 386–391. [Google Scholar]
  54. Peng, C.; Sun, H.; Yang, M.; Wang, Y.L. A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1554–1569. [Google Scholar] [CrossRef]
  55. Kumar, P.; Gurtov, A.; Sain, M.; Martin, A.; Ha, P.H. Lightweight authentication and key agreement for smart metering in smart energy networks. IEEE Trans. Smart Grid 2018, 10, 4349–4359. [Google Scholar] [CrossRef] [Green Version]
  56. Depuru, S.S.S.R.; Wang, L.; Devabhaktuni, V.; Gudi, N. Smart meters for power grid—Challenges, issues, advantages and status. In Proceedings of the 2011 IEEE/PES Power Systems Conference and Exposition, Phoenix, AZ, USA, 20–23 March 2011; pp. 1–7. [Google Scholar]
  57. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A survey on smart grid communication infrastructures: Motivations, requirements and challenges. IEEE Commun. Surv. Tutorials 2012, 15, 5–20. [Google Scholar] [CrossRef] [Green Version]
  58. Rehmani, M.H.; Davy, A.; Jennings, B.; Assi, C. Software defined networks-based smart grid communication: A comprehensive survey. IEEE Commun. Surv. Tutorials 2019, 21, 2637–2670. [Google Scholar] [CrossRef]
  59. Zafar, U.; Bayhan, S.; Sanfilippo, A. Home energy management system concepts, configurations, and technologies for the smart grid. IEEE Access 2020, 8, 119271–119286. [Google Scholar] [CrossRef]
  60. Saleem, Y.; Crespi, N.; Rehmani, M.H.; Copeland, R. Internet of things-aided smart grid: Technologies, architectures, applications, prototypes, and future research directions. IEEE Access 2019, 7, 62962–63003. [Google Scholar] [CrossRef]
  61. Syed, D.; Zainab, A.; Ghrayeb, A.; Refaat, S.S.; Abu-Rub, H.; Bouhali, O. Smart grid big data analytics: Survey of technologies, techniques, and applications. IEEE Access 2020, 9, 59564–59585. [Google Scholar] [CrossRef]
  62. Hu, S.; Chen, X.; Ni, W.; Wang, X.; Hossain, E. Modeling and analysis of energy harvesting and smart grid-powered wireless communication networks: A contemporary survey. IEEE Trans. Green Commun. Netw. 2020, 4, 461–496. [Google Scholar] [CrossRef]
  63. Abir, S.A.A.; Anwar, A.; Choi, J.; Kayes, A. IoT-Enabled Smart Energy Grid: Applications and Challenges. IEEE Access 2021, 9, 50961–50981. [Google Scholar] [CrossRef]
  64. Hanganu, C.; Chcnaru, O.; Ichim, L.; Popescu, D. Efficient Solution for Smart Home Applications. In Proceedings of the 2018 26th IEEE Telecommunications Forum (TELFOR), Belgrade, Serbia, 20–21 November 2018; pp. 1–4. [Google Scholar]
  65. Wagh, G.S.; Gupta, S.; Mishra, S. A distributed privacy preserving framework for the Smart Grid. In Proceedings of the 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Delft, The Netherlands, 17–20 February 2020; pp. 1–5. [Google Scholar]
  66. Ming, Y.; Zhang, X.; Shen, X. Efficient privacy-preserving multi-dimensional data aggregation scheme in smart grid. IEEE Access 2019, 7, 32907–32921. [Google Scholar] [CrossRef]
  67. Mustafa, M.A.; Cleemput, S.; Aly, A.; Abidin, A. A secure and privacy-preserving protocol for smart metering operational data collection. IEEE Trans. Smart Grid 2019, 10, 6481–6490. [Google Scholar] [CrossRef] [Green Version]
  68. Li, S.; Xue, K.; Yang, Q.; Hong, P. PPMA: Privacy-preserving multisubset data aggregation in smart grid. IEEE Trans. Ind. Inform. 2017, 14, 462–471. [Google Scholar] [CrossRef]
  69. Wang, Z.; Liu, Y.; Ma, Z.; Liu, X.; Ma, J. LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid. IEEE Internet Things J. 2020, 7, 3935–3947. [Google Scholar] [CrossRef]
  70. Zeng, X.; Liu, Q.; Huang, H.; Jia, X. A lightweight privacy-preserving scheme for metering data collection in smart grid. In Proceedings of the 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Macau, China, 12–15 June 2017; pp. 1–6. [Google Scholar]
  71. Alfakeeh, A.S.; Khan, S.; Al-Bayatti, A.H. A Multi-User, Single-Authentication Protocol for Smart Grid Architectures. Sensors 2020, 20, 1581. [Google Scholar] [CrossRef] [Green Version]
  72. Jo, M.; Jangirala, S.; Das, A.K.; Li, X.; Khan, M.K. Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for IoT-Enabled Smart Grid Systems. IEEE Trans. Ind. Inform. 2020, 17, 4425–4436. [Google Scholar]
  73. Kaveh, M.; Mosavi, M.R. A Lightweight Mutual Authentication for Smart Grid Neighborhood Area Network Communications Based on Physically Unclonable Function. IEEE Syst. J. 2020, 14, 4535–4544. [Google Scholar] [CrossRef]
  74. Kumar, N.; Aujla, G.S.; Das, A.K.; Conti, M. ECCAuth: A secure authentication protocol for demand response management in a smart grid system. IEEE Trans. Ind. Inform. 2019, 15, 6572–6582. [Google Scholar] [CrossRef]
  75. Mahmood, K.; Li, X.; Chaudhry, S.A.; Naqvi, H.; Kumari, S.; Sangaiah, A.K.; Rodrigues, J.J. Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Gener. Comput. Syst. 2018, 88, 491–500. [Google Scholar] [CrossRef]
  76. Ghosal, A.; Conti, M. Key management systems for smart grid advanced metering infrastructure: A survey. IEEE Commun. Surv. Tutorials 2019, 21, 2831–2848. [Google Scholar] [CrossRef] [Green Version]
  77. Alohali, B.; Merabti, M.; Kifayat, K. A cloud of things (cot) based security for home area network (han) in the smart grid. In Proceedings of the 2014 Eighth IEEE International Conference on Next Generation Mobile Apps, Services and Technologies, Oxford, UK, 10–12 September 2014; pp. 326–330. [Google Scholar]
  78. Moghadam, M.F.; Nikooghadam, M.; Mohajerzadeh, A.H.; Movali, B. A lightweight key management protocol for secure communication in smart grids. Electr. Power Syst. Res. 2020, 178, 106024. [Google Scholar] [CrossRef]
  79. Qi, M.; Chen, J. Two-Pass Privacy Preserving Authenticated Key Agreement Scheme for Smart Grid. IEEE Syst. J. 2020, 15, 3201–3207. [Google Scholar] [CrossRef]
  80. Lu, R.; Liang, X.; Li, X.; Lin, X.; Shen, X. EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1621–1631. [Google Scholar]
  81. Shen, H.; Zhang, M.; Shen, J. Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1369–1381. [Google Scholar] [CrossRef]
  82. Lu, R.; Heung, K.; Lashkari, A.H.; Ghorbani, A.A. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 2017, 5, 3302–3312. [Google Scholar] [CrossRef]
Figure 1. A home area network.
Figure 1. A home area network.
Sensors 22 02269 g001
Figure 2. Communication overhead from home appliances to sink node.
Figure 2. Communication overhead from home appliances to sink node.
Sensors 22 02269 g002
Figure 3. Communication overhead from sink node to smart meter.
Figure 3. Communication overhead from sink node to smart meter.
Sensors 22 02269 g003
Table 1. Comparison of data aggregation schemes.
Table 1. Comparison of data aggregation schemes.
SchemesTechnique UsedAppliances Aggr:SM Aggr:Separate Device for Aggr:CC Aggr:Descriptions
[67]MPCNoNoNoYesPros: Used multiparty computation scheme, universal composition, deals multiple recipients, create subsets of SMs, and fault tolerant.
Cons: Cost of communication server and communication overhead.
[22]PPCRNoNoYesYesPros: Incremental-hash function used and only cost of consumption is circulated.
Cons: Aggregation performed by an outside device, i.e., operation center. Did not address various attacks, key generation, and authenticity.
[65]Distributed aggregationNoNoYesNoPros: Grouping, each group has an aggregator, and slices send randomly to the multiple group aggregator.
Cons: Creation of groups, selection of group header, reassembling of various slices at the CC end, and communication overhead.
[30]In-network aggregationYesNoNoNoPros: Before installation devices are authenticated, hop-by-hop aggregation.
Cons: Creation of chip codes, computation burden, and no procedure to update key.
[66]MLTDNoNoYesYesPros: Blinding factor generated by TTP, provides unforgeability, resistant to MIMT, alteration, and spoofing.
Cons: A separate device for aggregation is an issue, provides computation and communication overhead, and did not provide key generation and updating process.
Table 2. Comparative analysis of CIA models and anonymity.
Table 2. Comparative analysis of CIA models and anonymity.
Ref.MethodConfidentialityIntegrityAvailabilityAnonymityDescription
[68]PPMAYesYesNoNoPros: Uses Paillier cryptography, provides individual privacy, and creates parameters for key generation.
Cons: Shares key parameters on wireless media, uses external device for aggregation, and does not discuss availability and various attacks.
[69]LiPSGYesYesNoNoPros: Uses Q-learning, good at computation, and splits energy consumption into two subsets.
Cons: Depends on third party server, does not discuss attacks, and has no aggregation point.
[16]Lattic based schemeYesYesNoNoPros: Aggregation performed by every device in rounds, every sender is authenticated by receiver, and except CC, no one can decrypt consumption.
Cons: Outside network third party issues appliance ID and generates keys and the key remains the same.
[21]Blind signatureYesYesYesNoPros: Creation of blocks, shares key material instead of secret keys, and provides anonymity and traceability.
Cons: Ignores smart appliances, has no mechanism for key updating, has no verification of authenticity inside homes, and computes overhead at CC end.
[70]LWPPSYesYesNoNoPros: Shares key material instead of private key, does not involve a third party, and performs encryption and decryption at the CC end.
Cons: CC sends request message, communications overhead, and does not explain threat model and authenticity.
Table 3. Summary of authentication schemes.
Table 3. Summary of authentication schemes.
SchemeAppliances Auth:SM Auth:CC Auth:Descriptions
Schnorr’s signature [72]NoNoYesPros: Uses Schnorr’s signature for authentication and key agreement, low communications and computation cost, and updating secret as well as session keys after intervals.
Cons: The process of registration is performed by third party, TA. It does not discuss HAN and appliances. No mechanism is defined for aggregation.
EFFECT [15]NoYesYesPros: Introduces a threshold value for data aggregation. Provides integrity, authenticity, and availability.
Cons: The TCA sets up the whole architecture, is responsible for key generation, aggregation, and selection of gateways. Increases computation by using secret sharing.
PUC [73]NoYesNoPros: Prevents inside and outside attacks. Detects any attack easily using PUF.
Cons: The whole functioning of SM fails if anyone tries a physical attack. Has an expensive chip and lengthy process of initial registration.
Blind signature [21]NoYesYesPros: Creates blocks, shares key material instead of secret keys, and provides anonymity and traceability.
Cons: Ignores smart appliances, no mechanism for key updating, authenticity is verified outside the home, and computation overhead at the CC end.
ECCAuth [74]NoYesYesPros: Proposes real model with mutual authentication of devices locally and globally.
Cons: High in computation and does not address anonymity and denial of service attacks.
IBS [75]NoYesYesPros: Minimum role of TTP. TTP is only involved in initial registration, key generation, and parameter creation. Provides anonymity, authenticity, traceability, and confidentiality.
Cons: Does not explain how to update the private key, aggregation, and DDos attacks. Requires higher computation resources and scalability.
Table 4. Comparative analysis of key management schemes.
Table 4. Comparative analysis of key management schemes.
SchemeKey GenerationKey SharingKey UpdatingDescription
COT [77]YesNoYesPros: IoMT-based HAN structure, based on mesh topology with a single source of energy collection.
Cons: Selection of header for group and TA authenticate home appliances.
LAKA [55]YesYesNoPros: Lower communication overhead, provides mutual authentication, and key generation and anonymity.
Cons: Ignores appliances operations and no key updating and traceability.
KMP [79]YesNoNoPros: Uses elliptic curve, provides session key agreement, and used less communication and computation overhead.
Cons: Involves a third party for authentication, no key updating, traceability, and anonymity.
IEC [78]YesNoYesPros: Updates IEC 62,351 standard with respect to symmetric key encryption and creates session key with a transmission of message within 4 ms.
Cons: No mechanism for data aggregation or communication overhead.
COT-HAN [33]YesYesNoPros: The HAN architecture is based on HMS and cloud based infrastructure and a cell phone has the authority to access cloud services.
Cons: SM is not considered part of the HMS; no proper structure for authentication and the symmetric key value remains the same; vulnerable to MIMA, DDoS, and alteration attacks; and no aggregation point.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ali, W.; Din, I.U.; Almogren, A.; Kim, B.-S. A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks. Sensors 2022, 22, 2269. https://doi.org/10.3390/s22062269

AMA Style

Ali W, Din IU, Almogren A, Kim B-S. A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks. Sensors. 2022; 22(6):2269. https://doi.org/10.3390/s22062269

Chicago/Turabian Style

Ali, Wajahat, Ikram Ud Din, Ahmad Almogren, and Byung-Seo Kim. 2022. "A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks" Sensors 22, no. 6: 2269. https://doi.org/10.3390/s22062269

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop