privacy strategies in smart metering
play

Privacy Strategies in Smart Metering Source: - PowerPoint PPT Presentation

Privacy Strategies in Smart Metering Source: http://abstrusegoose.com/553 Tobias Klenze: Privacy Strategies in Smart Metering 1 Privacy Strategies in Smart Metering Tobias Klenze Chair for Network Architectures and Services Department for


  1. Privacy Strategies in Smart Metering Source: http://abstrusegoose.com/553 Tobias Klenze: Privacy Strategies in Smart Metering 1

  2. Privacy Strategies in Smart Metering Tobias Klenze Chair for Network Architectures and Services Department for Computer Science Technische Universit¨ at M¨ unchen June 13, 2014 Tobias Klenze: Privacy Strategies in Smart Metering 2

  3. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 3

  4. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 4

  5. What’s a “Smart Meter”? Normal Meter Smart Meter Kristoferb, CC-BY-SA 3.0 EVB Energy, CC-BY-SA 3.0 Tobias Klenze: Privacy Strategies in Smart Metering 5

  6. (Supposed) Advantages of Smart Meters Smart Meters! What are they good for? 1 Automated billing (no physical inspections) 2 Complex tariffs (e.g. electricity costs more in peak times) 3 “Smart” devices take tariffs into account 4 Grid / plant management – forecasting of consumption demand 5 Leak detection Tobias Klenze: Privacy Strategies in Smart Metering 6

  7. Smart Meter Deployment EU directive: 80% deployment by 2020. Investments: 3.15 billion Euro in the EU already. Smart Meters will come to you as well Tobias Klenze: Privacy Strategies in Smart Metering 7

  8. Smart Meter Deployment EU directive: 80% deployment by 2020. Investments: 3.15 billion Euro in the EU already. Smart Meters will come to you as well Tobias Klenze: Privacy Strategies in Smart Metering 7

  9. The Problem: High-frequency data Readings intervals Normal Meters: once per month. Low frequency, no problem Smart Meters: once per 15 minutes. High frequency, problematic Tobias Klenze: Privacy Strategies in Smart Metering 8

  10. The Problem: High-frequency data Readings intervals Normal Meters: once per month. Low frequency, no problem Smart Meters: once per 15 minutes. High frequency, problematic Source: Private Memoirs of a Smart Meter, 2010, Molina-Markham, Shenoy, Prashant et al Tobias Klenze: Privacy Strategies in Smart Metering 8

  11. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 9

  12. Aggregating real-time data Goal: Provide real-time usage data to grid & utility provider AND respect privacy. Problem: Providers poorly define what data they need. Tobias Klenze: Privacy Strategies in Smart Metering 10

  13. Approaches for real-time data sharing Idea: Preprocess (obfuscate) consumption data. Quantization works well, Down-sampling not as much. Problem: Still some predictions are possible. Idea: Aggregate data of different households (without trusted third party). Tobias Klenze: Privacy Strategies in Smart Metering 11

  14. Approaches for real-time data sharing Idea: Preprocess (obfuscate) consumption data. Quantization works well, Down-sampling not as much. Problem: Still some predictions are possible. Idea: Aggregate data of different households (without trusted third party). Tobias Klenze: Privacy Strategies in Smart Metering 11

  15. Homomorphic encryption Homomorphic encryption = Messing with ciphertext Allows modification of ciphertext yielding meaningful ciphertext. We use: enc ( m 1 ) ∗ enc ( m 2 ) = enc ( m 1 + m 2 ) Tobias Klenze: Privacy Strategies in Smart Metering 12

  16. Protocol flow (1) Record consumption m 1 M 1 Local M 4 M 2 Station M 3 Tobias Klenze: Privacy Strategies in Smart Metering 13

  17. Protocol flow (2) Choose random a j, 1 s.t. m 1 = a 1 , 1 + a 2 , 1 + a 3 , 1 + a 4 , 1 M 1 Local M 4 M 2 Station M 3 Tobias Klenze: Privacy Strategies in Smart Metering 14

  18. Protocol flow (3) For all j enc pk j ( a 1 j ) M 1 Local M 4 M 2 Station M 3 Tobias Klenze: Privacy Strategies in Smart Metering 15

  19. Protocol flow (4) M 1 enc pk j ( a 1 j ) Local M 4 M 2 Station M 3 Tobias Klenze: Privacy Strategies in Smart Metering 16

  20. Protocol flow (5) M 1 Local M 4 M 2 Station For all i , j : enc pk j ( a ij ) M 3 Tobias Klenze: Privacy Strategies in Smart Metering 17

  21. Protocol flow (6) M 1 Local M 4 M 2 Station For all j : � enc pk j ( a ij ) i � = j = enc pk j ( � a ij ) M 3 i � = j Tobias Klenze: Privacy Strategies in Smart Metering 18

  22. Protocol flow (7) M 1 Local M 4 M 2 Station enc pk 3 ( � a i 3 ) i � =3 M 3 Tobias Klenze: Privacy Strategies in Smart Metering 19

  23. Protocol flow (8) M 1 Local M 4 M 2 Station M 3 dec sk 3 enc pk 3 ( � a i 3 ) i � =3 Tobias Klenze: Privacy Strategies in Smart Metering 20

  24. Protocol flow (9) M 1 Local M 4 M 2 Station r 3 := � a i 3 + a 33 i � =3 M 3 Tobias Klenze: Privacy Strategies in Smart Metering 21

  25. Protocol flow (10) M 1 Local M 4 M 2 Station � j r j M 3 Tobias Klenze: Privacy Strategies in Smart Metering 22

  26. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 23

  27. Privacy-sensitive Billing protocols Security in the protocol is a must Ideally: Allows for different tariffs No centralized trust – neither the consumer can cheat, nor the utility Utility has no direct access on smart meter No physical inspections required → Complex problem but protocols exist. Tobias Klenze: Privacy Strategies in Smart Metering 24

  28. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 25

  29. Summary & Conclusions Lessons learned: 1 Privacy is a big problem with current smart meters. 2 Protocols for real-time data and secure billing . 3 Privacy in Smart Meters is possible. Tobias Klenze: Privacy Strategies in Smart Metering 26

Recommend


More recommend