3.1.2. Integrity

Smart appliances continuously send consumption patterns to an aggregator or SM after an interval. It may be possible that an aggregator or an SM are physically secure but vulnerable to different attacks such as man-in-middle attacks, alteration attacks, or replay attacks [46]. If integrity is compromised, precious information will be compromised and wrong decisions for managing and controlling the network might be made. Integrity refers to the message sent by sender; the same message without any modification is received by receiver. The following schemes are used for HAN data integrity: message digest, MAC, digital signature, and H-MAC [16,22].
