earticle

논문검색

Privacy-Enhanced Secure Data Transaction System for Smart Grid

원문정보

초록

영어

A smart grid is a digitally enabled electrical grid that gathers, distributes, and acts on information about the behavior of all participants (suppliers and consumers) in order to improve the efficiency, importance, reliability, economics, and sustainability of electricity services. Currently, smart grid systems are widely considered to be fundamental components for improving the monitoring and control of a power distribution infrastructure. Using a distributed measurement architecture, it is possible to gather information about the smart grid status in order to monitor and control the overall infrastructure, including remote units. This technology can control the use of electricity. In particular, users can monitor and limit the electricity consumption of each home appliance in real time. Likewise, power companies can monitor and control electricity consumption in order to stabilize the electricity supply. However, these features may cause serious problems in the case of data leakage. For example, if a malicious attacker is able to sniff and analyze data, they can figure out the usage pattern and ascertain when a house is empty. Thus, users could suffer serious damage, such as burglary. Therefore, we propose a privacy-enhanced secure data transaction system. The proposed system can protect private data using encryption. The encrypted data includes the user’s ID, home appliance serial number, and electricity consumption. Thus, attackers cannot obtain important data for analysis from transaction data. In addition, unauthorized power companies are unable to access this information.

목차

Abstract
 1. Introduction
 2. Related work
  2.1. Smart grid
 3. Security problems in smart grid systems
  3.1. Data leakage
  3.2. Illegal profiling
  3.3. Illegal modification
 4. Proposed protocol
  4.1. Basic structure
  4.2. Entire scheme overview
  4.3. Transmission phase
  4.4. Check phase
 5. Analysis
  5.1. Protection against data leakage
  5.2. Protection against illegal profiling
  5.3. Protection against illegal modification
 6. Conclusion
 References

저자정보

  • Woong Go ISAA Lab, Department of Information Security Engineering, Soonchunhyang University, Korea
  • Jin Kwak Department of Information Security Engineering Soonchunhyang University, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.