160 likes | 173 Views
Privacy Issues in Smart Grid. R. Newman. Topics. Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity Metrics for Anonymity Applications of anonymity technology. Smart Grid. The electrical grid encompasses:
E N D
Privacy Issues in Smart Grid R. Newman
Topics • Defining anonymity • Need for anonymity • Defining privacy • Threats to anonymity and privacy • Mechanisms to provide anonymity • Metrics for Anonymity • Applications of anonymity technology
Smart Grid • The electrical grid encompasses: • Electrical power generation • Electrical power distribution • Electrical power consumption • Originally • Generation plant produced power • Converted to high voltage AC for long distance distribution • Converted to medium voltage AC for intermediate distance distribution • Converted to low voltage AC to supply customers
Smart Grid • Now: Smart Grid • Multiple generation plants produce power Must coordinate interconnected grid • Consumer power generation (solar power) • Consumer involvment in load manipulation Incentives to reduce load at peak usage times • Power consumption monitoring for user control Prices according to current and projected loads • All this requires reporting of power data
Smart Grid Threats • Consumer privacy • Usage may reveal lifestyle information • Usage may reveal occupation of home • Hence, need privacy! • Accurate data needed for utilities • Needed to project loads • Used for pricing – liars can game system! • Needed to coordinate interconnected grids • Innaccurate data can cause disruption!
Consumer Load Data • Loading patterns reveal usage • Usage reveals lifestyle, presence • Periodic loads = A/C, refridgerator, etc. • Load info can reveal appliance model! • Lighting, microwave use – show presence • Absence = attractive target for burglars • Hiding load information • Aggregate data • Use energy storage to balance load • Use energy generation to balance load
Load Balancing • Storage • Use batteries to increase load during low usage periods (charge batteries) • Use batteries to decrease load during peak periods (draw power from batteries) • Can use electric vehicle batteries for storage • Must take usage patterns into account • Desirable for economic reasons also • Generation • Use set points in PhotoVoltaic (solar) generation to alter efficiency, hence output • Generator & batteries may be combined
Utility Sensor Information • Needed to assess current load & predict load • Pricing is based on predicted loads • Prices for energy consumption • Prices for energy generation (offer/bid) • Manipulation of data can cause economic losses • Need fair auction mechanisms • Sensor data needed for grid synchronization • Voltage • Frequency • Phase
Hiding Auction Information • Utility wants to pay lowest price • Pricing is based on predicted loads and bids • Protocol to offer rates, receive bids, then repeat • Must hold accepted bids as contracts • Suppliers want to get highest price • Information about other suppliers is valuable • If less supply, then can ask more for energy • Users want to preserve privacy • For safety and personal reasons • For economic reasons
Auction Model • Storage units • generate & store, buy low, sell high • Aggregator • Act as communication intermediary • Bidirectional • Utility company • Calculates loads and supply • Decides when to ask for more power • Decides how much to offer for power
Auction Model • Cryptographic Approach • Hide bids using crypto • Aggregate bid information • Utility obtains aggregate bids only • Initialization by trusted third party (TTP) • All parties supplied with public and private keys • All parties supplied with certificates
Auction Protocol • Utility sends power request to Aggregator • Offers prices per time slot for t slots • Bilinear pairing used for signature • Aggregator broadcasts request to suppliers • Validates freshness using timestamps • Verifies signature using utility public key • Suppliers offer bids • Aggregator combines bids • Utility assesses bids
Auction Protocol • Utility sends power request to Aggregator • Aggregator broadcasts request to suppliers • Suppliers offer bids • Amount of power offered per time slot • Zero if none available or prices is too low • Bids masked using one-time random shared key – allows utilties to verify aggregate bids but not see individual bids • Computes signature • Computes MAC
Auction Protocol • Utility sends power request to Aggregator • Aggregator broadcasts request to suppliers • Suppliers offer bids • Aggregator combines bids • Verifies signatures • Aggregates masked bids into masked aggreate bid • Aggregates signatures into aggregate signature • Aggregates MACs into aggregate MAC • Aggregation by summation • Care taken that there can be no overflow/carry
Auction Protocol • Utility sends power request to Aggregator • Aggregator broadcasts request to suppliers • Suppliers offer bids • Aggregator combines bids, sends to utility • Utility assesses bids • Verifies aggregate signature, MAC • Determines aggregated bid per slot
Take-away • Security receiving increasing attention in Smart Grid operations • Conflicting needs between data resolution and accuracy on one hand, and privacy on other • Mechanisms to hide load information • Mechanisms to allow grid synchronization • Mechanisms to support anonymous auctions and other economic activities