DocumentCode :
3580268
Title :
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification
Author :
Sye Loong Keoh ; Zhaohui Tang
Author_Institution :
Sch. of Comput. Sci., Univ. of Glasgow, Singapore, Singapore
fYear :
2014
Firstpage :
6
Lastpage :
11
Abstract :
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing. Any malicious tampering to the data must be detected immediately. This paper introduces secure end-to-end data aggregation for AMI, a security protocol that allows the concentrators to securely aggregate the data collected from the smart meters, while enabling the utility back-end that receives the aggregated data to verify the integrity and data originality. Compromise of concentrators can be detected. The aggregated data is protected using Chameleon Signatures and then forwarded to the utility back-end for verification, accounting, and analysis. Using the Trapdoor Chameleon Hash Function, the smart meters can periodically send an evidence to the utility back-end, by computing an alternative message and a random value (m´, r) such that m´ consists of all previous energy usage measurements of the smart meter in a specified period of time. By verifying that the Chameleon Hash Value of (m´, r) and that the energy usage matches those aggregated by the concentrators, the utility back-end is convinced of the integrity and authenticity of the data from the smart meters. Any data anomaly between smart meters and concentrators can be detected, thus indicating potential compromise of concentrators.
Keywords :
cryptographic protocols; data communication; smart meters; telecommunication security; AMI; advanced metering infrastructure; chameleon signatures; customer billing; delayed-integrity-verification; energy usage measurements; secure end-to-end data aggregation; trapdoor chameleon hash function; Ground penetrating radar; IEEE 802.15 Standards; IP networks; Logic gates; Zigbee;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security (IAS), 2014 10th International Conference on
Print_ISBN :
978-1-4799-8098-7
Type :
conf
DOI :
10.1109/ISIAS.2014.7064626
Filename :
7064626
Link To Document :
بازگشت