Next Article in Journal
DV-Hop Algorithm Based on Multi-Objective Salp Swarm Algorithm Optimization
Previous Article in Journal
Feature Papers in Optical Sensors 2022
Previous Article in Special Issue
False Data Injection Impact on High RES Power Systems with Centralized Voltage Regulation Architecture
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Privacy Preservation in Smart Meters: Current Status, Challenges and Future Directions

School of Information Technology, Deakin University, Geelong, VIC 3220, Australia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(7), 3697; https://doi.org/10.3390/s23073697
Submission received: 16 February 2023 / Revised: 27 March 2023 / Accepted: 30 March 2023 / Published: 3 April 2023
(This article belongs to the Special Issue Smart Grids and Green Communications)

Abstract

:
Recent years have seen the rapid development of technologies in Smart Grids (SGs) to enhance electricity networks with digital and data communication technologies. SGs can proactively detect, react, and respond to dynamic changes in the network. SGs can also enhance the efficiency and reliability of electricity supplies and promote the integration of renewable energy sources. Smart Meters (SMs) are often seen as the first step to a successful implementation of SGs. While SMs enable Utility Providers and consumers to obtain near real-time information of energy consumption, they can also be exploited to infer sensitive consumer data. Therefore, privacy preservation in SMs is paramount in ensuring the widespread and successful deployment of SGs. In this paper, we present a comprehensive survey of the state-of-the-art SM privacy-preserving techniques published in the literature over the past decade. We categorize these techniques based on the attack types and their objectives. We aim to offer a unique perspective in this survey article through the lens of privacy preservation, cross-cutting the wide range of techniques presented in the literature. We conclude by identifying the challenges and highlighting key future research directions in the field.

1. Introduction

In recent years, we have witnessed the rapid development of technologies to support the deployment of Smart Grids (SGs) at scale. SG is a modernized form of power grid that uses advanced communication technologies and information control to achieve two-way information and electricity exchange between consumers and Utility Providers (UPs). SGs aim to seamlessly integrate various technologies to enable consumers and UPs to perform near real-time monitoring of energy consumption, transmission, and generation. This requires the collection of a large amount of data, leading to many data management challenges, one of the most important being the preservation of consumer privacy [1,2,3,4].
Smart Meters (SM) are one of the core SG elements and are often seen as the first step towards the successful implementation of SGs. A compromise in SMs will have serious consequences across the entire SG. SMs enable two-way communication between consumers and the UPs. They can measure and report electricity consumption data in near real-time. An SM enables the UP to optimize and control the distribution and supply of electricity. It also helps to balance the load through the Demand Response (DR) and provides new services for consumers.
SMs can also be used to report the quality of power delivery and detect power outages. High-resolution SM data can be used for dynamic pricing, fraud detection, and demand forecasting in SGs [5]. However, this can lead to a compromise in consumer privacy if these data are not managed properly. For example, an external party can identify individual appliance usage by using Non-Intrusive Load Monitoring (NILM) to analyse SM data.
Sensitive and personal information, such as appliances types/brands, consumer household sizes, age groups, and daily routines, can also be inferred. This information can be leveraged by various companies for targeted advertisements, and more seriously, be exploited by cyber-attackers and adversaries. SM privacy remains one of the most significant challenges that hinders the successful roll-out of SGs in many countries [6].
There is a rich amount of literature that presents a wide variety of techniques to enhance the performance and usability of SMs in SGs. A recent notable survey paper [7] comprehensively reviewed smart meter data analytics from the application perspective. The works of [8,9,10,11,12,13] represent key papers that reviewed key privacy-preserving techniques in recent years.
The work [8] reviewed SM privacy based on data aggregation schemes and discussed challenges related to signal processing, secure cryptographic protocols, and hardware limitations. In [9], a niche area of SM privacy, i.e., Homographic Encryption (HE)-based approaches are reviewed. The work in [10] reviewed, discussed and analysed different SM privacy preservation approaches and then identified their weaknesses and strengths across four categories (information privacy, personal privacy, organization privacy, and intellectual privacy).
The papers in [11,12] focused on the more established aspects of SM privacy without considering newer features, such as value-added services (VAS), SM data alteration approaches and renewable energy sources (RES). The regulations around SM data collection and management are reviewed in [13], and some recent papers [14,15,16] investigated the merits and demerits of various data protection and privacy preservation schemes in SG communications.
Table 1 summarizes the comparison of the notable survey papers in the area of smart meter privacy preservation, and highlights the contributions of our survey paper.
Our intention is to complement the aforementioned papers by writing a dedicated review that expands on and fully addresses the multi-dimensional aspects of privacy preservation in the context of SMs and SGs. In this paper, we review SM privacy-preserving techniques presented in the literature over the past decade. We categorize SM privacy techniques according to the threats from “weak” and “strong” adversaries (as defined in Section 2.4). We cover key aspects of SM privacy preservation including the use of RES, consumer billing, VAS, operational procedures, and cost-friendly techniques. Furthermore, this paper also identify the limitations and provides recommendations for future research and developments. In summary, our key contributions are as follows:
  • Provide a detailed taxonomy that captures the current developments and approaches for preserving SM privacy.
  • Categorize and comprehensively review state-of-the-art privacy-preserving techniques for SM-based adversarial attack types and objectives.
  • Identify key challenges and articulate key future research directions for further developments in the field of SM privacy preservation.
The rest of the paper is organized as follows. Section 2 presents background information and describes SM privacy characteristics/threats. Section 3 and Section 4 review the privacy-preservation techniques against both weak and strong adversaries. Section 5 discusses the challenges and presents future research directions. Section 6 concludes the paper.

2. The Smart Grid Infrastructure and the Role of Smart Meters

In this section, we present background information on the various entities that make up the SG infrastructure and role of SMs. Figure 1 illustrates the different entities that make up a typical SG infrastructure (based on [11]). The following sections briefly introduce these entities.

2.1. Energy Sources, Utility Provider, and Trusted Third Party

Energy generated by sources, such as hydroelectric energy, nuclear energy, and renewable energy, are typically purchased by a Utility Provider (UP) before selling/supplying them to customers via the transmission and distribution network. UP is also known as the Control Center (CC), which controls the smart distribution systems. The UP/CC controls the buying/selling of energy. For example, Figure 1 illustrates how UP/CC controls signals for load balancing, dynamic pricing, and DR program by observing the energy demand. The UP is also responsible for data and energy management in the SG.
Trusted Third Party (TTP) is an entity that facilitates the interactions between two parties (e.g., consumers, UPs, and energy suppliers) and is trusted by both parties. To preserve the privacy of an SG, the TTP reviews all critical transactions between all the parties involved. Generally, a TTP is placed between consumers and the UPs as illustrated in Figure 1.

2.2. Smart Meters

SMs represents a critical input point of the smart distribution system. As illustrated in Figure 1, a SM typically resides in the house. It measures the consumer electricity usage with different time granularities and reports the usage to the UP. Information collected by SMs is used by different actors, e.g., the UP uses SM data to predict future energy demand, the electricity market, and the operation of transmission system management. The following summarizes the role of SMs.
  • Consumer billing: Information collected by the SMs are used to calculate the energy usage of the consumer for dynamic pricing. Hence, such measurements should be as accurate as possible. The higher the measurement resolution, the more precise the billing of consumer energy usage.
  • Accurate SG operations: The UP can predict future energy demand using SM data and can reduce the cost by minimizing the waste of energy. This also improves the efficiency and reliability of the SG. Accurate SM data helps with the state estimation process, load balancing, increases the reliability of power supply and control signals.
  • Integration of Renewable Energy Sources (RES): The amount of renewable energy generation is approximated by using SM data. Therefore, the UP can identify the RES required to fulfil the demand of the consumer during peak periods. By analysing SM readings, the consumer can select the type of RES to be installed in their houses. Consumers can reduce the cost by shifting the usage of more appliances in the off-peak periods compared to the peak periods.
  • Value Added Services (VAS): The introduction of VAS has assisted in accelerating the electricity market. Customers, third-party service providers, and operators are able to use SM data to provide different VAS, such as management and diagnostics of different electrical appliances.
  • Energy-selling-back: By using a smart metering system, the consumer can sell energy back to the grid. Most houses now use RES with solar panels and/or wind turbines.

2.3. Renewable Energy Sources in Smart Homes

Due to the cost increase of fossil fuel-based energy, many consumers are now interested in integrating RES, such as solar panels and small wind turbines [17]. Due to their dynamic capabilities and heterogeneous nature, the integration of RES with SG is currently undergoing active research [18]. The integration of household RES also helps with reducing the carbon footprint. The consumer can use RES to reduce the cost of electricity. It is predicted that, in the coming future, every house will be equipped with more than one RES [19]. An RES generates energy only for specific hours depending on the weather. Hence, they are used in combination with the main energy supplied from the SG [18]. High-resolution SM data can help the UP to provide information regarding the usage of RES by the consumers. Based on this information, the UP can increase the price of electricity during hours when the RES is not available to generate energy [20]. Figure 2 presents an overview of a RES-based smart metering system.

2.4. Smart Meters Privacy

In a SG infrastructure, consumers’ privacy can be breached at any point—starting from the SM in the house, to the communication line, third parties, and the UP itself—posing different threats to SM privacy in SG networks. Figure 3 presents the threat model that we use in this paper.

2.4.1. Weak Adversaries

Weak adversaries have less information on the SM readings. For example, a weak adversary can be an eavesdropper who intercepts the communication between the UP and the SM for a short period. Data alteration methods (such as cryptography, encryption, and the addition of noise) can be used to preserve privacy against weak adversaries. To preserve privacy against a weak adversary, data masking can be performed in the SM or by any trusted authorities. Therefore, anonymity and pseudonymity are very important in hiding the load signature of a consumer. For further improved privacy of SMs against a weak adversary, unobservability and unlinkability should also be considered.

2.4.2. Strong Adversaries

Strong adversaries refer to those who have full access to the SM data reported to the UP. For example, a strong adversary can be one who gains access to the resources of UP or the UP itself. The UP has access to the SM of the consumer and full control over the supply system. Demand-side energy management is used for privacy against the strong adversary. To preserve privacy against a strong adversary, data masking is performed inside the house. Therefore, for hiding the undetectability characteristic of privacy, it is sufficient to consider hiding the load signature of the appliances used in the house.

2.5. Threats to Smart Meters Privacy

2.5.1. Predicting Household Renewable Energy Sources

RES (such as solar panels and wind turbines) used by consumers are installed outside of the house as illustrated in Figure 3. Consequently, the UP has direct access to the RES [21]. Therefore, the UP can accurately estimate the RES energy production within each Time Slots (TS) [20] by using information, such as weather forecasts. The demand of the house is usually lower than the normal when the consumers sell renewable energy back to the grid. This information can compromise the privacy of SMs.

2.5.2. Altering Smart Meter Data

SMs are usually installed in a location that is easily accessible and left unprotected most of the time, making them the most exposed device in the SG network. Hence, adversaries can alter SM data (as in illustrated Figure 3) and compromise consumers’ privacy. Energy theft can also be performed by altering the SM data. As a result, SM can be an entry point for physical and side-channel attacks. The software located inside the SM is also vulnerable. SMs are considered to be fully-trusted as they are equipped with a trusted platform module that is used for performing cryptographic primitive by using and storing cryptographic keys [22]. Once the SM is compromised, an attacker can gain access to the keys and data. Large-scale real-time privacy invasion can occur when a large number of SMs are exploited simultaneously.

2.5.3. Eavesdropping in Communication Networks

Secure communication in SG networks is vital in preserving SM privacy. Cryptography-based approaches are adopted to achieve secure communication, and they are being implemented at many points, ranging from the SM to the UP. However, the consumption report of the SM, which is sent via the communication line (or eavesdropping as described in Figure 3) can divulge information that compromises the privacy of customers [23]. Different cyberattacks can also be launched on the exchange messages [24]. Therefore, robust security measures need to be adopted to protect the communication channels.

2.5.4. Unreliable Smart Grid Operations

SG operations should be conducted in such a way that adversary cannot steal the data. The UP collects all the data from the SM. The privacy of the consumers or SMs depends on the reliable operation and accurate control of the SG [25]. Attacks on different devices within the SG operation centre (e.g., internal attacks by a disgruntled employee) can severely compromise SM privacy.
After considering the potential privacy threats to SMs in SG networks, we will now discuss various state-of-the-art privacy-preservation techniques. SM privacy can be broadly classified into two categories: (i) privacy preservation against weak adversaries and (ii) privacy preservation against strong adversaries. As defined in Section 2.4, we consider “weak adversaries” as third parties or any intruders who can occasionally eavesdrop on the communication. “Strong adversaries” refers to entities who have access to all the information available to UP. Figure 4 presents the taxonomy of our survey.

2.6. Performance Metrics in Smart Meters

2.6.1. Privacy-Preservation Metrics

Privacy-preservation metrics measure the SM’s privacy preservation ability. In demand-side energy management schemes with energy storage, the output of the SM is made different (constant line, rectangular, or other shapes) compared to the real energy demand of a consumer. Most of the models compare the output of SM readings with actual energy consumption to measure their privacy preservation ability. However, not all privacy-preservation metrics are equally suitable for privacy measurements. Below, we describe some commonly used metrics.
Mutual Information (MI): MI [26] is a popular metric for measuring theoretic privacy, which is the information leakage rate between input and output. MI considers the statistical behaviour of the consumers’ total load. Hence, it can be considered to be a more accurate privacy measurement metric. The information leakage rate calculates the reduction in the UP’s uncertainty or entropy of the consumers’ energy consumption. The value of MI naturally represents the closeness of two variables. Most approaches that protects against the attacks from strong adversaries use MI as a measure for the ability to preserve the privacy of SMs. MI is denoted by I and defined as follows [26,27]:
I ( X N ; Y N ) : = x i X y i Y p ( x 1 , y 1 , , x N , y N ) ×                       log p ( x 1 , y 2 , , x N , y N ) p ( x 1 , , x N ) p ( y 1 , , y N ) ,
where X N = ( x 1 , x 2 , , x N ) , Y N = ( y 1 , y 2 , , y N ) . The log { · } denotes the base-2 logarithmic operation. X and Y are the possible finite set of discrete values x i and y i can take, respectively. p ( · ) indicates probability mass function.
Variance: The methods in [28,29] consider that if the SM output is constant then the signature of all individual appliances can be removed from the aggregated consumption data. The UP/adversary could not learn any information about the appliances used inside the house or any private information regarding the consumers. In [29], privacy is initially measured by load variance (v) defined as:
v = Δ 1 T i = 1 N τ i ( y i E ¯ ) 2 ,
where T is the total time, and the average demand of the house E ¯ can be obtained from the history of the statistic of energy consumption in the house. The output demand y i (i.e., the energy received from the SG) at ith TS can be obtained from the SM. The time interval at ith TS is denoted by τ i , where i = 1 , 2 , 3 , , N . For perfect privacy, v is zero. In this case, the value of the output demand y i for every τ i must be equal to the average demand E ¯ of the house.
Relative Entropy: Relative entropy is also known as the Kullback–Leibler distance. It is a popular information-theoretic quantity that can be used for the comparison of two sources of information [30]. Although the relative entropy is not a distance as defined in the mathematical sense, it can quantify the relationship between two datasets. For identical datasets, the relative entropy is zero and always positive. The higher level of privacy protection, the larger the relative entropy. Relative entropy has been used in [31,32,33] to measure SM privacy. It is the distance between two probability mass functions p ( x ) and q ( x ) and is defined as:
D ( p | | q ) = x X p ( x ) log p ( x ) q ( x ) .
Statistical Distance (SD): SD calculates the distance between two probability distributions. The smaller the value of statistical distance, the better privacy protection. SD was discussed in [12] and used in [34] for the privacy measurement of SMs. The SD between two distributions m and n for a set of Q can be written as:
( m , n ) = max D Q ( | P r [ m D ] P r [ n D ] | ) .
Matthews correlation coefficient: To effectively prevent the occupancy detection, the Matthews correlation coefficient [35] is a standard measure of a binary classifier’s overall performance of a threshold-based attack on the home’s SM data. The lower the value of the Matthews correlation coefficient, the better the privacy protection of SMs. This metric is used in a combined heat and privacy approach [36,37].
Fisher information: Fisher information [38] measures the information about an unknown parameter obtainable from a sample. It informs the ability to measure a parameter, given a certain amount of data. More specifically, Fisher information quantifies the expected amount of information given by a random variable for a parameter of interest. The concept is related to the law of entropy as both aim to quantify the disorder in a system. Fisher information as a measure for privacy in SM was used in [39].
Inferential Privacy: Inferential privacy [40] measures the uncertainty intrinsic to human behaviour and device models. It is the probability of error when an adversary attempts to infer private information. It assumes a strong adversary model and provides a guarantee on when the adversary can infer private information about the consumers. The definition of this metric is closer to the concept of equivocation metrics [41].
Among all the aforementioned privacy metrics, MI is the most popular metric used in the literature. MI between two random variables measures the information shared by them. It measures the extent of which by knowing one variable reduces the uncertainty of the other variable. If two variables are independent, then knowing one variable does not give any information about the other variables; hence, the MI between them is zero. However, if two random variables are identical, then the information conveyed by one variable is shared with the other variable. In this case, one variable fully determines the other variable. Consequently, the MI between identical random variables is the uncertainty contained in any one of the variables. The MI between two variables quantitatively measures the amount of common information embedded within two variables regardless of the algorithm (linear or non-linear, deterministic, or statistic) used to generate one variable given the other.

2.6.2. Cost Analysis Metrics

The costs for preserving SM privacy are critical in determining the practicality of implementing a privacy-preserving model. Methods that are too expensive to implement are unsuitable for consumers. In this section, we discuss some of the popular cost analysis metrics used in the literature as categorized by (i) communication costs, (ii) computational costs, and (iii) monetary/financial costs.
Communication costs: Communication costs can be denoted as communication overhead (CoO). CoO is mainly related to wireless reception and transmission. It includes receiving and transmitting the information bit, the analogue and digital circuits to process them, and all the radio parts involved. It also refers to the total number of exchanged messages during the execution of the protocol. All privacy preservation models that use wireless communication for data transfer incur CoO. In powerline communication (PLC) [42], privacy-preserving models use existing communication infrastructure, lowering the deployment costs. However, they have some limitations, such as interference, complex routing, and signal loss.
Computational costs: Computational costs are also known as computation overhead (CO). CO is related to the execution of cryptographic algorithms on the embedded platform. It also includes the bitwise/arithmetic functions, defined functions, pseudo-random number generation function, hash function, and symmetric encryption. Wireless approaches consume energy from the battery for communication and computation. The unit of measurement is the energy required to receive and/or transmit one bit of information, typically denoted in nJ/bit.
Monetary/financial costs: Energy bills can be reduced by strategically using the energy from the energy storage devices as shown in [29,43]. For example, when using an RB for demand-side energy management to reduce the energy bill, the RB can charges more during the lower unit price of energy (off-peak period) and discharge more during the higher unit price of energy (peak period).
When RES is used for demand-side energy management, the consumer can use the energy generated from the RES during the peak period and sell the energy back to the SG when more renewable energy is generated. When thermal energy storage and real/reactive power are used, the consumer can manage the demand by using less energy from the SG during periods with higher unit price to reduce the cost of energy. Cost savings (CoS) can be defined as follows:
CoS = i = 1 n x i · p i i = 1 n y i · p i
where x i is the real energy demand of the house at ith TS for i = 1 , 2 , 3 , , N , y i is the SM reading at ith TS, and p i is the unit price of energy at ith TS.
Both CoO and CO are important for when considering the practical implementation of privacy-preservation methods. Typically, the lower the CoO and CO of a particular method, the higher the possibility of the practical implementation of the approach. When RB or RES are considered, most methods considered monetary/financial cost reduction as their primary cost analysis metric.

3. Privacy-Preservation Techniques against Weak Adversaries

In this section, we discuss SM privacy-preservation techniques against weak adversaries as published in the literature. We classify them into two categories: (i) with and (ii) without the presence Trusted Third Parties (TTPs). In the first category, we consider privacy protection against (i) SM data alteration and (ii) Eavesdropping in communication. In the second category, in addition to the two threats without TTP, we also consider threats in (i) residential RES prediction, (ii) unreliable operation, and (iii) the energy consumer network.

3.1. With Trusted Third Parties

3.1.1. Smart Meter Data Alteration

SM privacy can be successfully preserved by altering its data. The alteration of SM data can be performed by using techniques involving cryptography, data aggregation, and the addition of random noise. Individual SM data are observed by the UP for billing, DR program, and energy theft detection. Below, we describe the different methods that use TTP for SM data alteration.
SM privacy for billing: A SM reading aggregation and billing protocol that uses Paillier’s homomorphic encryption and verifiable secret sharing was proposed [44]. This method can achieve both encrypted data randomizing and data aggregation. The forward secrecy of a participant’s session key is obtained with the randomized session key generation. However, the SMs are not authenticated for data aggregation. A fake/dishonest SM may falsify the data, leading to incorrect results of the aggregation process.
The scheme does not ensure data integrity and consumer privacy. A protocol that combines in-network data aggregation and SM billing was proposed in [45]. Data aggregation enables energy supplier to balance and allocate resources, and SM billing enables dynamic pricing scheme based on fine-grained consumption profiles. A homomorphic commitment is used with the HE scheme. In the communication network, the data sent from a SM is either an encrypted message or a commitment. The method assumes that there is only a single recipient of the aggregated consumption data without considering other entities in an open electricity market (e.g., grid operators and suppliers). These entities are also authorized to access the aggregated consumption data of different sets of users.
SM privacy for DR: In [46], a privacy-preserving and efficient DR program that uses HE was presented. It uses an adaptive key evolution to ensure a secure forwarding of consumer session keys. However, public-key schemes, such as HE, increase overheads, which makes them unsuitable for peer-to-peer and online social networks. These schemes can secure gateways under the honest-but-curious model. In this model, the gateways honestly follow the communication protocols agreed upon among the ones involved. However, they may snoop on users’ electricity consumption out of curiosity. In reality, a gateway may become malicious due to various reasons. When there is a large number of SMs in the community, the program does not perform as efficiently when compared to the technique presented in [44].
Differential privacy for DR: A fault-tolerant SM protocol was proposed in [47]. The method overcomes the general communication failures and ensuring DP with lower errors and significantly improved efficiency. The protocol prevents fail-stop faults by designing cipher-text and distributing trust among the SMs (secret key sharing). However, the effect of a fault-tolerance scheme based on future cipher-texts is not ideal due to its limited buffering capacity. In this approach, the individual consumption report is aggregated in the gateways or collected before delivering to the operation centres. Hence, it cannot support dynamic billing and prevent impersonation attacks. The scheme also has practical issues, for instance, SMs may not be able to communicate with the aggregator when there is a communication failure. The method assumes that there is a secure channel between the SMs and third-party aggregator, which is not practical in the real-world.

3.1.2. Eavesdropping in Communication Networks

Attackers can obtain information about the consumer by eavesdropping on the communication channel. The SG communication framework consists of the communication network between energy consumers and the UP. Different communication protocols have been proposed to preserve the privacy of SMs between energy consumers and the UPs, which is discussed as follows.
An identity-based encryption and signature scheme was presented in [48]. In this method, an SM can anonymously access services provided by the service provider using one private key without the help of the trusted anchor. This scheme also supports SM anonymity and mutual authentication. However, the authentication scheme fails to provide strong credential’s privacy of SMs. It is insecure when ephemeral secret leakage attack occurs. The scheme fails to provide the session key security and SM credential’s privacy under the widely-accepted Canetti–Krawczyk adversary model [49,50]. The method requires high communication and computational costs, which make it less suitable for the resource-constrained SMs.
A privacy-enhanced data aggregation scheme that prevents internal attacks was presented in [23]. The scheme uses blinding factors to create blinded data to prevent internal attackers, such as UPs from learning the electricity consumption of users. The UP only receives the total electricity consumption of the neighbourhood without knowing the consumption of individual users. However, by observing the user’s registration procedure, each user’s private key can be easily derived from the information published by the aggregator.
A lightweight lattice-based homomorphic privacy-preserving aggregation scheme was proposed in [51]. This scheme enables smart appliances to aggregate their readings without the help of SMs. The SM or the intermediate base station can validate the messages authenticity, although they cannot decrypt this aggregated consumption. The scheme investigates the impact of different smart appliances on HAN overhead. The total computation and communication load is distributed to different parties, such as SMs, smart appliances, and the base station. The model adopts a lightweight lattice-based homomorphic cryptosystem, which depends on simple multiplication and addition operations.
This scheme guarantees consumer privacy, data integrity, and message confidentiality. It also ensures lightweight computation and communication overhead. However, these HE-based methods incur high computational costs.
Another lightweight lattice-based secure and privacy-preserving approach for consumer clusters within a residential area was proposed in [52,53]. The cluster connection with the UP is limited only when the cluster needs to adjust its total demand. The model utilizes the Number Theory Research Unit (NTRU) cryptosystem to reduce the computational complexity [54]. However, these methods need to fully trust an entity known as a trusted authority. A privacy-preserving, efficient, decentralized, and selective aggregation approach was proposed in [55].
This approach uses a multi-recipient system model, Homomorphic Paillier encryption, and selective aggregation to prevent the SM data from internal and external attacks. It aggregates data at the gateway that is nearest to the data aggregator to conserve bandwidth and reduce the risk of creating a performance bottleneck in the system. It uses a batch signature and short signature verification to reduce computation and communication overhead. However, the customer distribution of each supplier could not be achieved. Its data collection schemes are designed to collect the total consumption of the AMI network’s consumers and cannot handle either the multidimensional nature of power consumption or multi-subset data aggregation.
A privacy-preserving metering protocol was presented in [56]. This protocol uses a distributed authentication model to speed up the message authentication process. The data collection unit does not store decryption keys for the encrypted SM data with this protocol. Hence, the original signature is transmitted to the Advanced Metering Infrastructure (AMI) server. The adversary cannot decrypt the encrypted meter data and cannot modify the SM data. Due to the decentralized message authentication mechanism, the authentication time is shorter. The protocol does not include security features, such as perfect secrecy, strong SM credential privacy, offline password guessing attack protection, password and biometric update phases, and dynamic SM addition. It incurs high communication and computational overheads, thus, resulting in performance degradation. The scheme does not support consumer anonymity and data aggregation.
A trusted SM approach was presented in [57]. It uses attribute certificates to hide the platform configuration information of an SM. A cryptography-based ring signature is used to hide user sensitive information. Using the Rivest, Shamir, and Adleman (RSA) ring signature [58], the trusted SM provides a list of properties, such as anonymity, correctness, and unforgeability. SM attributes are protected by using the digital signature.
The method can detect whether a software update is trusted or not. It can provide security against private information leakage with efficiency. A ring signature scheme is used to preserve the SM privacy at the data concentrator. However, a faulty or a compromised SM cannot be detected since the identity of a (compromised) SM is hidden in the ring. Whenever a trusted SM needs to assert its real identity to the data concentrator, it must include neighbouring trusted SMs using their public key certificates and then compute a ring signature.
Table 2 presents a summary of the SM privacy-preservation techniques discussed in this section, where the SM is faced with weak adversaries that attempt to compromise its privacy.

3.2. Without Trusted Third Parties

Consumers need to be able to fully trust a third party when deploying TTP-based privacy-preservation methods. However, these parties may not always be trusted. To overcome this challenge, SM privacy-preservation methods without relying on TTP have been proposed. In the following sections, we discuss how these methods could be employed to preserve the privacy of SMs, and protect against potential privacy threats.

3.2.1. Predicting Household Renewable Energy Sources

The UP can predict the household demand by observing the energy generation by the RES and the SM reading/consumption of the household. The technique presented in [20] uses Differential Privacy for RES-based smart metering system. This method calculates the total energy consumption of the house obtained from the SG, solar energy, and wind energy. The Laplace noise is selected (when the energy consumption of houses is not zero) based on the maximum allowed error with the output, standard deviation, and variance.
The SM reading is equal to the Maximum Reported Peak Load (MRPL) if the sum of noise and consumption is more than the MRPL. Otherwise, the SM reading is the sum of the noise and the demand. In this model, information is gathered from different resources and aggregated to calculate the magnitude of the Laplace noise. It also caps the value to a specific peak value and transmits it to the UP via a wireless medium. However, the billing process of the method is very complex, and it incurs high cost overheads.
Table 2. Summary of SM privacy-preservation techniques against weak adversaries with TTP.
Table 2. Summary of SM privacy-preservation techniques against weak adversaries with TTP.
Ref.GoalsLimitationsMetricMechanism
[48]Authentication and anonymous key distribution scheme for SG communicationFails to provide strong credential privacy, Insecure for the ephemeral secret leakage attackCoOID-based encryption signature
[23]Privacy-enhanced data aggregation against internal attackers in SG communicationConsumer private key can be derived from the published informationCOSecure AgG
[44]Privacy-preserving data aggregation, efficient and secure billing of SMsSM is not authenticated during data aggregationCOPaillier’s HE
[45]Privacy-preserving data aggregation and verified billing of SMsConsider only a single recipient for aggregated dataCOHE
[46]Privacy in the demand response (DR) programUnsuitable for P2P and online social networkCCOHE
[59]Privacy-preserving incentive-based DR programThe bidding process is not supportedCOID-committable signature, Partially blind signature
[47]Differential privacy (DP) of SMs for the DR programNo dynamic billing, vulnerable to an impersonation attackRMSE, Mean relative errorSecure AgG
[60]Privacy of SMs for energy theft detection (ETD)No dynamic billing, assume an online trusted entityCross entropy, Accuracy scoreHE
[51,61]Consumer privacy, data integrity, and message confidentiality in SG communication networkNo discussion about the monitoring and detection of any intrusion activityCCOLightweight lattice-based HE
[52]Lightweight lattice-based secure and privacy-preserving communication scheme for a cluster of consumersEmployees within the system could easily access records to compromise the systemCCONTRU cryptosystem
[55]Privacy-preserving and preventing users’ usage data from internal and external attacks in SG communicationCannot handle either the multidimensional nature of power consumption or multi-subset data aggregationCCOPaillier’s HE, Batch signature, Short signature verification
[56]Lightweight and privacy-preserving SM communication protocol by a distributed authentication methodCannot protect DoS attack, incur high computational and communication costs, cannot ensure anonymityCommunication delay, Authentication timePaillier’s HE
[57]To hide the platform configuration information of SMs and user sensitive information for communicationData concentrator cannot detect the compromised SMsCoO, Time complexityCryptography-based ring signature

3.2.2. Smart Meter Data Alteration

Different methods, such as those based on cryptography, data aggregation, and the addition random noise, have been used to alter SM data to preserve its privacy. Below, we consider several methods for SM data alteration without relying on TTP.
SM privacy for DR: A threshold-based anonymous identification scheme for overload audit and privacy preservation in SG was proposed in [62]. Consumer privacy depends on the power consumption in the presence of DR request from the UP, which defines an acceptable consumption threshold when there is a power shortage. The consumption model is built so that a threshold value can be found to fill the gap between power consumption and generation during a power shortage. Consumers’ power consumption should be lower than the threshold value. To meet the threshold, consumers must follow the instructions to control their consumption. Consumers who follow the instructions from the UP will maintain their anonymity whereas those who do not follow cannot preserve their privacy.
A distributed and multi-unit privacy guaranteeing bidding mechanism for DR program was proposed in [63]. This model protects the bidding information of participant, whereas the only the winner is exposed to the UP. In this scheme, customers information is disclosed neither to the bidder nor the UP. The model provides a security analysis of privacy-assured bidding by using four Zero Knowledge Proofs (ZKPs). In this protocol, the computational hardness of discrete algorithm proble, and efficient ZKPs replaces the TTP.
Random noise-based SM privacy: The addition of random noise can preserve the privacy of SMs. Random noise is added either from within the SM or by a TTP [64]. A lightweight, efficient, and distortion-based privacy-preserving metering and billing scheme was proposed in [65]. Random noise is added to distort the SM data so that data recovery becomes difficult for the adversary. Using prior knowledge about the added random noise and power consumption data, the scheme uses an algorithm for power consumption distribution reconstruction. It is required for prediction, dynamic pricing, and power demand analysis. However, the scheme suffers from difficulties in reconstructing original data and billing accuracy. Another technique, as presented in [66], preserves SM privacy by using both noise and cryptography-based techniques. Customers need to send the actual usage data to the UP; hence, this method is only effective against a weak adversary.
Differential privacy of SMs: In [67], the SM reading of consumers is arranged as a matrix for DP of SMs. The row is used for billing and the column is used for the utility. The method uses Laplace distributed random noise to preserve the privacy of SMs. The variance of the distribution is defined in such a way so that the aggregated value of the SM reading is within the maximum allowed error. This approach has a trade-off between the privacy and the number of SMs for which different statistics can be calculated at each time instant. However, a large group of SMs is needed to maintain privacy and statistical accuracy simultaneously.
Direct perturbation of power measurements may reduce the performance of power system controls and result in inaccurate billing. In [68], DP for real SM data was proposed. However, this method requires a large number of SMs for it to be effective. The SM privacy preserving method presented in [69] supports DP, data aggregation, range-based filtering, and fault tolerance simultaneously. This model is an extension of the lifted ElGamal encryption [70] that aggregates consumer consumption reports at the gateway.
It reduces the communication overhead and supports fault tolerance of malfunctioning SMs effectively. To filter abnormal measurements caused by false data injection attack or electricity theft without exposing consumers measurements, the model uses zero-knowledge range proof. Since individual consumption reports are aggregated at the gateways, the scheme could not not support dynamic billing. The ElGamal encryption-based schemes are also computationally expensive.
Privacy in energy theft detection: A privacy-preserving energy theft detection scheme was proposed in [71]. To detect abnormal data and estimate the customer energy consumption, a recursive filter based on state estimation is used. For data transmission, the model uses a lightweight NTRU algorithm [54] and signature authentication to protect the privacy of SM data. However, the approach tampers with SM data. Hence, accurate state estimation may not be possible, and the billing process can also become quite complex.
Information-theory-based privacy of SM: The use of information-theoretic measures is a commonly used approach to model privacy loss by using optimally-designed noise under certain utility constraints. An information-theoretic framework was presented in [72]. It considers a privacy-utility trade-off problem with the minimum assumption that it is traceable. Tools from information theory and a hidden Markov model are used.
The theory of rate-distortion is used to quantify the trade-off between privacy (information leakage) and utility (mean square distortion). For an electric load of a stationary Gaussian model, the optimal solution exploits the presence of high-power but less private appliances. It then filters out frequency components with lower power relative to a distortion threshold. However, it is challenging for the model to handle physical constraints. This approach enforces privacy in a probabilistic manner, which means there may be a severe breach of privacy for a rare realization of the system. In [72], the impact of techniques, such as noise addition and down-sampling, are not analysed in terms of privacy breach and data utility. Finding a solution to address this issue may help consumers to choose between load scheduling-based solutions and low-cost data manipulation techniques.
For privacy preservation, the mechanism in [73] allows energy customers to flexibly down-sample their energy usage data before sharing it with third-party service providers. This is performed without invalidating data issuer’s digital signature. This method lacks a quantitative evaluation of the trade-off between data utility and privacy. This method could also limit the utility of the SMs data for certain applications requiring a timely response.
Statistical privacy of SM: Two schemes that collect aggregated statistics while preserving the privacy of electric consumers were presented in [74]. The first scheme supports dynamic profiling that can extract statistical information without compromising consumer privacy. It enables the aggregator to efficiently extract the summation of the information from the received consumers’ responses. The second scheme can extract correlation information among various factors for the smart system design. It can also be used as an underlying tool for association rule mining and baseline inference. Although the aggregate statistics are effective in concealing detailed usage profiles, the correlations involved are not perfect. It is not as effective as statistical models derived from actual individual household energy consumption data.
Blockchain-based SM privacy: To preserve the privacy of consumers in SGs, a data aggregation scheme using Blockchain was proposed in [75]. This scheme divides the consumers into different groups. Each group has a private Blockchain that records the members’ data. To hide the users’ identity, it uses pseudonyms that preserve inner privacy of the user. The system model consists of Neighbourhood Area Networks (NANs) and Wide Area Networks (WANs). For aggregation, SMs send the data to the mining node, and the aggregated data of each group is sent to the WAN. The mining node records the aggregated data into a private Blockchain and publishes them for verification. For fast authentication, a bloom filter is adopted in the system. However, the computational complexity of this method is very high.
A technique using consortium Blockchain was proposed in [76]. In this method, an elliptic curve point multiplication operation is used in the certificate-less aggregated ring signcryption algorithm. It reduces the computing and communication costs. Distributed storage of users’ data with a consortium Blockchain is used to solve the problem of single-point failure and data tampering. However, the use of excessive energy is required for practical implementation. The transaction validation time and storage requirements are a challenge in blockchain-based methods.
Table 3 presents a summary of the SM privacy-preservation techniques for RES-based households by altering the SM data to defend against weak adversaries.

3.2.3. Eavesdropping in Communication Networks

In this section, we consider privacy-preservation techniques that protects against eavesdropping in advanced SG networks, where communication links are established between energy consumers and the UP.
Communication between energy consumers and the UP: A privacy-preserving recording and gateway-assisted authentication scheme was proposed in [77]. In this model, the UP does not know which user requests for more power or is in agreement of using less power until the consumer uses it. After the requested power has been consumed (or by the end of each billing period), the user can prove to the UP that the energy has indeed been requested. This method uses gateway SMs to aggregate power usage information. The power generator determines the required total power to be generated at different times. This helps to reduce the total traffic volume in the communication network.
Gateway SMs also help to filter messages before reaching to the CC, hence, reducing the impact of attacking traffic. However, the use of HE in the method is a compute-intensive operation. The gateway acts as a trusted role to provide the aggregated data to the private key holder, such as a CC. The gateway provides single cipher-text to the individual consumer. Since the single cipher-text is decrypted, individual privacy can be deduced. The authentication of an SM is performed at the NAN gateway. However, it cannot validate whether the NAN gateway is a legal entity. In addition, a house blackout can be performed by a fake control command.
Table 3. Summary of SM privacy-preservation techniques for RES-based SM and data alteration against weak adversaries without TTP.
Table 3. Summary of SM privacy-preservation techniques for RES-based SM and data alteration against weak adversaries without TTP.
Ref.GoalsLimitationsMetricMechanism
 [20]DP for RES-based smart metering system for the privacy of RES-based house-holdComplex billing, inaccurate aggregation output, trace of renewable energy added by UPGraphical comparisonLaplace Noise
[62]A privacy-preserving threshold-based anonymous identification scheme for overload audit in DRConsumers need to follow the instruction to curtail their consumptionCCOThreshold value
[75]Consumer privacy by using blockchainComputational complexity is very highCCOAgG, Pseudonyms
[63]Distributed and multi-unit privacy-preserving bidding mechanism for DRComputational and overhead complexity is very highNAZKP
[64]Privacy model for an SM application by using random noiseNeed to trust either UP or TTPConfidence intervalsRandom bit, AgG, Enc
[65]Lightweight, efficient distortion-based privacy-preserving metering and billingSuffers from billing accuracy and difficulties in reconstructing original dataGraphical comparison, NILMGaussian noise, AgG
[66]Random noise-based privacy preservation of consumers, sharing energy usage data with third partiesNo use of real SM data for performance analysisNARandom noise, Cryptography, ZKP
[67]DP for consumer’s billing and utilityA large group of SMs are needed to maintain privacy and accuracy simultaneouslyGraphical comparison, COLaplace Noise
[68]DP for real SM dataA large number of SMs are required for useful dataRelative errorLaplace Noise
[69]SM privacy that supports data aggregation, range-based filtering, DP, and fault toleranceCostly computation, cannot support dynamic billingCCOEIGamal encryption, ZKP
[71]Privacy for ETD, state estimation, and abnormal data detectionTamper the SM data, the complex billing processCCONTRU, Signature authentication
[72]Information-theory-based privacy-utility trade-off problem with minimum traceable assumptionDifficult to handle physical constraints, enforces privacy in a probabilistic manner, which means there may be a privacy breachMITheory of rate distortion
[73]Privacy-preserving energy usage data sharing by using information theoryLacks of quantitative evaluation of data utility-privacy trade-offCCOFlexible down-sampling
[74]Privacy of SMs by aggregated statisticsCorrelations involved are not perfectCCOAgG
[76]Privacy by using consortium blockchainExcessive energy is required for the practical implementationCCOCertificate-less aggregated ring signcryption
A quantitative mean was presented in [78] to identify a trade-off between the precision on the aggregated measurements, the aggregation set size, and the privacy level. This model first defines an attack on the privacy of each consumer. Coloured noise and individual SM data are aggregated to the success probability of the attacks. The approach uses data perturbation and provides formulas to calculate the ϵ privacy in the case of coloured and Gaussian white noise. By suitably colouring the noise, the model gains the same level of privacy with a much lower noise variance. However, tampering with SM readings before transmission to the UP reduces their relevance for billing purposes.
Unreasonable random obfuscation values chosen by consumers reduces the utility of the data and impacts the accuracy of the aggregated result. To set an obfuscation value for each user, it is necessary to design a reasonable random number generation algorithm. In [79], a scheme that constructs a linkable anonymous credential protocol using a Camenisch–Lysyanskaya signature [80] was presented. The method uses the message security properties, such as authentication and traceability of fault smart metering, to provide privacy protection.
Due to some other properties, such as no need for TTP, dynamic user enrolment, and revocation, the computational cost and communication overhead of the scheme is lower. However, it takes advantage of the storage and computation capabilities of cloud computing as well as the distributed and low-latency properties of fog computing. The method requires a large computation capacity, which is not always available in real-world SGs.
A privacy-preserving approach for the spatio-temporal aggregation of time series data was presented in [81]. The approach uses a masking scheme to obfuscate individual consumption and generate the correct results upon aggregation. The model can be used for any time-series data and focuses on a high degree of error-resilience that is crucial for the distributed nature of the SG.
To preserve consumer privacy, a meter data obfuscation approach was proposed in [82]. This model proposes two secure obfuscation value distribution mechanisms using IEEE 802.11-based wireless mesh networks. By using obfuscation values, the meter reading is obfuscated to protect consumer privacy while enabling UP to use the data for state estimation. For performance evaluation, the model uses a large scale AMI network that builds upon the IEEE 802.11 wireless mesh standard. However, the method requires a higher setup and computational cost and, thus, is inefficient in terms of transmission and computations.
An energy consumption prediction framework, called “Seer Grid” was proposed in [83]. The framework aims to reduce the trade-offs between data utility and privacy. The first-level prediction is performed by each SM at the household level. Instead of using actual energy consumption data, the predicted energy consumption pattern is reported to the Cluster Head (CH). The second-level prediction is at the neighbourhood level and performed by the CH. Energy spikes are predicted by the CH in the cluster or neighbourhood and shared with the UP.
The model is designed so that it maintains the correlation between the actual energy and the predicted consumption patterns at the cluster level. It removes the correlation in the predicted data communicated by each SM to the CH. The method maintains the utility of the cluster-level energy consumption data communicated to the UP. It preserves the privacy of the household-level energy consumption data against the UP and the CH. However, the framework does not formulate and generalize the minimization of privacy-utility trade-offs.
A privacy-preserving scheme for long term evolution or hybrid AMI was presented in [84]. In this scheme, the UP gathers the power bids from the consumers in a privacy-preserving and secure manner. To preserve privacy, the model uses HE so that the UP cannot correlate the consumer bids. First, the UP wants to buy power from the users. The UP generates a packet that contains a signature and purchase price. The UP sends it to the users by using the aggregator node that utilizes the backhaul network.
Next, the aggregator checks the integrity and authenticity of the packet after receiving them. If the result is true, the aggregator sends the packets to the users. The SM verifies the integrity and authenticity after receiving the packet and sends a reply-packet that contains the amount of power unit, price, and a signature back to the aggregator node.
The aggregator then gathers the reply-packets from all users and aggregates them in a secure way (using HE and a signature) and send the bid-packets to the UP. Finally, the UP verifies the integrity and authenticity of the bid-packets. The individuals’ bid cannot be correlated at the UP. However, this approach does not consider real-time monitoring systems. It mainly focuses on authentication without considering the confidentiality of SM data. It incurs high communication costs and lacks threat modelling.
Privacy and security concerns for distributed demand management protocols were highlighted in [85]. The model presents a mutually exclusive cluster-based solution to ensure privacy, confidentiality, and integrity among the users’ sharing information. The model also includes a distributed multi-party computation protocol based on clustering. The protocol can identify untruthful users in the network. A verifier-based solution is used to detect malicious nodes who declared false information about its usage. In this model, data aggregation ensures that only the overall power usage data is known by others.
However, the UP requires the calculation of some specific information, such as load forecasting and dynamic pricing. In the case where two neighbouring SMs collide in the ring, SM data could be easily disclosed. The approach in [86] quantitatively measures the information leakage of certain appliances status from SM readings and defines a privacy notion to bound the information leakage. The scheme involves a privacy-preserving algorithm to stream output readings without any data aggregation and assures utility and privacy. The outputs can support different SM services, such as regional statistics, billing, and load monitoring.
These outputs can also be fed into aggregation-based solutions. The techniques can be tailored to allow micro-grids pre-process their metering data (i.e., consumption and generation), and the main grid to solve optimization problems in real-time. However, significant utility loss can occur when metering data obfuscation, and the computational load significantly increases [87,88,89].
A privacy-preserving secure SM data-collecting protocol for calculating transmission/distribution data, and imbalance fees was proposed in [90]. The model uses secure multi-party computation as the underlying cryptographic primitive to preserve privacy. Three different data aggregation algorithms are used by the scheme that offers different balances between privacy-protection and performance. The model uses a threshold-based secret sharing scheme to mitigate collusion attacks. A realistic scenario is considered where the SM data requires to be sent to different parties, such as suppliers and grid operators.
The scheme claims to accurately calculate the distribution, transmission, and grid balancing fees. However, it does not cover the entire asset and services sharing process. It does not fulfil any data protection regulations (although it is privacy-preserving from a technological perspective) and does not consider incentive-based economic analysis.
Table 4 presents a summary of the SM privacy-preservation techniques for defending against eavesdropping in the communication networks between household consumers and the UP.

3.2.4. Unreliable Smart Grid Operations

Unreliable operations in the CC can breach the privacy of individual consumers; hence, access control in SG operations is crucial. Below, we summarize the state-of-the-art solutions for access control without relying on TTPs.
Access control: A privacy-preserving data aggregation and access control in SG was proposed in [91]. The aggregation of SM data is performed in HAN, BAN, and NAN so that the privacy of the consumer is preserved using HE. The collected consumer data is sent to the substation and observed by the Remote Terminal Unit (RTU). The use of attribute-based encryption allows selective access to consumer data, which is stored in data repositories and can be used by different SG users. The RTU, users’ cryptographic keys, and attributes are distributed by different key distributor centres. The RTU sends encrypted data under a set of attributes.
The RTU is managed in the substations and protected in the control room, and so it is assumed to be trusted. Consumers who have valid attributes can decrypt the information provided. The access control scheme is distributed. It does not rely on a single key distributor centre to distribute the keys, which makes the approach robust. However, the method is limited by their required computational or communication complexity. The scheme cannot meet the demand when the control centre needs to determine the distribution of electricity consumption. The adversary can decrypt the encrypted measurements if it has access to the private keys of the suppliers.
Table 4. Summary of SM privacy-preservation techniques for communication protocols against weak adversaries without TTP.
Table 4. Summary of SM privacy-preservation techniques for communication protocols against weak adversaries without TTP.
Ref.GoalsLimitationsMetricMechanism
[77]Privacy-preserving recording and gateway-assisted authentication schemeThe scheme may lead to many security threats, assume a trusted gatewayCCOHE, Bloom filter
[78]A trade-off between the privacy level, precision on aggregated measurements, and the aggregation set sizeRandom obfuscation value may impact the accuracy of the aggregated result ϵ -privacyAgG, Gaussian white and coloured noise
[79]SM privacy-preserving scheme using the linkable anonymous credentialUse the advantages of the storage and computation capabilities of cloud computing and the distributed, low-latency properties of fog computingCCOCamenisch–Lysyanskaya signature
[81]Privacy-preserving scheme for Spatio-temporal aggregation of time series dataComplicated to implement and computationally expensive to executeCCOAgG, Masking
[82]Consumer privacy and distribution state estimation using data obfuscationRequires higher setup and computation costGoodput, Data delay, Packet delivery ratioSecure obfuscation value distribution
[83]Reduce the trade-off between data utility for the UP and privacy for the consumersDoes not formulate or generalize the minimization of privacy-utility trade-off in Seer GridCCOTwo level prediction
[84]Privacy-aware scheme over hybrid advanced metering infrastructureDoes not involve a real-time monitoring system, focus on authentication without considering the confidentialityCCO, Data delay, Packet delivery ratioHE, AgG
[85]Privacy and security issues for the distributed demand management protocolsSM data could be learnt if two neighbouring SMs in the ring collude, no consideration of load forecastingExecution time, Cost of energyGame theory, Multi-party computing
[86]Privacy-preserving algorithm to stream SM readings without any aggregation while ensuring utility and privacySignificant utility loss by SM data obfuscation and greatly increase the computational load for the SGGraphical comparison, Error rate, COStreaming algorithm
[90]Secure and privacy-preserving protocol to collect operational SM data needed to calculate transmission, distribution, and imbalance feesNot fully General Data Protection Regulation compliant, not cover the entire asset and services sharing processCCOThreshold-based secret sharing, Secure multi-party computing, AgG
A game-theoretic approach was proposed in [92] to strike a balance between consumer privacy and the benefits of using SM data in a deregulated SG environment. The access control problem is solved by fairly compensating users for their participation in the data market by using the concept of DP. First, the model defines the privacy risk depending on the sensitivity level of private information. Next, a game-theoretic negotiation mechanism was proposed to investigate fairness among the consumer, data aggregator, and third parties.
The goal of each player in the game is to maximize the utility. The consumers are interested in maximizing their reward from allowing access to power consumption data. The data aggregator expects higher profit margins from third parties and to provide fewer incentives to consumers. Finally, third parties expect to pay less for data and obtain higher quality and higher cardinality. However, the method incurs a cost burden on the aggregator. It does not allow consumers to be involved in the decision-making process.
To address privacy issues in access control, a multi-resolution load curve representation was proposed in [93]. The model combines multi-resolution representation with secure aggregation. For secure signal processing, the scheme enables model access on a “need-to-know” basis. Access control for the entire system is encrypted and aggregated. Access is granted to parties for individual resolutions based on their roles and the specific needs in terms of data resolution.
The multi-resolution analysis is used for the privacy-preserving protocols and directly depends on the HE property for secure aggregation. By applying HE to a signal represented in the wavelet domain, homomorphic additivity not only preserves privacy but can also be separately exploited for each resolution. However, the method does not consider the trade-off between privacy and utility for the user. It does not consider DR and cost-reduction during the privacy preservation of SMs. Table 5 summarizes the privacy-preservation methods of SMs for access control.
To conclude, SM privacy-preservation mechanisms designed and developed to defend against the attacks from weak adversaries usually involve altering the data at the SMs. These methods have drawbacks and can lead to inaccurate state estimation, complex billing process, and misleading control signals. Another challenge for preserving privacy against a weak adversary is that the models proposed often cannot be deployed directly onto the existing SG infrastructure.
Practical implementation of these methods can be costly. A particular challenge is that the UP has control over the entire distribution system, so it can install a sensor to the distribution line to learn about the energy requested by households. It is crucial for privacy-preserving mechanisms to consider such cases where strong adversaries are present and have full control of the SM data. We will discuss the relevant techniques and methods presented in the literature that aim to defend against such adversaries.
Table 5. Summary of SM privacy-preservation techniques for access control in operation against weak adversaries without TTP.
Table 5. Summary of SM privacy-preservation techniques for access control in operation against weak adversaries without TTP.
Ref.GoalsLimitationsMetricMechanism
 [91]Privacy protection for access control and data aggregation in SGIf an adversary gain access to the private key of the supplier and can intercept encrypted measurements, the adversary can decrypt themCCOAgG, HE
[92]Game-theoretic approach for access control to balance between beneficial use of SMs and individuals privacy in the deregulated SGDoes not provides consumers with a better sensibility of involvement in the decision making of their assets, has cost burden on the aggregatorTrade-off between privacy and benefitsAgG, Game theory, DP
[93]Privacy preservation access control in operation using multi-resolution load curve representationDoes not consider the trade-off between privacy and utility, DR, and cost-reduction during the privacy of SMsCCO, Standard deviationWavelet-based multi-resolution, AgG, HE

4. Privacy-Preservation Techniques against Strong Adversaries

Strong adversaries refer to attackers who have full access to the SM data as reported to the UP. A strong adversary can analyse users’ SM data, and by using the historical data, the adversary can determine private and sensitive information about consumer household activities. To protect the consumers’ privacy against strong adversaries, advanced privacy protection mechanisms are needed to mask any information from the SM output. The most effective way to achieve this is by using demand-side energy management.
Demand-side energy management can be performed by using energy storage, such as a Rechargeable Battery (RB), Renewable Energy Sources (RES) (such as solar panels and wind turbines), HVAC systems, and reactive power storage. By using energy from energy storage devices, the EMU alters the actual energy requested by the households.
For example, the SM does not record the actual energy consumption of the house by using demand-side energy management. It records the energy consumption data, which has already been strategically masked. If an adversary tampers with the SM data, it will not compromise the privacy of the consumers. Similarly, information obtained from the communication network or operation centre will not compromise the privacy of the consumers.
In this section, we categorize demand-side energy management schemes into two categories: (i) prioritizing customer privacy and (ii) prioritizing cost reduction (cost-friendly) schemes.

4.1. Prioritizing Customer Privacy

In this section, we discuss demand-side energy management methods that prioritize customer privacy. These methods mask the actual energy consumption of the consumer by strategically using energy from energy storage devices.

4.1.1. Using Rechargeable Batteries

RB can be used to mask energy consumption in the house. To mask the actual energy consumption, the RB can charge during the off-peak periods (lower demand of the house) and discharge during the peak periods (higher demand of the house). Below, we describe several well-known methods to achieve this goal.
Heuristic methods: The first RB-based policy to preserve the privacy of SMs was proposed in [31]. This method attempts to hold the output load to its most recent value by charging and discharging the RB. If the previous load is higher than the current load, the RB charges to make the current output load equal or near to the previous load (if there is enough room in the RB). However, if the previous output load is lower than the current load, the RB discharges (if there is enough energy in the RB to make the output load equal or close to the previous output load). This model is known as the “best effort” method. However, this method is unable to preserve privacy when there is a continuous increase or decrease of appliance demand for a longer period, or when the State of Charge (SoC) is too low or too high.
Random noise-based methods: In [94], it was demonstrated that Battery-based Load Hiding (BLH) methods, such as best-effort [31], non-intrusive load levelling [95], and stepping algorithms [96], do not preserve differential privacy (DP). These methods use randomized algorithms by using binomial noise (known as coarse-grained noise and fine-grained noise) to preserve DP. However, it is unable to generate the required noise due to RB constraints. In [34], a method was proposed to preserve the DP of SMs by adding Laplace distributed random noise with the input load.
The noise is generated by charging and discharging the RB. There are constraints in RBs, such as battery throughput (or maximum charge–discharge rate of an RB) and limited capacity. To generate a Laplace distributed random noise to approximate DP, this method first considers the constraints of a RB. It then considers a second RB that is connected in cascade with the primary RB for recharging.
SM privacy for Demand Response (DR): In [97], SM privacy issues within residential appliances and DR energy management are explored. To schedule customer appliances and RBs, an online approach based on stochastic optimization is used. Three different load-shaping strategies for masking household energy usage were investigated. The best strategy minimizes the differences between the electricity usage of each appliance at different time instants. However, the accurate estimation of the probability distributions is challenging in practice. The impact of data uncertainties on the optimal performance could not be fully captured in the stochastic optimization-based energy management schemes.
Information theory based privacy of SMs: An information-theory-based privacy smart metering system using cascaded RBs was proposed in [98]. In this scheme, two RBs are connected in series to reduce information leakage rate. Invariance conditions were considered for defining the upper and lower bound of the information leakage. This approach defines the upper and lower bound of the information leakage in cascaded batteries.
It considers binary and ternary input to analyse system performance. It is noted that the use of two RBs in cascade can reduce the rate of information leakage, when compared with using a single RB whose capacity is equal to the two RBs. Information-theoretic privacy of smart metering systems using an RB was studied in [99]. An RB is used to partially obscure the energy demand of the consumer. After a series of reduction of the original problem, the model shows that the most optimal battery policy to preserve privacy can be recast as a Markov decision process [100]. Consequently, the minimum information leakage rate and the optimal charging policies are provided as the solution of a suitable dynamic program.
Fisher information was used in [39] to quantify SM privacy. An optimal RB policy was designed to reduce the Fisher information by using the Cramer–Rao bound [101] so that the variance between the input and the output load is maximized. This method assumes that the RB policy does not depend on household consumption, and it considers the cost of an RB for charging and discharging. The authors demonstrated the boundary of the RB policy and the change of estimation error variance in relation to the RB capacity. However, they did not demonstrate a practical implementation of this method.
In [102], the hypothesis testing problem in SMs was analysed. In this hypothesis, consumer privacy can be preserved with the EMU. The EMU can choose two different policies. First, in the normal-mode policy, the EMU supplies the total energy from the SG for the demand of the house. Secondly, the EMU supplies some portion of energy from the grid, which is independent of the demand in the house. The RB with a limited capacity supplies the remaining demand or absorbs the excess energy.
This is to conceal the real energy consumption of the house and preserve the privacy of the consumers. However, the UP can guess the policies used; for example, the UP can distinguish the policy of the EMU by validating the SM data to be used for forecasting applications. The EMU strategy is used when the consumers have prioritized SM data privacy. This method does not address several basic issues about the SM data preservation, such as the owner of SM data, the amount of personal information that can be obtained, and the possibility of disguising data to preserve privacy.
In [103], SM privacy using RBs is considered with the co-operation of consumers. The study analysed the effect of user co-operation on enhancing the privacy of SMs. This model derives the lower and upper limit of the minimum leakage rate. They concluded that N-user co-operation reduces per-user information leakage approximately by a factor of 1 N . A battery policy that is optimal for a single user is not optimal when the users co-operate. This method requires a large number of cooperative users. The study did not consider actual SM data traces for their simulation work.

4.1.2. Using Renewable Energy Sources

RES (such as solar panels and wind turbines) can be used to preserve data privacy of SMs by using various information-theory-based methods. A model that defines the SM privacy preservation as a function of the average power of the RES was proposed in [104]. The privacy power function is a non-increasing convex function of the average power. For discrete load, the model shows that the output load alphabet can be restricted to the input load alphabet. For binary input load, there is a constant high and low power level.
For a continuous input load, the scheme derives a lower bound on the privacy power function with the help of a Shannon lower bound. The model also shows that optimal allocation of the energy provided by the RES is achievable when there is an independent exponentially distributed load. This model uses a reverse water filling solution for optimal power distributed to each user from the RES. However, this method does not use practical SM readings for performance analysis.
In [105], the peak and average power constraints of the RES were considered. The model achieves optimal privacy by considering the instantaneous input load with a stochastic energy management policy instead of a deterministic policy. The method uses a new conditional probability function for the new estimated output load. It proves that the output load alphabet can be restricted to be equal to the input load alphabet without the loss of optimality. By reducing the size of output load alphabet, the privacy-power function characterization becomes a convex optimization problem. However, this model only uses a binary input load, which can be challenging to deploy practically.

4.1.3. Using Both RB and RES

Both RB and RES can be used for demand-side energy management to preserve the privacy of SMs. In [106], the combination of both RB and RES was considered for partially hiding the actual energy consumption of the consumers. The method considers the impact of the knowledge of the amount of energy generated by the RES at UP. It characterizes the minimum information leakage rate as a computable information-theoretic single-letter expression. This is performed by considering two extreme cases of a RB, such as when the capacity of an RB is infinite and zero.
An information-theory-based privacy preservation approach with both RB and RES was proposed in [107]. The RB can only obtain energy supply from the RES but not from the grid. This approach considers a RES with infinite RB. It is shown that achievable privacy is equal to the average power constrain scenario. The model considers both “store and hide”, and the “best effort” scheme for designing an EM policy that minimizes the information leakage rate. The study also considered using RES without RB in two scenarios.
First, it considers that the RES state is known by the EMU and obtain the information leakage rate. Secondly, they considered that the RES state is known by the UP. This is the worst-case situation, and the information leakage is more than or equal to the previous case. However, the method only used binary models for performance analysis, so it may be unrealistic for actual implementation.
A smart metering model with a RES and an energy controller were proposed in [32]. The privacy leakage of an SM was modelled as an unauthorized Neyman–Pearson hypothesis testing [108] on the private behaviour of the users. In this model, the privacy risk is measured with the asymptotic exponential decay rate of the minimum Type II error probability of the adversary. This model studied and characterized the optimal energy control strategy that satisfies energy demands and suppresses the privacy risk. However, the hypothesis was chosen at the consumer level, which does not control the EMU policy.
The privacy of SMs by using adversarial hypothesis testing was proposed in [33]. Privacy leakage is measured by using the probabilistic error in a binary hypothesis test. It attempts to detect consumer behaviour by using meter readings. The model characterizes the optimal privacy-preserving energy management with an adversarial hypothesis test in the context of SM privacy.

4.1.4. Using Thermal Energy Storage

Demand-side energy management can be performed by using thermal energy storage, such as water heaters and space heaters to preserve the SM privacy. The methods presented in [37] used thermal energy storage to prevent the occupation detection of the house. The approach combined heat and privacy mechanism such that it changes the usage data in such a manner so that the house is always perceived to be occupied, hence, tricking occupancy detection techniques. However, the scheme could be problematic in the presence of demand response services.

4.1.5. Using Real and Reactive Power

Demand-side energy management can be performed by varying reactive power in the reactive devices used in households. For example, capacitance can be used, which acts as storage similar to RB. The attacker can infer the appliance usage in the house by analysing the reactive power recorded in an SM, thus, posing a threat in the privacy of consumers [109]. A mechanism known as reactive power obfuscation is used to overcome this problem. The method smooths the power fluctuation by using capacitors that store and provide reactive power in a controlled manner. The ON/OFF signature of appliances are hidden from the output readings of an SM.
In this section, we discuss the SM privacy-preservation methods with demand-side energy management to mitigate threats from strong adversaries (prioritizing customer privacy more than the incurred costs). Table 6 summarizes the methods discussed in this section.

4.2. Prioritizing Cost-Friendliness

In the previous section, we considered various demand-side energy management schemes that do not prioritize energy costs. In this section, we discuss methods to preserve customer privacy while also providing a cost-friendly approach.

4.2.1. Using Rechargeable Batteries

By strategically charging and discharging the RB, it is also possible to reduce the cost of energy consumption. Below, we describe the different privacy methods that present a cost-friendly approach.
Heuristic methods: An optimization equation for minimizing load variance and cost was proposed in [43,110]. The method requires the average load information, which involves knowing the future demand of a household. This method assumes that the total charge/discharge energy of an RB is zero. The battery policy for preserving privacy and reducing cost only depends on the current load and the price. This method uses Lyapunov optimization algorithm for an online control algorithm. With and without charging-discharging the RB, the approach develops two policies for cost-friendly privacy.
The scheme selects and implements the control decision, which has a minimum load variance and energy cost. However, this scheme assumes that the total expected value of battery charging and discharging must be zero, which may not always be possible in practice. There is a loss of RB capacity for each cycle of charging and discharging. Hence, the expected value of total charging and discharging may not be equal to zero.
Random noise-based methods: A RB-based cost-friendly DP was proposed in [111]. The method defines a modified Laplacian noise based on the RB constraints. First, the approach proposed an RB-based DP method. It then considered two cost-friendly DP methods of SMs. The algorithm is designed so that the probability of charging the RB during low unit price increases whereas it decreases during high unit price. To achieve a dynamic pricing policy, they used the regret mechanism of a multi-arm bandit for preserving DP and reducing costs. It was demonstrated that both RB-based DP and cost-friendly DP scheme preserves DP. However, the conditions they used for the probability density function to generate Laplace distributed random noise using a RB is challenging in practice.
Information-theory-based privacy of SMs: An RB-based privacy-preservation method using a Markov decision process is designed in [112]. The method first defines a weighted cost function to study the trade-off between privacy and cost. It then converts the privacy metric as a sum of the sequence of information leakage rate, and uses the Bellman equation for expressing the problem in a special kind of partially observable Markov decision process with belief dependent reward. However, finding a solution of Bellman equation and computing optimal stationary strategy is computationally complex especially for continuous state space. The model provides an upper bound to the optimal trade-off by using rate-distortion optimization and an inner bound by using a greedy algorithm that maximizes the instantaneous reward at each step. However, the method uses binary battery states for performance analysis, i . i . d . (independent and identically distributed) load and price model, which is challenging in practice.
Table 6. Summary of SM privacy-preservation techniques against strong adversaries (prioritizing customer privacy).
Table 6. Summary of SM privacy-preservation techniques against strong adversaries (prioritizing customer privacy).
Ref.GoalsLimitationsMetricEnergy Storage
[31]To hide the load signature by a heuristic methodNo privacy for continuous increase or decrease of demandRegression analysis, cluster classification, Relative entropyRB
[104]Characterize optimal privacy by using information theory in multi-usersNo practical use SM readingMIRES
[106,107]Characterizing the minimum information leakage rate by using Information theoryOnly uses a binary model for performance evaluationMIRB and RES
[94]To preserve approximate DP (using binomial noise) of SMsLess efficient due to frequent charge and discharge of an RBMIRB
[34]To preserve approximate DP (using Laplace distributed random noise) of SMsNo consideration of cost reduction during DPMICascaded RBs
[97]Optimize SM privacy for the residential appliances DRAccurate estimation for the probability distributions of uncertain data is a huge challenge in practiceSum of distance and Coefficient of determinationRB
[98]Using information theory to quantify privacy leakage for cascaded RBsUse of unrealistic load for simulationMICascaded RBs
[99]Information-theory-based optimal RB charging policy for minimum information leakageUse of unrealistic load for performance analysisMIRB
[102]Use of HT to reduce information leakage (information-theory-based)Did not address several basic issues about the SM dataMIRB
[103]Information-theory-based method where users co-operation to enhance privacyRequired a large number of users for practical implementationMIRB
[105]Characterize optimal privacy by using information theoryNo use of real load for simulationMIRES
[32]Satisfies energy demands and suppresses the privacy risk by unauthorized Neyman–Pearson HTThe method chooses the hypothesis at the consumer levelProbability of errorRB, RES
[33]Characterize optimal privacy by Adversarial HTDoes not consider anomaly detectionProbability of errorRB, RES
[36,37]Combined heat and privacy mechanism to mask occupancy detection using the heuristic methodProblematic in the presence of DR serviceMatthews correlation coefficient, Error factorThermal energy storage
[40]Information-theory-based Optimal trade-off between the SG operations and privacyNo consideration of cost reduction for privacyInferential privacyThermal energy storage
[109]Reactive power obfuscation of SMs by using heuristic methodNo consideration of cost reduction during the privacyEntropy, Obfuscation factor, Detection rateReal and reactive energy storage
The method in [113] was designed with optimal energy management strategies that consider the trade-off between the privacy of a consumer and the expected cost of energy storage or a RB. The scheme shows that the problem of designing a cost-efficient and privacy-enhancing energy management strategy can be reformulated as a belief-state Markov decision process problem. The optimal solution can be derived using Bellman dynamic programming. This method uses the expected cost-saving rate and Kullback–Leibler divergence rate for performance analysis [30].
Machine-learning-based methods: A cost-friendly privacy method based on reinforcement learning named RL-BLH was proposed in [114]. The model hides both the high and low-frequency consumption pattern. The method shapes the SM reading to a rectangular pulse of varying magnitude. The RB charges during the low unit price of energy and discharges during the high unit price of energy to reduce energy expenditure. To learn the decision policy for controlling the RB level without any prior knowledge of consumption profile, a reinforcement learning technique was applied. By using a linear combination of a few selected features, the model approximates the optimal action-value function so that actual usage value can be taken into account without quantization. However, the convergence time of the reinforcement learning process is high.

4.2.2. Using Both RB and RES

The energy generated by the RES can also be sold back to the grid during lower energy demand in the house. Hence, RES can be used for cost-friendly privacy of the SM. Cost-friendly privacy using both RB and RES are discussed below.
Heuristic methods: Cost-friendly privacy using a RB and local energy source is discussed in [115]. The model uses energy source with real weather prediction to preserve privacy and increase the efficiency of energy usage. The method obfuscates whether the building is occupied by someone or not. It introduces a decisional model between the RB, the RES, and the UP to optimally preserve privacy and reduce the cost of energy. In this approach, if the current demand is less than the average demand, then an output load is determined that satisfy the demand and charge a portion of the RB. If the current demand is higher than the average demand, the EMU finds a value of an output load to satisfy the demand by using both renewable energy source and the portion of the RB. The method compares the input and output curves. The method does not use any metric for performance measurements, and the policy for reducing the energy costs is not presented.
Information-theory-based privacy of SMs: In [116], SM privacy is studied from the fundamental theoretical perspective, and both RES and RB were considered simultaneously. A method that only uses the RES is first demonstrated. This method depends upon the average and peak power of the RES. An approach with the addition of a RB is then demonstrated. The RB be used to store the surplus energy harvested by the RES. It can also be used to preserve privacy. A finite state model is defined by using a RB and RES.
The information leakage rate is calculated by using the Trellis algorithm. It shows that with the increase of the capacity of the energy harvesting unit, the information leakage reduces while the rate of wasted energy increases. Using the Pareto optimal curve, the model obtains an optimal Pareto boundary for information leakage versus wasted energy rate. Since energy management policies are time-varying, it is impractical to consider a time-invariant policy. The maximum charge/discharge rate of an RB is not considered in designing the policy. The Trellis algorithm also does not consider the fact that an eavesdropper can use the observation to estimate historical energy consumption.

4.2.3. Using Multiple Energy Storage

Multiple energy storage can be used for demand-side energy management. A load hiding mechanism that obscures household consumption was proposed in [117]. In this model, the available household energy storage is used to reduce the cost of load hiding. To reduce the reliance on a RB for load hiding, it combines EV with HVAC systems. A Markov decision process was formulated to account for the stochastic nature of customer demand. The method uses a Q-learning algorithm to adapt the control policies for energy storage units. It formulates a deterministic optimization problem and derives its equivalent convex form to provide an idealized benchmark system. However, this method uses a large capacity RB, which can be costly for the consumers.
In this section, we discuss the techniques that mitigate threats from strong adversaries (by prioritizing cost-friendliness without sacrificing customers’ privacy). Table 7 summarizes the methods discussed in this section.

5. Challenges and Future Research Directions

In this section, we summarize the challenges in SM privacy-preservation methods presented in this survey paper, and provide potential future research directions in the field. We categorize these challenges and research directions into two categories, i.e., privacy-preserving techniques that aim to defend against (i) weak and (ii) strong adversaries.

5.1. Defending against Weak Adversaries

5.1.1. Aggregation-Based Methods with TTP

The main challenge of aggregation-based methods with TTP is that a fully trusted third party has to be present. There is a possibility that the TTP may not be fully trusted. In some cases, it may act as an adversary or have contact with an adversary to gain benefits by sharing personal information of consumers. It also requires additional hardware for the TTP, which results in higher complexities in SMs and the infrastructure. Such approaches can be a technical and strategical burden. To this end, many approaches have proposed the use of privacy models without considering TTPs. The use of a decentralized TTP is a potential future research avenue. In a decentralized system, consumers interested in privacy will act as TTPs.
The information about one customer should be verified by other customers. With this policy, it is important to verify a consumer before adding the consumer to the TTP group. The privacy protection of one consumer depends on the trust of the other consumers.
TTPs can perform secure aggregation to confirm the privacy of SMs. However, these methods mainly focus on the privacy of SMs. It gives less priority to the utility of data. The SM complexity is lower in case of secure aggregation approaches with TTP. Most of the aggregation approaches with TTP partially use HE, resulting in higher complexities. A better future approach would allow the UP and consumers to identify if a TTP has compromised the privacy by using the SM data for any other purposes.

5.1.2. Cryptography-Based Approaches

Cryptography-based approaches without TTP typically requires sophisticated computation software and infrastructure. In cryptography-based privacy-preserving billing, operations, and VAS, most of the approaches guarantee data confidentiality and integrity. However, they do not ensure resistance against sybil attack, non-repudiation, and auditability. Achieving this level of security can be very difficult while preserving the privacy of SMs. Future research should focus on achieving resistance against these attacks while preserving the privacy of SMs. Data tampering, key management, and utility are important issues to consider for efficient privacy preservation of SMs.
We can argue that aggregation approaches are critical in preserving the privacy of SMs. In aggregation-based schemes, consumers can be divided into groups. Each group aggregates their SM readings and send them to the UP. However, billing can be an issue. It is important to use high-resolution of individual SM data for highly accurate billing. The UPs have control over the transmission systems. They can embed the required sensors to know the energy requested by the houses. One of the exciting future directions can be aggregating the SM data by using the SM appliances used in common households. The UP can provide software that is compatible with the SM devices. Both billing accuracy and privacy preservation can then be ensured.

5.1.3. Homomorphic Encryption (HE)

There are two types of HE, namely a partial homomorphic cryptosystem and a full homomorphic cryptosystem. A partially homomorphic system can perform either addition or multiplication whereas a full homomorphic system can perform both. Without any knowledge of the secret key, HE can perform computation on encrypted messages. The aggregator node is unable to read the actual information collected by the SM. Hence, HE schemes are secure against internal attacks.
They can overcome the problems with deterministic cryptosystems. Most of the schemes use HE to preserve privacy of SMs. However, HE schemes do not provide verifiable computing. SM data is sent to the aggregator node and the node compute some operations on the ciphertext. SM cannot verify the computation performed by the aggregator. Future research should focus on an additional mechanism to overcome this problem and enable the widespread use of elliptic curve cryptography for SM privacy.

5.1.4. Random Noise-Based Privacy Mechanisms

The addition of random noise may affect the billing accuracy. The main challenge is determining the amount of noise that need to be added for an optimal trade-off between privacy and utility. An accuracy loss occurs for adding random noise to preserve the DP. There is a direct relationship between the induced noise power and the level of DP that the model can achieve. In some scenarios, the result may become lost in the noise and become useless for the utility and billing. DR-based techniques cannot properly function when random noise is added. The trade-offs between DP privacy and utility should be carefully considered and evaluated as part of future work.

5.1.5. Data Management for Operations

One of the future research directions for privacy-preserving billing is the use of effective algorithms that operate the smart electric devices to preserve privacy. There is limited work in this area. For this mechanism to work, consumers need to be more co-operative. Rewards can be provided based on the cooperation of the consumers, and different trusted software programs can be used for accurate computation.
Since SM data are used in real-time for operations, it is necessary that the solution should have low computational overhead and can support distributed operations. The UP should manage and operate the SM data, and the entity itself (either UP or TTP) that manages the SM data should be fully trusted. Future research should investigate approaches that analyse the fundamental limitations of obfuscation-based approaches. Another possible solution is implementing prediction-based approaches where the predicted energy consumption for every TS are used for different operations.

5.1.6. Blockchain-Based Methods

Blockchain exhibits a distributed framework in the form of public ledgers and miners. Limited studies have explored Blockchain-based methods for SM privacy. Blockchain-based methods typically incur higher power consumption, higher computation overhead, and scalability issues. Future research should focus on addressing these issues to make Blockchain more deployable in SMs.
Future research should also focus on privacy selling. Different energy consumers have different priorities for privacy. Some consumers and organizations may prioritize financial gains over privacy. Hence, the UP can offer monetary benefits for the consumers to share their energy consumption data by considering the variation for the priority of privacy. The monetary benefits may vary based on the level of sensitive information and the time of information shared. By adopting this approach, the UP will be able to accurately measure the amount of energy required to fulfil the demand of the consumers. The consumers who prioritize privacy are also able to have control over their level of privacy.
Privacy-preservation methods for RES-based households are in its early stage and have several limitations. Future research should overcome these limitations. For example, an RB can be used to hide the trace of the energy consumption from the RES to preserve the privacy of consumers. The RB can filter the amount of renewable energy added with the demand of the house. The RB can also store renewable energy and use it during the peak periods when the demand is high.

5.2. Defending against Strong Adversaries

5.2.1. Constraints of Energy Storage Units

Energy storage has constraints, such as limited capacity and the maximum charge–discharge rate. For example, a RB has a maximum charge–discharge rate and limited capacity. There is also a limited capacity for energy management in solar panels, HVAC, and real/reactive power. The main challenge of managing demand-side energy is the use of limited capacity energy storage to preserve the privacy of SMs. However, this can be a challenge due to the constraints in energy storage. It is important to investigate the use of other available energy storage devices for energy management.

5.2.2. Economic Privacy by Energy Storage

To defend against a strong adversary, consumers need to pay for an energy storage unit. There is maintenance cost and depreciation for the energy storage units. Cost-friendly privacy for demand-side energy management was proposed to overcome this issue. It is important to confirm that cost savings should be greater than or equal to the costs of using energy storage to preserve the privacy of SMs. Future directions should focus on comparing the costs of using an energy storage units for privacy with the cost savings by using the proposed model.

5.2.3. Information Theory-Based Approaches

Information-theory-based approaches suffer from reproducibility of research results in the SG domain. Existing methods evaluate their performance by simulations using a binary load model. None of them use real SM data for performance evaluation. Future research should focus on using real SM data for simulations and aim to implement the model in the real-world.

5.2.4. Differential Privacy

Due to the constraints of the energy storage (limited capacity and charge–discharge rate), these works consider the approximate DP. The main challenge for RB-based DP is the constraints of the energy storage. Approximate DP introduces an error to standard DP. By properly designing an EMU to generate random noise for approximate DP, it is possible to reduce the error introduced in approximate DP. Future research directions should focus on designing better approximate DP using limited capacity RB, RES, or both.

5.2.5. Demand-Side Energy Management for DR

Future techniques could use both RB and RES for privacy-preserving DR of SMs. Renewable energy generated by the RES can be used to supply the consumption during the DR program. The extent of cost saving depends on the amount of demand reduction for a particular period for DR. By using the renewable energy stored in the RB, consumers can obtain the maximum energy reduction during the DR response period to achieve the maximum cost saving. It is possible to obtain cost-saving privacy for the DR program of the SM. To overcome the problems of SM data tampering, demand-side energy management using energy storage have already been proposed in the literature. However, demand-side energy management for DR is relatively new and could be explored further as part of future work.

5.2.6. Use of Reactive Power with Energy Storage

SMs can measure reactive power with real power. Reactive power recorded in the SM can be used to infer the private information of a consumer [109]. The method in [109] considers reactive energy for SM privacy. It is important for future research to consider real and reactive power. We can consider energy management by using both real and reactive power to mask SM data. Energy management should also consider the cost reduction during the privacy preservation of SMs. It is essential to consider the management of reactive power by using reactive and capacitive devices to reduce the costs incurred in consumers households.

5.2.7. Use of Repetitive Output Shape

From the existing methods reviewed in this paper, we observe that some approaches attempt to manage the energy storage device in such a way so that the output of the SM is always a constant value [28,29,31]. This can remove the trace of individual energy usage of electric appliances. Other methods attempt to make the output of the SM as a rectangle shape to overcome the trace of electricity appliances usage [114].
Future work can focus on using energy storage units to make the output of an SM as a pulse or a saw-tooth wave to remove the trace of electrical appliances from the output of the SM data. It is very difficult to make the output of the SM data to a constant value due to the constraints of the energy storage devices. However, it is comparatively easy to make the output of the SM data to a repetitive shape (such as a rectangular, pulse wave, or saw-tooth wave) by using limited capacity energy storage units. These outputs are variable, and small changes in these outputs are less observable compared to a constant output shape.

6. Conclusions

Recent developments in SG technologies have sparked extensive debates and discussions on SM privacy worldwide. A wide range of privacy-preservation techniques and algorithms have been proposed with emerging approaches becoming more complex and sophisticated. To this end, this paper reviewed the current status of SM privacy and extensively surveyed the state-of-the-art privacy-preserving techniques published in the literature over the past decade.
In this paper, we categorized these techniques based on the types of privacy threats, namely weak and strong adversaries, each with a varying degree of algorithmic and implementation complexity. Our review concluded that most techniques that aim to defend against weak adversaries are cryptography and aggregation-based methods. These privacy-preserving approaches typically involve altering SM data, which can be problematic in certain use cases. Techniques to defend against strong adversaries are primarily based on demand-side energy management techniques.
These techniques preserve customers’ privacy from the attackers, any third-parties involved, and the UP itself while also being immediately applicable to the existing SG infrastructure. In reality, the practicality of a particular privacy-preserving technique also depends heavily on the deployment costs, prompting our review on various cost-friendly privacy protection mechanisms. Finally, we summarized the current challenges in SM privacy and outlined potential future directions for the research community.

Author Contributions

Conceptualization, J.K., M.B.H., I.N. and Y.X.; methodology, J.K. and M.B.H.; investigation, J.K. and M.B.H.; resources, Y.X.; writing—original draft preparation, J.K. and M.B.H.; writing—review and editing, J.K. and Y.X.; visualization, I.N.; supervision, Y.X.; project administration, Y.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AgGAggregation
AMIAdvanced metering infrastructure
AVISPAAutomated validation of internet security protocols and applications
BANBuilding area network
BLHBattery-based load hiding
BPBilinear paring
CCControl centre
CCOComputation and communication overhead
CDHComputational diffie-Hellman
CHCluster head
COComputation overhead
CoOCommunication overhead
CoSCost saving
CSCharging station
DPDifferential privacy
DRDemand response
EMUEnergy management unit
EncEncryption
ETDEnergy theft detection
EVElectric vehicle
HANHome area network
HEHomomorphic encryption
HTHypothesis testing
HVACHeating, ventilation, and air conditioning
LALocal aggregator
MIMutual information
MPCModel predictive controller
MRPLMaximum reported peak load
NANNeighbouring area network
NILMNon-intrusive load monitoring
NTRUNumber theory research unit
OLEOnion-level encryption
PLCPower line communication
PPNPrivacy-preserving nodes
RBRechargeable battery
RefReference
RESRenewable energy sources
RMSERoot mean square error
RORReal-or-random model
RTURemote terminal unit
SDStatistical distance
SDNSoftware-defined network
SGSmart grid
SMSmart meter
SoCState of charge
SQLStructured query language
TSTime slot
TTPTrusted third party
UPUtility provider
VASValue added services
VBVehicle battery
WANWide area network
ZKPZero-knowledge proofs

References

  1. Hossain, M.B.; Natgunanathan, I.; Xiang, Y.; Yang, L.-X.; Huang, G. Enhanced smart meter privacy protection using rechargeable batteries. IEEE Internet Things J. 2019, 6, 7079–7092. [Google Scholar] [CrossRef]
  2. Hossain, M.B.; Natgunanathan, I.; Xiang, Y.; Zhang, Y. Cost-Friendly differential privacy of smart meters using energy storage and harvesting devices. IEEE Trans. Serv. Comput. 2021, 15, 2648–2657. [Google Scholar] [CrossRef]
  3. Natgunanathan, I.; Hossain, M.B.; Xiang, Y.; Gao, L.; Peng, D.; Li, J. Progressive average based smart meter privacy enhancement using rechargeable batteries. IEEE Internet Things J. 2019, 6, 9816–9828. [Google Scholar] [CrossRef]
  4. Chopra, A.; Kundra, V.; Weiser, P. A Policy Framework for the 21st Century Grid: Enabling Our Secure Energy Future; Report; Executive Office of the President of the United States: Washington, DC, USA, 2011. [Google Scholar]
  5. Han, X.; You, S.; Thordarson, F.; Tackie, D.V.; Østberg, S.M.; Pedersen, O.M.; Bindner, H.W.; Nordentoft, N.C. Real-time measurements and their effects on state estimation of distribution power system. In Proceedings of the IEEE PES ISGT Europe 2013, Lyngby, Denmark, 6–9 October 2013; pp. 1–5. [Google Scholar]
  6. Hess, D.J.; Coley, J. Wireless smart meters and public acceptance: The environment, limited choices, and precautionary politics. Public Underst. Sci. 2014, 23, 688–702. [Google Scholar] [CrossRef] [Green Version]
  7. Wang, Y.; Chen, Q.; Hong, T.; Kang, C. Review of Smart Meter Data Analytics: Applications, Methodologies, Challenges. IEEE Trans. Smart Grid 2019, 10, 3125–3148. [Google Scholar] [CrossRef] [Green Version]
  8. Erkin, Z.; Troncoso-Pastoriza, J.; Lagendijk, R.; Perez-Gonzalez, F. Privacy-preserving data aggregation in smart metering systems: An overview. IEEE Signal Process. Mag. 2013, 30, 75–86. [Google Scholar] [CrossRef]
  9. Saputro, N.; Akkaya, K. On preserving user privacy in smart grid advanced metering infrastructure applications. Secur. Commun. Netw. 2014, 7, 206–220. [Google Scholar] [CrossRef]
  10. Zeadally, S.; Pathan, A.; Alcaraz, C.; Badra, M. Towards privacy protection in smart grid. Wirel. Pers. Commun. Int. J. 2013, 73, 23–50. [Google Scholar] [CrossRef]
  11. Finster, S.; Baumgart, I. Privacy-aware smart metering: A survey. IEEE Commun. Surv. Tutor. 2015, 17, 1088–1101. [Google Scholar] [CrossRef]
  12. Zhu, L.; Zhang, Z.; Qin, Z.; Weng, J.; Ren, K. Privacy protection using a rechargeable battery for energy consumption in smart grids. IEEE Netw. 2017, 31, 59–63. [Google Scholar] [CrossRef]
  13. Asghar, M.R.; Dán, G.; Miorandi, D.; Chlamtac, I. Smart meter data privacy: A survey. IEEE Commun. Surv. Tutor. 2017, 19, 2820–2835. [Google Scholar] [CrossRef]
  14. Abdalzaher, M.S.; Fouda, M.M.; Ibrahem, M.I. Data privacy preservation and security in smart metering systems. Energies 2022, 15, 7419. [Google Scholar] [CrossRef]
  15. Dong, R.; Hao, S.; Yang, T.H.; Tang, Z.; Yan, Y.; Chen, J. Recent Advances in Smart Meter: Data Analysis, Privacy Preservation and Applications. In Proceedings of the Big Data and Security: Third International Conference (ICBDS 2021), Shenzhen, China, 26–28 November 2021; pp. 105–114. [Google Scholar]
  16. Ferrag, M.A.; Maglaras, L.A.; Janicke, H.; Jiang, J.; Shu, L. A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustain. Cities Soc. 2018, 38, 806–835. [Google Scholar] [CrossRef]
  17. Huang, Z.; Zhu, T.; Irwin, D.; Mishra, A.; Menasche, D.; Shenoy, P. Minimizing transmission loss in smart microgrids by sharing renewable energy. J. ACM Trans. Cyber-Phys. Syst. 2017, 1, 1–22. [Google Scholar] [CrossRef] [Green Version]
  18. Rehmani, M.H.; Reisslein, M.; Rachedi, A.; Erol-Kantarci, M.; Radenkovic, M. Integrating renewable energy resources into the smart grid: Recent developments in information and communication technologies. IEEE Trans. Ind. Inform. 2018, 14, 2814–2825. [Google Scholar] [CrossRef]
  19. Chen, J.; Zhu, Q. A game-theoretic framework for resilient and distributed generation control of renewable energies in microgrids. IEEE Trans. Smart Grid 2017, 8, 285–295. [Google Scholar] [CrossRef]
  20. Hassan, M.U.; Rehmani, M.H.; Kotagiri, R.; Zhang, J.; Chen, J. Differential privacy for renewable energy resources based smart metering. J. Parallel Distrib. Comput. 2019, 131, 69–80. [Google Scholar] [CrossRef]
  21. Giaconi, G.; Gündüz, D. Smart meter privacy with renewable energy and a finite capacity battery. In Proceedings of the 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Edinburgh, UK, 3–6 July 2016; pp. 1–5. [Google Scholar]
  22. Jawurek, M.; Johns, M.; Kerschbaum, F. Plug-in privacy for smart metering billing. In Privacy Enhancing Technologies, Proceedings of the 11th International Symposium, PETS 2011, Waterloo, ON, Canada, 27–29 July 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 192–210. [Google Scholar]
  23. Fan, C.-I.; Huang, S.-Y.; Lai, Y.-L. Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Ind. Inform. 2014, 10, 666–675. [Google Scholar] [CrossRef]
  24. Saxena, N.; Grijalva, S. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication. IEEE Trans. Ind. Inform. 2017, 13, 1482–1491. [Google Scholar] [CrossRef]
  25. Cheung, H.; Yang, C.; Cheung, H. New smart-grid operation-based network access control. In Proceedings of the 2015 IEEE Energy Conversion Congress and Exposition (ECCE), Montreal, QC, Canada, 20–24 September 2015; pp. 1203–1207. [Google Scholar]
  26. Chin, J.-X.; Rubira, T.T.D.; Hug, G. Privacy-protecting energy management unit through model-distribution predictive control. IEEE Trans. Smart Grid 2017, 8, 3084–3093. [Google Scholar] [CrossRef] [Green Version]
  27. Galka, A.; Ozaki, T.; Yamashita, O. A new approach to mutual information between pairs of time series. In Proceedings of the International Symposium on Nonlinear Theory and Its Applications, Bruges, Belgium, 18–21 October 2005; pp. 626–629. [Google Scholar]
  28. Tan, O.; Gündüz, D.; Gómez-Vilardebó, J. Optimal privacy-cost trade-off in demand-side management with storage. In Proceedings of the IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Stockholm, Sweden, 31 August 2015; pp. 370–374. [Google Scholar]
  29. Tan, O.; Gómez-Vilardebó, J.; Gündüz, D. Privacy-cost trade-offs in demand-side management with storage. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1458–1469. [Google Scholar] [CrossRef] [Green Version]
  30. Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley & Sons, Inc.: New York, NY, USA, 2006. [Google Scholar]
  31. Kalogridis, G.; Efthymiou, C.; Denic, S.Z.; Lewis, T.A.; Cepeda, R. Privacy for smart meters: Towards undetectable appliance load signatures. In Proceedings of the first IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, USA, 4–6 October 2010; pp. 232–237. [Google Scholar]
  32. Li, Z.; Oechtering, T.J. Privacy on hypothesis testing in smart grids. In Proceedings of the IEEE Information Theory Workshop, Jeju, Republic of Korea, 11–15 October 2015; pp. 337–341. [Google Scholar]
  33. Li, Z.; Oechtering, T.J.; Gündüz, D. Smart meter privacy based on adversarial hypothesis testing. In Proceedings of the IEEE ISIT, Aachen, Germany, 25–30 June 2017; pp. 774–778. [Google Scholar]
  34. Backes, M.; Meiser, S. Differentially private smart metering with battery recharging. In Proceedings of the 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, 12–13 September 2013; pp. 194–212. [Google Scholar]
  35. Matthews, B. Comparison of the predicted and observed secondary structure of T4 phage lysozyme. Biochim. Biophys. Acta 1975, 405, 442–451. [Google Scholar] [CrossRef] [PubMed]
  36. Chen, D.; Irwin, D.; Shenoy, P.; Albrecht, J. Combined heat and privacy: Preventing occupancy detection from smart meters. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), Budapest, Hungary, 24–28 March 2014; pp. 208–215. [Google Scholar]
  37. Chen, D.; Kalra, S.; Irwin, D.; Shenoy, P.; Albrecht, J. Preventing occupancy detection from smart meters. IEEE Trans. Smart Grid 2015, 6, 2426–2434. [Google Scholar] [CrossRef]
  38. Anderson, H. Efficiency versus protection in a general randomized response model. Scand. J. Stat. 1977, 4, 11–19. [Google Scholar]
  39. Farokhi, F.; Sandberg, H. Fisher information as a measure of privacy: Preserving privacy of households with smart meters using batteries. IEEE Trans. Smart Grid 2018, 9, 4726–4734. [Google Scholar] [CrossRef]
  40. Dong, R.; Cardenas, A.A.; Ratliff, L.J.; Ohlsson, H.; Sastry, S.S. Quantifying the utility-privacy tradeoff in the smart grid. arXiv 2014, arXiv:1406.2568. [Google Scholar]
  41. Sankar, L.; Rajagopalan, S.; Poor, H. Utility-privacy tradeoffs in databases: An information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 2013, 8, 838–852. [Google Scholar] [CrossRef] [Green Version]
  42. Rafiei, M.; Eftekhari, S. A practical smart metering using combination of power line communication (PLC) and wifi protocols. In Proceedings of the 17th Conference on Electrical Power Distribution Networks, Tehran, Iran, 2–3 May 2012; pp. 1–5. [Google Scholar]
  43. Yang, L.; Chen, X.; Zhang, J.; Poor, H.V. Optimal privacy preserving energy management for smart meters. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Toronto, ON, Canada, 27 April 2014–2 May 2014; pp. 513–521. [Google Scholar]
  44. Wang, X.-F.; Mu, Y.; Chen, R.-M. An efficient privacy-preserving aggregation and billing protocol for smart grid. Secur. Commun. Netw. 2016, 9, 4536–4547. [Google Scholar] [CrossRef]
  45. Borges, F.; Demirel, D.; Böck, L.; Buchmann, J.; Mühlhäuser, M. A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Funchal, Portugal, 23–26 June 2014; pp. 1–6. [Google Scholar]
  46. Li, H.; Lin, X.; Yang, H.; Liang, X.; Lu, R.; Shen, X. EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2053–2064. [Google Scholar] [CrossRef] [Green Version]
  47. Won, J.; Ma, C.Y.T.; Yau, D.K.Y.; Rao, N.S.V. Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach. IEEE/ACM Trans. Netw. 2016, 24, 1661–1674. [Google Scholar] [CrossRef]
  48. Tsai, J.-L.; Lo, N.-W. Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 2016, 7, 906–914. [Google Scholar] [CrossRef]
  49. Odelu, V.; Das, A.K.; Wazid, M.; Conti, M. Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 2018, 9, 1900–1910. [Google Scholar] [CrossRef]
  50. Deebak, B.D.; Memon, F.H.; Cheng, X.; Dev, K.; Hu, J.; Khowaja, S.A.; Qureshi, N.M.F.; Choi, K.H. Seamless privacy-preservation and authentication framework for IoT-enabled smart eHealth systems. Sustain. Cities Soc. 2022, 80, 103661. [Google Scholar] [CrossRef]
  51. Abdallah, A.; Shen, X.S. A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans. Smart Grid 2018, 9, 396–405. [Google Scholar] [CrossRef]
  52. Abdallah, A.R.; Shen, X.S. A lightweight lattice-based security and privacy-preserving scheme for smart grid. In Proceedings of the IEEE GLOBECOM, Austin, TX, USA, 8–12 December 2014; pp. 668–674. [Google Scholar]
  53. Abdallah, A.; Shen, X. Lightweight security and privacy preserving scheme for smart grid customer-side networks. IEEE Trans. Smart Grid 2017, 8, 1064–1074. [Google Scholar] [CrossRef]
  54. Hoffstein, J.; Lieman, D.; Pipher, J.; Silverman, J. NTRU: A public key cryptosystem. In Proceedings of the EUROCRYPT, Innsbruck, Austria, 6–10 May 2001; pp. 211–225. [Google Scholar]
  55. Mustafa, M.A.; Zhang, N.; Kalogridis, G.; Fan, Z. DEP2SA: A decentralized efficient privacy-preserving and selective aggregation scheme in advanced metering infrastructure. IEEE Access 2015, 3, 2828–2846. [Google Scholar] [CrossRef]
  56. Jo, H.J.; Kim, I.S.; Lee, D.H. Efficient and privacy-preserving metering protocols for smart grid systems. IEEE Trans. Smart Grid 2016, 7, 1732–1742. [Google Scholar] [CrossRef]
  57. Zhao, J.; Liu, J.; Qin, Z.; Ren, K. Privacy protection scheme based on remote anonymous attestation for trusted smart meters. IEEE Trans. Smart Grid 2018, 9, 3313–3320. [Google Scholar] [CrossRef]
  58. Debnath, A.; Singaravelu, P.; Verma, S. Privacy in wireless sensor networks using ring signature. J. King Saud Univ. Comput. Inf. Sci. 2014, 26, 228–236. [Google Scholar] [CrossRef] [Green Version]
  59. Gong, Y.; Cai, Y.; Guo, Y.; Fang, Y. A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans. Smart Grid 2016, 7, 1304–1313. [Google Scholar] [CrossRef]
  60. Yao, D.; Wen, M.; Liang, X.; Fu, Z.; Zhang, K.; Yang, B. Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J. 2019, 6, 7659–7669. [Google Scholar] [CrossRef]
  61. Abdallah, A.R.; Shen, X.S. Lightweight lattice-based homomorphic privacy-preserving aggregation scheme for home area networks. In Proceedings of the WCSP, Hefei, China, 23–25 October 2014; pp. 1–6. [Google Scholar]
  62. Sui, Z.; Niedermeier, M.; de Meer, H. TAI: A threshold-based anonymous identification scheme for demand-response in smart grids. IEEE Trans. Smart Grid 2018, 9, 3496–3506. [Google Scholar] [CrossRef]
  63. Balli, M.; Uludag, S.; Selcuk, A.; Tavli, B. Distributed multi-unit privacy assured bidding (PAB) for smart grid demand response programs. IEEE Trans. Smart Grid 2018, 9, 4119–4127. [Google Scholar] [CrossRef] [Green Version]
  64. Bohli, J.-M.; Sorge, C.; Ugus, O. A privacy model for smart metering. In Proceedings of the IEEE International Conference on Communications Workshops (ICCW), Cape Town, South Africa, 23–27 May 2010; pp. 1–5. [Google Scholar]
  65. He, X.; Zhang, X.; Kuo, C. A distortion-based approach to privacy preserving metering in smart grids. IEEE Access 2013, 1, 67–78. [Google Scholar]
  66. Mashima, D.; Roy, A. Privacy preserving disclosure of authenticated energy usage data. In Proceedings of the IEEE International Conference on Smart Grid Communications, Venice, Italy, 3–6 November 2014; pp. 866–871. [Google Scholar]
  67. Barbosa, P.; Brito, A.; Almeida, H. A technique to provide differential privacy for appliance usage in smart metering. Inf. Sci. 2016, 370–371, 355–367. [Google Scholar] [CrossRef]
  68. Eibl, G.; Engel, D. Differential privacy for real smart metering data. Comput. Sci.-Res. Dev. 2017, 32, 173–182. [Google Scholar] [CrossRef] [Green Version]
  69. Ni, J.; Zhang, K.; Alharbi, K.; Lin, X.; Zhang, N.; Shen, X.S. Differentially private smart metering with fault tolerance and range-based filtering. IEEE Trans. Smart Grid 2017, 8, 2483–2493. [Google Scholar] [CrossRef]
  70. Liu, J.; Asokan, N.; Pinkas, B. Secure deduplication of encrypted data without additional independent servers. In Proceedings of the ACM CCS, Denver, CO, USA, 12–16 October 2015; pp. 874–885. [Google Scholar]
  71. Wen, M.; Yao, D.; Li, B.; Lu, R. State estimation based energy theft detection scheme with privacy preservation in smart grid. In Proceedings of the IEEE International Conference Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  72. Sankar, L.; Rajagopalan, S.R.; Mohajer, S.; Poor, H.V. Smart meter privacy: A theoretical framework. IEEE Trans. Smart Grid 2013, 4, 837–846. [Google Scholar] [CrossRef]
  73. Mashima, D. Authenticated down-sampling for privacy-preserving energy usage data sharing. In Proceedings of the IEEE International Conference on Smart Grid Communications, Miami, FL, USA, 2–5 November 2015; pp. 605–610. [Google Scholar]
  74. Lin, H.; Fang, Y. Privacy-aware profiling and statistical data extraction for smart sustainable energy systems. IEEE Trans. Smart Grid 2013, 4, 332–340. [Google Scholar] [CrossRef]
  75. Guan, Z.; Si, G.; Zhang, X.; Wu, L.; Guizani, N.; Du, X.; Ma, Y. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 2018, 56, 82–88. [Google Scholar] [CrossRef] [Green Version]
  76. Zhang, S.; Rong, J.; Wang, B. A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. Int. J. Elec. Power Energy Syst. 2020, 121, 106–140. [Google Scholar] [CrossRef]
  77. Chim, T.W.; Yiu, S.-M.; Li, V.O.K.; Hui, L.C.K.; Zhong, J. PRGA: Privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid. IEEE Trans. Dependable Secur. Comput. 2015, 12, 85–97. [Google Scholar]
  78. Savi, M.; Rottondi, C.; Verticale, G. Evaluation of the precision privacy tradeoff of data perturbation for smart metering. IEEE Trans. Smart Grid 2015, 6, 2409–2416. [Google Scholar] [CrossRef] [Green Version]
  79. Diao, F.; Zhang, F.; Cheng, X. A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans. Smart Grid 2015, 6, 461–467. [Google Scholar] [CrossRef]
  80. Camenisch, J.; Lysyanskaya, A. A signature scheme with efficient protocols. In Proceedings of the Third International Conference Security Communication Network, Amalfi, Italy, 11–13 September 2003; pp. 268–289. [Google Scholar]
  81. Knirsch, F.; Eibl, G.; Engel, D. Error-resilient masking approaches for privacy preserving data aggregation. IEEE Trans. Smart Grid 2016, 9, 3351–3361. [Google Scholar] [CrossRef]
  82. Tonyali, S.; Cakmak, O.; Akkaya, K.; Mahmoud, M.M.E.A.; Guvenc, I. Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks. IEEE Internet Things J. 2016, 3, 709–719. [Google Scholar] [CrossRef]
  83. Boustani, A.; Maiti, A.; Jazi, S.Y.; Jadliwala, M.; Namboodiri, V. Seer grid: Privacy and utility implications of two-level load prediction in smart grids. IEEE Trans. Parallel Distrib. Syst. 2017, 28, 546–557. [Google Scholar] [CrossRef]
  84. Mahmoud, M.M.E.A.; Saputro, N.; Akula, P.; Akkaya, K. Privacy-preserving power injection over a hybrid AMI/LTE smart grid network. IEEE Internet Things J. 2017, 4, 870–880. [Google Scholar] [CrossRef]
  85. Rahman, M.A.; Manshaei, M.H.; Al-Shaer, E.S.; Shehab, M. Secure and private data aggregation for energy consumption scheduling in smart grids. IEEE Trans. Dependable Secur. Comput. 2017, 14, 221–234. [Google Scholar] [CrossRef]
  86. Hong, Y.; Liu, W.M.; Wang, L. Privacy preserving smart meter streaming against information leakage of appliance status. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2227–2241. [Google Scholar] [CrossRef]
  87. Kua, J.; Armitage, G.; Branch, P. A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming Over HTTP. IEEE Commun. Surv. Tutor. 2017, 19, 1842–1866. [Google Scholar] [CrossRef]
  88. Kua, J.; Nguyen, S.H.; Armitage, G.; Branch, P. Using Active Queue Management to Assist IoT Application Flows in Home Broadband Networks. IEEE Internet Things J. 2017, 4, 1399–1407. [Google Scholar] [CrossRef]
  89. Kua, J.; Armitage, G.; Branch, P.; However, J. Adaptive Chunklets and AQM for higher-performance content streaming. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 2019, 15, 1–24. [Google Scholar] [CrossRef] [Green Version]
  90. Mustafa, M.A.; Cleemput, S.; Aly, A.; Abidin, A. A secure and privacy-preserving protocol for smart metering operational data collection. IEEE Trans. Smart Grid 2019, 10, 6481–6490. [Google Scholar] [CrossRef] [Green Version]
  91. Ruj, S.; Nayak, A. A decentralized security framework for data aggregation and access control in smart grids. IEEE Trans. Smart Grid 2013, 4, 196–205. [Google Scholar] [CrossRef]
  92. Yassine, A.; Shirehjini, A.A.N.; Shirmohammadi, S. Smart meters big data: Game theoretic model for fair data sharing in deregulated smart grids. IEEE Access 2015, 3, 2743–2754. [Google Scholar] [CrossRef]
  93. Engel, D.; Eibl, G. Wavelet-based multiresolution smart meter privacy. IEEE Trans. Smart Grid 2017, 8, 1710–1721. [Google Scholar] [CrossRef]
  94. Zhao, J.; Jung, T.; Wang, Y.; Li, X. Achieving differential privacy of data disclosure in the smart grid. In Proceedings of the IEEE INFOCOM, Toronto, ON, Canada, 27 April 2014–2 May 2014; pp. 504–512. [Google Scholar]
  95. McLaughlin, S.; McDaniel, P.; Aiello, W. Protecting consumer privacy from electric load monitoring. In Proceedings of the 18th Conference on Computer and Communications Security (CCS), New York, NY, USA, 17–21 October 2011; pp. 87–98. [Google Scholar]
  96. Yang, W.; Li, N.; Qi, Y.; Qardaji, W.; McLaughlin, S.; McDaniel, P. Minimizing private data disclosures in the smart grid. In Proceedings of the CCS ’12: Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 415–427. [Google Scholar]
  97. Chen, Z.; Wu, L. Residential appliance DR energy management with electric privacy protection by online stochastic optimization. IEEE Trans. Smart Grid 2013, 4, 1861–1869. [Google Scholar] [CrossRef]
  98. Liu, Y.H.; Lee, S.-H.; Khisti, A. Information-theoretic privacy in smart metering systems using cascaded rechargeable batteries. IEEE Signal Process. Lett. 2017, 24, 314–318. [Google Scholar] [CrossRef]
  99. Li, S.; Khisti, A. A MahaInformation-theoretic privacy for smart metering systems with a rechargeable battery. IEEE Trans. Inf. Theory 2018, 64, 3679–3695. [Google Scholar] [CrossRef] [Green Version]
  100. Bertsekas, D.P. Dynamic Programming and Optimal Control; Athena Scientific: Belmont, MA, USA, 1995; Volume 1. [Google Scholar]
  101. Shao, J. Mathematical Statistics; Springer Texts in Statistics; Springer: New York, NY, USA, 2003. [Google Scholar]
  102. Salehkalaibar, S.; Aminifar, F.; Shahidehpour, M. Hypothesis testing for privacy of smart meters with side information. IEEE Trans. Smart Grid 2019, 10, 2059–2067. [Google Scholar] [CrossRef]
  103. Cho, K.-H.; Lee, S.-H.; Khisti, A. Effect of user cooperation on smart meter privacy with rechargeable batteries. IEEE Signal Process. Lett. 2019, 26, 971–975. [Google Scholar] [CrossRef]
  104. Gómez-Vilardebó, J.; Gündüz, D. Smart meter privacy for multiple users in the presence of an alternative energy source. IEEE Trans. Inf. Forensics Secur. 2015, 10, 132–141. [Google Scholar] [CrossRef] [Green Version]
  105. Gündüz, D.; Gómez-Vilardebó, J. Smart meter privacy in the presence of an alternative energy source. In Proceedings of the IEEE International Conference on Communications, Budapest, Hungary, 9–13 June 2013; pp. 2027–2031. [Google Scholar]
  106. Giaconi, G.; Gündüz, D.; Poor, H.V. Smart meter privacy with renewable energy and an energy storage device. IEEE Trans. Inf. Forensics Secur. 2018, 13, 129–142. [Google Scholar] [CrossRef]
  107. Giaconi, G.; Gündüz, D.; Poor, H.V. Smart meter privacy with an energy harvesting device and instantaneous power constraints. In Proceedings of the IEEE International Conference on Communications, London, UK, 8–12 June 2015; pp. 7216–7221. [Google Scholar]
  108. Blahut, R.E. Principles and Practice of Information Theory; Addison-Wesley: Boston, MA, USA, 1987. [Google Scholar]
  109. Fan, J.; Li, Q.; Cao, G. Privacy disclosure through smart meters: Reactive power based attack and defense. In Proceedings of the IEEE International Conference on Dependable Systems and Networks, DSN, Denver, CO, USA, 26–29 June 2017; pp. 13–24. [Google Scholar]
  110. Yang, L.; Chen, X.; Zhang, J.; Poor, H.V. Cost-effective and privacy preserving energy management for smart meters. IEEE Trans. Smart Grid 2015, 6, 486–495. [Google Scholar] [CrossRef] [Green Version]
  111. Zhang, Z.; Qin, Z.; Zhu, L.; Weng, J.; Ren, K. Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise. IEEE Trans. Smart Grid 2017, 8, 619–626. [Google Scholar] [CrossRef]
  112. Yao, J.; Venkitasubramaniam, P. On the privacy-cost tradeoff of an in-home power storage mechanism. In Proceedings of the 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 2–4 October 2013; pp. 115–122. [Google Scholar]
  113. You, Y.; Li, Z.; Oechtering, T.J. Optimal privacy-enhancing and cost-efficient energy management strategies for smart grid consumers. In Proceedings of the IEEE SSP, Freiburg im Breisgau, Germany, 10–13 June 2018; pp. 826–830. [Google Scholar]
  114. Koo, J.; Lin, X.; Bagchi, S. RL-BLH: Learning-based battery control for cost savings and privacy preservation for smart meters. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, 26–29 June 2017; pp. 519–530. [Google Scholar]
  115. Attia, M.; Senouci, S.M.; Aglzim, E. Towards using local energy to enhance smart meters privacy. In Proceedings of the IEEE ICC, Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  116. Tan, O.; Gündüz, D.; Poor, H.V. Increasing smart meter privacy through energy harvesting and storage devices. IEEE J. Sel. Areas Commun. 2013, 31, 1331–1341. [Google Scholar] [CrossRef] [Green Version]
  117. Sun, Y.; Lampe, L.; Wong, V.W.S. Smart meter privacy: Exploiting the potential of household energy storage units. IEEE Internet Things J. 2018, 5, 69–78. [Google Scholar] [CrossRef]
Figure 1. A typical Smart Grid infrastructure (based on [11]). The solid lines denote flow of power, and the dashed lines denote the information flow.
Figure 1. A typical Smart Grid infrastructure (based on [11]). The solid lines denote flow of power, and the dashed lines denote the information flow.
Sensors 23 03697 g001
Figure 2. Renewable Energy Source (RES)-based smart metering system [20]. The solid lines denote flow of power, and the dashed lines denote the information flow.
Figure 2. Renewable Energy Source (RES)-based smart metering system [20]. The solid lines denote flow of power, and the dashed lines denote the information flow.
Sensors 23 03697 g002
Figure 3. Threat model of SM privacy in SGs. The solid lines denote flow of power, and the dashed lines denote the information flow.
Figure 3. Threat model of SM privacy in SGs. The solid lines denote flow of power, and the dashed lines denote the information flow.
Sensors 23 03697 g003
Figure 4. Taxonomy of smart meter privacy-preservation approaches and techniques surveyed and reviewed in this paper.
Figure 4. Taxonomy of smart meter privacy-preservation approaches and techniques surveyed and reviewed in this paper.
Sensors 23 03697 g004
Table 1. Comparison of survey papers published in smart meter privacy preservation.
Table 1. Comparison of survey papers published in smart meter privacy preservation.
Ref.Privacy forCFPPMTPC
RESBillVASOper
 [8]2008–2012
[9]2008–2012
[10]2010–2013
[11]2007–2014
[12]2010–2014
[13]2008–2015
Our survey2013–present
Oper: Operation, CFP: Cost-friendly privacy, PM: Privacy metric, and TPC: Time-line of papers considered.
Table 7. Summary of cost-friendly privacy-preservation techniques of SMs against strong adversaries (prioritizing cost-friendliness).
Table 7. Summary of cost-friendly privacy-preservation techniques of SMs against strong adversaries (prioritizing cost-friendliness).
Ref.GoalsLimitationsMetricEnergy Storage
[43,110]Optimization between load variance and cost reduction using a heuristic algorithmThe total expected value of an RB charge/discharge must be zero, use of larger capacity RBVariance, Electricity and battery operation costRB
[28,29]Heuristic algorithm-based optimization between privacy and cost reductionLower privacy for the off-peak periodVariance, MI, Average energy costRB
[111]Cost-friendly approximate DP (using Laplace distributed random noise) of SMsConditions of the probability density function not possible in practiceMI, CoSRB
[112]Information-theory-based optimal trade-off between privacy and cost reductionUse of unrealistic load for performance evaluationMI, CoSRB
[113]A trade-off between privacy and the expected cost of energy using unauthorized HTComputationally inefficientKullback–Leibler divergence, CoS rateRB
[114]Hide both high-frequency and low-frequency consumption pattern using a machine-learning-based approachConvergence time of reinforcement learning is longMI, Correlation coefficient, Saving ratioRB
[115]Use weather prediction to preserve privacy and increase the efficiency of energy usage by heuristic algorithm-based approachUse of high capacity RB, lack of cost-reduction analysisGraphical comparisonRB, RES
[26]Heuristic method-based cost-friendly privacy by model predictive controllerUse of high capacity RB, consider future consumer load is knownsMI, Total energy costRB, RES
[116]Information-theory-based privacy-energy efficiency trade-off in SM systemNo use of real SM reading for simulationMIRB, RES
[117]Obscures household consumption by using the heuristic algorithm based methodUse of a large capacity RBMI, Expected total costMultiple energy storage
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kua, J.; Hossain, M.B.; Natgunanathan, I.; Xiang, Y. Privacy Preservation in Smart Meters: Current Status, Challenges and Future Directions. Sensors 2023, 23, 3697. https://doi.org/10.3390/s23073697

AMA Style

Kua J, Hossain MB, Natgunanathan I, Xiang Y. Privacy Preservation in Smart Meters: Current Status, Challenges and Future Directions. Sensors. 2023; 23(7):3697. https://doi.org/10.3390/s23073697

Chicago/Turabian Style

Kua, Jonathan, Mohammad Belayet Hossain, Iynkaran Natgunanathan, and Yong Xiang. 2023. "Privacy Preservation in Smart Meters: Current Status, Challenges and Future Directions" Sensors 23, no. 7: 3697. https://doi.org/10.3390/s23073697

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop