skip to main content
research-article

Protection of consumer data in the smart grid compliant with the German smart metering guideline

Published: 08 November 2013 Publication History

Abstract

Smart metering systems obtain fine-grained consumption data of their users. This allows for effective load balancing, but at the same time threatens consumers' privacy. Since the electricity provider only needs the characteristics of a region, not individuals, approaches like one by Mármol et al. suggest to aggregate data to protect consumer privacy. However, an implementation of such an approach also has to consider the legal and regulatory situation. In Germany, the technical guideline TR-03109 issued by the Federal Office for Information Security specifies demands which have to be fulfilled so that a smart meter gateway can be certified for use. These specifications imply limitations to the protocol design. Within this paper, we discuss the applicability of the method presented by Mármol et al. under consideration of the German Smart Metering guideline. Where conformity is not given, we offer a solution to overcome these restrictions by adapting their method and introduce a third party aggregator who does not have to be trusted. Our method comes with additional communication effort but behaves well in terms of memory and computational overhead. The achieved privacy level outreaches a purely pseudonymous value transmission. Also it does not contradict the postulations of TR-03109, making it an applicable choice for privacy protection in real-world smart metering systems.

References

[1]
F. Armknecht, D. Westhoff, J. Girao, and A. Hessler. A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. Comput. Commun., 31(4):734--749, Mar. 2008.
[2]
Backes, Michael and Meiser, Sebastian. Differentially Private Smart Metering with Battery Recharging. 2012.
[3]
J. M. Bohli, C. Sorge, and O. Ugus. A Privacy Model for Smart Metering. 2010.
[4]
BSI. Technische Richtlinie BSI-TR-03109. 2012.
[5]
BSI. Technische Richtlinie BSI-TR-03109--1. 2012.
[6]
BSI. Technische Richtlinie BSI-TR-03109--1, Anlage VI: Betriebsprozesse. 2013.
[7]
D. Bundestag. Bundesdatenschutzgesetz. http://www.gesetze-im-internet.de/bundesrecht/bdsg\_1990/gesamt.pdf, Januar 1978.
[8]
C. Castelluccia, E. Mykletun, G. Tsudik, and C. Science. Efficient Aggregation of encrypted data in Wireless Sensor Networks. 2005.
[9]
C. Commission. Smart Metering and Privacy: Existing Law and Competing Policies. BiblioBazaar, 2013.
[10]
M. K. G. Danezis and A. Rial. Differentially private billing with rebates, Technical Report MSR-TR-2011--10. 2011.
[11]
G. Kalogridis, C. Efthymiou, S. Denic, T. Lewis, and R. Cepeda. Privacy for smart meters: Towards undetectable appliance load signatures. Smart Grid Communications, pages 232--237, 2010.
[12]
F. D. Garcia and B. Jacobs. Privacy-friendly Energy-metering via Homomorphic Encryption. 2010.
[13]
C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, 2009.
[14]
C. Gentry. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st annual ACM symposium on Theory of computing, STOC'09, pages 169--178, New York, NY, USA, 2009. ACM.
[15]
K. Kursawe, G. Danezis, and M. Kohlweiss. Privacy-friendly Aggregation for the Smart-grid. 2011.
[16]
S. M, D. Westhof, F. Armknecht, and J. Girao. Non-manipulable aggregator node election protocols for wireless sensor networks. 2007.
[17]
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin. Private memoirs of a smart meter. In Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys'10, pages 61--66, New York, NY, USA, 2010. ACM.
[18]
F. G. Mármol, C. Sorge, O. Ugus, and G. M. Perez. Do not snoop my habits: Preserving privacy in the smart grid. IEEE Communications Magazine, Special Issue on Communication Protocols and Algorithms for the Smart Grid, 50(5):166--172, 2012.
[19]
F. G. Mármol, C. Sorge, O. Ugus, G. M. Perez, R. Petrlic, and D. Westhof. Privacy-enhanced architecture for smart metering. 2012.
[20]
M. Önen and R. Molva. Secure data aggregation with multiple encryption. In Proceedings of the 4th European conference on Wireless sensor networks, EWSN'07, pages 117--132, Berlin, Heidelberg, 2007. Springer-Verlag.
[21]
S. Papadimitriou, F. Li, G. Kollios, and P. S. Yu. Time series compressibility and privacy. In Proceedings of the 33rd international conference on Very large data bases, pages 459--470. VLDB Endowment, 2007.
[22]
R. Petrlic. A privacy-preserving concept for smart grids. 2011.
[23]
S. R. Rajagopalan, L. Sankar, S. Mohajer, and H. V. Poor. Smart meter privacy: A utility-privacy framework. In Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference on, pages 190--195. IEEE, 2011.
[24]
A. Rial and G. Danezis. Privacy-preserving smart metering, Technical Report MSR- TR-2010--150. 2010.
[25]
S. McLaughlin, P. McDaniel, and W. Aiello. Protecting consumer privacy from electric load monitoring. Proceedings of the 18th ACM conference on Computer and communications security, pages 87--98, 2011.

Cited By

View all
  • (2018)TAI: A Threshold-Based Anonymous Identification Scheme for Demand-Response in Smart GridsIEEE Transactions on Smart Grid10.1109/TSG.2016.26330719:4(3496-3506)Online publication date: Jul-2018
  • (2017)Multi-resolution privacy-enhancing technologies for smart meteringEURASIP Journal on Information Security10.1186/s13635-017-0058-32017:1Online publication date: 20-Mar-2017
  • (2015)Multi-dimensional sensor data aggregator for adaptive network management in M2M communications2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)10.1109/INM.2015.7140431(1047-1052)Online publication date: May-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SEGS '13: Proceedings of the first ACM workshop on Smart energy grid security
November 2013
112 pages
ISBN:9781450324922
DOI:10.1145/2516930
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. homomorphic encryption
  2. information aggregation
  3. privacy
  4. smart grid

Qualifiers

  • Research-article

Conference

CCS'13
Sponsor:

Acceptance Rates

SEGS '13 Paper Acceptance Rate 12 of 27 submissions, 44%;
Overall Acceptance Rate 19 of 38 submissions, 50%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2018)TAI: A Threshold-Based Anonymous Identification Scheme for Demand-Response in Smart GridsIEEE Transactions on Smart Grid10.1109/TSG.2016.26330719:4(3496-3506)Online publication date: Jul-2018
  • (2017)Multi-resolution privacy-enhancing technologies for smart meteringEURASIP Journal on Information Security10.1186/s13635-017-0058-32017:1Online publication date: 20-Mar-2017
  • (2015)Multi-dimensional sensor data aggregator for adaptive network management in M2M communications2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)10.1109/INM.2015.7140431(1047-1052)Online publication date: May-2015
  • (2015)Privacy-Preserving Energy-Reading for Smart MeterInclusive Smart Cities and e-Health10.1007/978-3-319-19312-0_14(165-177)Online publication date: 30-May-2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media