Privacy-Preserving Data Falsification Detection in Smart Grids using Elliptic Curve Cryptography and Homomorphic Encryption
In an advanced metering infrastructure (AMI), the electric utility collects power consumption data from smart meters to improve energy optimization and provides detailed information on power consumption to electric utility customers. However, AMI is vulnerable to data falsification attacks, which organized adversaries can launch. Such attacks can be detected by analyzing customers' fine-grained power consumption data; however, analyzing customers' private data violates the customers' privacy. Although homomorphic encryption-based schemes have been proposed to tackle the problem, the disadvantage is a long execution time. This paper proposes a new privacy-preserving data falsification detection scheme to shorten the execution time. We adopt elliptic curve cryptography (ECC) based on homomorphic encryption (HE) without revealing customer power consumption data. HE is a form of encryption that permits users to perform computations on the encrypted data without decryption. Through ECC, we can achieve light computation. Our experimental evaluation showed that our proposed scheme successfully achieved 18 times faster than the CKKS scheme, a common HE scheme.
S. Joshi et al., "Privacy-Preserving Data Falsification Detection in Smart Grids using Elliptic Curve Cryptography and Homomorphic Encryption," Proceedings - 2022 IEEE International Conference on Smart Computing, SMARTCOMP 2022, pp. 229 - 234, Institute of Electrical and Electronics Engineers (IEEE), Jan 2022.
The definitive version is available at https://doi.org/10.1109/SMARTCOMP55677.2022.00059
Keywords and Phrases
Bilinear Pairing; Elliptic Curve Cryptography; Homomorphic Encryption; Smart Grids
International Standard Book Number (ISBN)
Article - Conference proceedings
© 2022 Institute of Electrical and Electronics Engineers, All rights reserved.
01 Jan 2022
This work was supported by Japan-US Network Opportunity 2 by Commissioned Research of the National Institute of Information and Communications Technology (NICT), Japan, and NSF grants SATC-2030611, SATC-2030624, DGE-1433659, CNS-1818942.