90
Views
3
CrossRef citations to date
0
Altmetric
Articles

Secure and threshold-based power usage control in smart grid environments

, , &
Pages 264-289 | Received 24 Aug 2013, Accepted 27 Sep 2013, Published online: 06 Nov 2013
 

Abstract

Due to various advantages such as energy efficiency, reliability and self-monitoring, the smart grid technology has been emerging as the next-generation intelligent power grid system. Some of the well-known telecommunication, IT and power industries have already adopted smart grid technology along their daily business operations. This paper mainly focuses on the prevention of power outage issue in a smart grid environment. More specifically, consider a utility company which sets a threshold on the total power usage of households from a neighbourhood. Whenever the total power usage from the neighbourhood exceeds the threshold, some of the households need to reduce their energy consumptions, thereby avoiding the possibility of power outage. In the literature, this problem is referred to as threshold-based power usage control (TPUC). In order to solve the TPUC problem, the utility company is required to collect the power usage data of households in a periodic fashion. However, due to privacy reasons, the above problem is not straightforward in a privacy-preserving environment. We emphasise that the existing privacy-preserving TPUC algorithms are either insecure or inefficient. Therefore, this paper proposes two novel secure and distributed TPUC protocols by preserving the privacy of households in a given neighbourhood. Furthermore, we empirically show the practical value of the proposed protocols through various experiments.

Acknowledgements

The authors would like to thank the anonymous reviewers for their helpful comments.

Notes

1. Observe that whenever , , for .

2. In this paper, depending on the context, can be either or .

3. In general, for any two bits x and y, the property always holds.

4. Under the Paillier cryptosystem, a 1024-bit encryption key results in 2048-bit ciphertexts, which are sufficiently secure for most applications.

Additional information

Funding

This material is based upon work supported by the Office of Naval Research under Award No. N000141110256 and NSF under award No. CNS-1011984.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.