Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3374587.3374631acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

A Secure Transmission Scheme of Sensitive Power Information in Ubiquitous Power IoT

Published: 04 March 2020 Publication History

Abstract

As one of the national key infrastructures, the ubiquitous power Internet of Things (IoT) provides a convenient method for large-scale power information collection. The widespread transmission of massive power information using data mining techniques for large amounts of data can yield valuable information. Therefore, hacker attacks are endless, posing a threat to the security of the state, society, collectives and individuals. In this paper, we propose a secure transmission scheme of power information, named "SSD" (Split & Signature & Disturbing). In the scheme, after the data is split, it will be anonymized and selected for different paths to be transferred to the destination node. After recombination, the data will be restored. The SSD ensures the indistinguishability and security of the sensitive data by data splitting and disturbing method, and protects the anonymity of individual identities by group signature. The experimental results show that the individual prediction/actual data similarity approaches 0%, and the similarity ratio of the category data (three types in the experiment) is 37.32%, which can be judged to be basically non-correlated.

References

[1]
State Grid Internet Department (Text/map). 2019. Ubiquitous power internet construction outline (Excerpt). North China Electric Power, 294(03):22--31.DIO= http://doi.acm.org/CNKI:SUN:HBDY.0.2019-03-009
[2]
YangTing, ZhaiFeng, ZhaoYingjie et al. 2019. Interpretation and Research Prospect of Ubiquitous Power Internet of Things. Automation of Electric Power Systems (13).
[3]
GongRui. 2019. Analysis of key technologies and application prospects of ubiquitous power Internet of Things. Communication world, 26(08):252--253.
[4]
LiaoHuimin, XuanJiaxing, ZhenPing, LiLili. 2019. Overview of ubiquitous power Internet of Things information security. Electric power information and communication technology, 17(08):18--23. DIO=http://doi.acm.org/10.16543/j.2095-641x.electric.power.ict.2019.08.004
[5]
YangDongsheng, WangDaohao, ZhouBowen et al. 2019. Key technologies and application prospects of ubiquitous power internet of things. Power generation technology, 40(02):13--20.
[6]
YuZhuozhi, LuBin, LiuJunyu, ChenWenwei, DengWei, ZhengWeijun. 2019. LTE230 Research on power wireless network private network encryption module.HeiLongjiang electric power, 41(03):250--254.
[7]
Rakesh Bobba, Himanshu Khurana, Musab AlTurki, and Farhana Ashraf. 2009. PBES: a policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09). ACM, New York, NY, USA, 262--275. DOI=http://dx.doi.org/10.1145/1533057.1533093
[8]
R. Cramer and V. Shoup. 2004. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing, (Feb, 2004)33(1): 167--226.DIO= http://doi.acm.org/ 10.1137/s0097539702403773
[9]
Wen M, Lu R, Zhang K, et al. 2013. PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Transactions on Emerging Topics in Computing, 1(1): 178--191.DIO= http://doi.acm.org/10.1109/TETC.2013.2273889
[10]
Li F, Luo B, Liu P. 2010. Secure information aggregation for smart grids using homomorphic encryption.In 2010 First IEEE International Conference on Smart Grid Communications. IEEE, Gaithersburg, Maryland, USA: 327--332.DIO= http://doi.acm.org/10.1109/SMARTGRID.2010.5622064
[11]
Lu R, Liang X, Li X, et al. 2012. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9): 1621--1631.DIO= http://doi.acm.org/10.1109/TPDS.2012.86
[12]
J. Ni, K. Alharbi, X. Lin, and X. Shen. 2015. Security-enhanced dataaggregation against malicious gateways in smart grid. In Proceedings of the IEEE Global Communications Conference (GLOBECOM). IEEE, San Diego, California, USA.DIO= http://doi.acm.org/10.1109/GLOCOM.2015.7417140
[13]
Alsharif A, Nabil M, Tonyali S, et al. 2018. EPIC: Efficient Privacy-Preserving Scheme with EtoE Data Integrity and Authenticity for AMI Networks. DIO= http://doi.acm.org/ 10.1109/JIOT.2018.2882566
[14]
Lu R, Liang X, Li X, et al. 2012. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications. IEEE Transactions on Parallel and Distributed Systems, 23(9):1621--1631. DIO= http://doi.acm.org/ 10.1109/TPDS.2012.86
[15]
Lu R, Alharbi K, Lin X, et al. 2014. A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications.GLOBECOM 2015-2015 IEEE Global Communications Conference. IEEE, San Diego, California, USA. DIO= http://doi.acm.org/ 10.1109/GLOCOM.2014.7417029
[16]
Boneh D, Goh E J, Nissim K. 2005. Evaluating 2-DNF Formulas on Ciphertexts. Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, Proceedings. Springer-Verlag, 2005. DIO= http://doi.acm.org/10.1007/978-3-540-30576-7_18
[17]
Mohit Vashistha and Ferdous A. Barbhuiya. 2019. Blockchain in Smart Power Grid Infrastructure. In Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI '19). ACM, New York, NY, USA, 89--96. DOI=https://doi.org/10.1145/3327960.3332388

Cited By

View all
  • (2023)Research on power quality assessment based on ubiquitous power IoTApplied Mathematics and Nonlinear Sciences10.2478/amns.2023.1.000078:1(2873-2892)Online publication date: 10-Mar-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSAI '19: Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence
December 2019
370 pages
ISBN:9781450376273
DOI:10.1145/3374587
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Shenzhen University: Shenzhen University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 March 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data Splitting
  2. Information Security
  3. Ubiquitous Power IoT

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CSAI2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Research on power quality assessment based on ubiquitous power IoTApplied Mathematics and Nonlinear Sciences10.2478/amns.2023.1.000078:1(2873-2892)Online publication date: 10-Mar-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media