Skip to main content

ORIGINAL RESEARCH article

Front. Energy Res., 09 January 2024
Sec. Smart Grids

Efficient privacy protection scheme with batch verification in smart grid

Mingxiang WangMingxiang Wang1Lei Zhang,
Lei Zhang1,2*
  • 1School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou, China
  • 2School of Information Engineering, East University of Heilongjiang, Harbin, China

Smart grids can establish two-way communication with users, collect their electricity consumption data and provide reasonable pricing, but fine-grained electricity consumption data leads to the leakage of user privacy. In order to protect the privacy of user data and the security of data transmission process, this article proposes an efficient and batch validated privacy protection scheme. In this scheme, legitimate entities transmit encrypted electricity data after mutual authentication. To ensure the correct data is received, we propose a new batch signature verification algorithm. Security analysis shows that our solution achieves user privacy and data security. The simulation experiments provided demonstrate that the efficiency of the proposed scheme can satisfy the requirements of real-time communication.

1 Introduction

Smart grid is a replacement for traditional power grid. Smart grid combines advanced network communication technology, smart sensor equipment and big data analysis capability to provide efficient, stable and economical power distribution for the power grid. Build two-way communication between smart grid and users, collect fine-grained power consumption data on the user side through smart sensor devices, use big data analysis capabilities to analyze users’ power consumption habits, grasp the fluctuations of power consumption, achieve stable power supply by regulating power generation, and reduce power loss. Because power is not convenient to store, it is essential to generate power according to supply and demand. However, collecting user electricity consumption data poses a serious problem, which is that the privacy of user electricity consumption may be obtained by malicious attackers to disrupt the stable operation of the power grid. Several proposals have been put forward regarding the protection of user privacy. However, there are pros and cons, and the existing issues have not been completely resolved. Therefore, solving the leakage of user privacy is an urgent issue for smart grids.

In order to address user privacy breaches, data aggregation is used to aggregate all user data together, making it impossible for anyone except the user to obtain detailed electricity consumption data. Legitimate data users can only obtain the aggregated data for analysis. Specifically, the user’s data is not directly sent to the data user, but is first aggregated through a legitimate third party and then forwarded to the data user; During the transmission of user data, in order to prevent malicious attackers from directly obtaining power data, data encryption is required. Therefore, we need a scheme that supports homomorphic encryption to achieve data privacy and security.

Homomorphic encryption includes homomorphic addition and homomorphic multiplication. At present, many homomorphic encryption technologies have been implemented, including semi-homomorphic encryption and full homomorphic encryption. Semi-homomorphic encryption can achieve additive homomorphisms or multiplicative homomorphisms, and full homomorphic encryption can achieve additive homomorphisms and multiplicative homomorphisms. For example, paillier homomorphic encryption can realize additive homomorphism. But relatively speaking, the computational complexity of homomorphic encryption of paillier is relatively high, which has a great burden on smart meters in practical applications. All homomorphic encryption can achieve aggregation in the ciphertext domain, but the current technology is difficult to achieve efficient all homomorphic technology. For our solution, implementing additive homomorphism can meet the aggregation requirements of data, therefore, an efficient additive homomorphism technique is needed.

In this article, we propose an efficient smart grid privacy protection scheme that can achieve efficient identity authentication and effective data aggregation. In order to achieve effective data transmission, we need to authenticate the entities participating in the power grid. During the data transmission process, only the data of the authenticated entities will be accepted. We have designed an identity verification algorithm between participating entities to ensure the effectiveness of data transmission. To improve efficiency, our identity verification can achieve batch verification. In order to aggregate user electricity data, we used an encryption technology that supports additive homomorphism to achieve efficient data aggregation. Specifically, in our scheme, before data upload, we need to verify the identity of the control center and the intermediate aggregator. After the verification is successful, the user uses homomorphic encryption technology to encrypt the power data. At the same time, the user needs to sign the data to ensure correct user data upload. The intermediate aggregator aggregates user data after receiving the user’s encrypted data and verifying the user’s identity, After being signed, it will be forwarded to the control center, which will decrypt the aggregated data after verifying the identity of the aggregator, and provide appropriate power consumption strategy through analyzing the aggregated data.

Overall, the specific contributions of our proposed solution are as follows:

(1) We have designed an efficient privacy protection scheme based on the requirements of the smart grid, which can achieve effective data aggregation and protect user privacy.

(2) In order to protect the security of the data upload process, we have designed an identity signature verification algorithm that allows legitimate users to upload power consumption data. To improve efficiency, the identity verification algorithm can achieve batch verification operations.

(3) Our solution can resist attacks from malicious attackers, including internal attacks, external attacks, collusion attacks, and ensure the integrity and confidentiality of data.

The remaining organization of this article is as follows. In the second part, we reviewed previous work in this field and explored the advantages and disadvantages of relevant literature. In the third part, we give the related Cryptography knowledge and symbol explanation involved in this paper. In the fourth part, we provide the system model and security requirements. In the fifth section, a detailed solution process is provided to explain the establishment of the system model. In the sixth section, we analyzed and compared the security of the schemes. In Section 7, a performance evaluation was conducted to demonstrate that the stable operation of the system can be achieved. Finally, we provide the conclusion in Section 8.

2 Related work

In this section, we summarized and explored privacy protection schemes in smart grids.

Privacy protection is an important issue that needs to be addressed in smart grids. Many solutions have been proposed for privacy protection (Fan et al., 2013; Abdallah and Shen, 2014; Li et al., 2014; Li et al., 2015; Abdallah and Shen, 2018; Gong et al., 2018; Guo et al., 2018; Vincent et al., 2018; Fan et al., 2020; Hua et al., 2020; Song et al., 2020; Wei et al., 2020; Qian et al., 2021; Roozbeh et al., 2021; Zhang et al., 2022a; Baghestani et al., 2022; Zhang et al., 2022b; Mall et al., 2022; Nyangaresi, 2022; Sadhukhan et al., 2022; Sani et al., 2022; Zhao et al., 2022; Cao et al., 2023; Deng et al., 2023; Hu et al., 2023; Verma et al., 2023; Zhang and Dong, 2023), mainly focusing on data aggregation. Compared to other methods, data aggregation performs the best. For example, the method based on masking value can insert random values used to mask data into user data to achieve the purpose of confusing data. Malicious attackers cannot get effective data, but will lead to data loss and deviation of the final data. There is also a scheme based on secret sharing to build a secret shared between the two communication parties to achieve secure data transmission, but for internal attackers, the security of data cannot be guaranteed.

Data aggregation is realized by homomorphic encryption. Li et al. (2015) proposed a new privacy protection dual function aggregation scheme (PDA) for smart grid communication. This scheme uses the ring learning problem with errors to construct a homomorphic encryption scheme. When users report power data, they can calculate multiple statistical values in the encrypted case, improving the use value of the data, but the computational cost is high. Abdallah and Shen (2018) first proposed a lightweight privacy protection aggregation scheme based on lattice, which uses hard noise matrix and soft noise matrix to construct encryption, allowing smart appliances to aggregate data without involving smart meters. Smart meters serve as relay nodes, only transmitting data, and are suitable for small networks in single households. Abdallah and Shen (2014) used the homomorphic encryption technology based on NTRU lattice. NTRU lattice has a lower computing cost and also reduces the communication cost, because NTRU lattice encryption only requires simple multiplication and addition, making the system more lightweight. This scheme distributes electricity consumption data to users in the predicted area, in order to better protect user privacy and isolate the control center and users, and communicate separately with relay nodes. The only drawback is that the literature indicates that this scheme is applied to small networks. Qian et al. (2021) first proposed a lightweight t-times homomorphic encryption scheme, which can further reduce the computing cost of intelligent devices. The scheme uses lattice based homomorphic encryption technology, which can resist quantum attacks. On this basis, two effective data aggregation schemes were proposed for application scenarios. The first solution is suitable for small networks, such as home networks and small office networks. The second solution is suitable for medium-sized networks, such as part of smart cities. Song et al. (2020) proposed a dynamic member data aggregation (DMDA) scheme using homomorphic encryption and identity based signature, which reduces the complexity of new users joining and old users exiting. In addition, the Action Center obtains the total data in the virtual aggregation area, and knows nothing about the data of a single user. However, communication is also required between meters, which increases the communication burden of edge device to a certain extent. Hua et al. (2020) first proposed a new type of attack called malicious data mining attack, through which opponents can infer the target user’s electricity consumption data. Then aiming at this attack, a new data aggregation scheme is proposed. This scheme uses Paillier homomorphic encryption technology to encrypt data, and uses bilinear map to sign, which can not only resist malicious data mining attacks, but also output accurate aggregation results. Li et al. (2014) proposed an effective privacy protection demand response (EPPDR) scheme, which uses homomorphic encryption and bilinear pairing to achieve privacy protection demand aggregation and effective response. We also studied an adaptive key evolution technique that can adaptively control key evolution to ensure that the user’s session key is forward secure. Unfortunately, neither of these schemes is lightweight and cannot resist quantum attacks.

In order to ensure the legality of identity and data security during the aggregation process, many authentication schemes have been proposed (Guo et al., 2020; Sui and Meer, 2020; Sanaullah Badar et al., 2022). Hafiz et al. (Sanaullah Badar et al., 2022) provide a secure authentication protocol for home domain networks. The article uses the physical non-destructive architecture of ECC and smart meters to ensure identity security. Sui and Meer (2020) proposed a batch and auditable privacy protection scheme for smart grid demand response, which can achieve batch identity verification and reward users who participate in demand response. Guo et al. (2020) proposed a lightweight batch verification privacy protection data aggregation scheme, which uses symmetric encryption algorithms to encrypt data after establishing session keys. However, symmetric encryption may lead to data leakage. In summary, current methodologies are incapable of ensuring all the benefits, such as being lightweight, resilient against all threats, and widely applicable. As a result, it is imperative to put forth novel approaches for privacy protection. Within our proposed privacy protection scheme, our primary objective is to attain data privacy security while simultaneously addressing prerequisites like being lightweight and resistant to malicious attacks.

3 Preliminaries

In this scheme, we use the NTRU scheme, which implements ECC and RSA on a lattice. The security of the scheme is based on the shortest vector problem.

3.1 NTRU lattice scheme

Let n be a power of 2, Φ=xn+1,R=ZxΦ,σR, q is a prime number such that Φ There are n linear factors modqq=1mod2n:Φ=inϕi=inxφimodq,Rq=RqR=ZqxΦ,Rq* is the set of inverse elements of Rq.

1) Key generation: Given n,qZ,pRq*, sampling the f,g from the discrete Gaussian DZn,σ.We can calculate the:

f=pf+1(1)

Here fmodqRq*,f=1modp, we calculate the public key value h using the private key f, as follows:

h=pgfRq*(2)

Therefore, we obtain the public-private key pair h,fRq*×R.

2) Encryption: For the message m that needs to be encrypted, the sender randomly generates two random numbers s,eγ¯α, Use a public key for encryption as follows:

C=hs+pe+mRq(3)

3) Decryption: When decrypting, the private key f can be used for decryption, as follows:

C=fCRq(4)
m=Cmodp(5)

4) Homomorphic property: Assuming there are two users, each generating message m1,m2. Randomly select random numbers s1,e1,s2,e2, and use public key encryption to obtain: C1=hs1+pe1+m1,C2=hs2+pe2+m2. Assuming C=C1+C2, the homomorphic properties are as follows:

C=hs1+pe1+m1+hs2+pe2+m2=hs1+s2+pe1+e2+m1+m2(6)

3.2 Bilinear map

Assuming G,GT is two multiplicative cyclic group, which have the same order prime number q, and define Bilinear map e:G×GGT. Meet the following characteristics:

1) Bilinear: For all u,vG,a,bZq, satisfy eua,vb=eu,vab.

2) Non-degeneracy: Assuming G randomly generates g, then eg,g1.

3) Computability: For every u,vG, there must be an effective algorithm to calculate eu,v.

4 System model and design objectives

4.1 System model

In our proposed scheme, there are four entities: trusted third party (TA) for key distribution, control center (CC) for data collection, and m intermediate aggregator Aggi for data aggregation, i1,m. N smart meters SMij under Aggi, j1,n. Figure 1 specifically describes the system model of the proposed scheme, as well as explanations of the corresponding symbols. Below is an introduction to the role of each entity.

FIGURE 1
www.frontiersin.org

FIGURE 1. System model.

In an intelligent grid environment, the communication network is represented by a layered architecture. The communication network layer can be divided into three main network transmission layers: 1) Wide Area Network (Wide Area Network, WAN), 2) Neighborhood Area Network (Neighborhood Area Network, NAN), and 3) Home Area Network (Home Area Network, HAN).

Wide Area Network (WAN): It provides communication between the power company and all distribution substations. WAN has distributed generation and storage capabilities and is a high-bandwidth bidirectional communication network. It employs advanced monitoring and control techniques to handle long-distance information transmission and achieve real-time responsiveness. Fiber optics and microwave communications are suitable for WAN due to their high bandwidth, low latency, and reliable communication requirements.

Neighborhood Area Network (NAN): It covers the communication framework of distribution substations’ network, enabling automatic distribution and control of communication between all nodes within the network. NAN acts as a bridge between HAN and WAN, processing the information sent by HAN through NAN and sending it to WAN via data concentrators. Fiber optics, WiMAX, cellular, and RF grid technologies are preferred transmission technologies for NAN.

Home Area Network (HAN): It is the communication framework for the user end of distribution substations, providing a communication network for the user area and located at the furthest end of the network architecture. It collects electricity usage information through smart meters, manages and provides feedback on users’ electricity consumption behaviors. HAN has the characteristics of low bandwidth, low speed, and low cost communication. ZigBee, Wi-Fi, and other technologies are candidates for HAN communication.

TA: A trusted third party is a fully trusted institution that stores the identities of all legitimate entities. TA generates system parameters for other entities for authentication between different entities.

CC: The control center is an honest and curious entity, mainly used for the collection and analysis of power data. By collecting regular power consumption data of users, CC can predict the next power consumption of users through big data analysis, adjust the generation capacity and formulate reasonable electricity prices, and users can receive electricity price information and decide on their own electricity use.

Agg: The intermediate News aggregator is an honest and curious entity. Agg is the relay node between CC and SM. It aggregates power data from all SM in the region and forwards it to CC.

SM: Smart electricity meter is an honest and curious entity. SM is a edge device deployed on the user side. It records the power consumption data of users and transmits it to Agg encrypted.

For system modeling, we first use TA to generate the required system parameters for distribution to other entities. Secondly, other entities need to mutually authenticate each other to ensure the legitimacy of the participating entities before uploading data. Finally, SM uploads encrypted data, which is aggregated and forwarded to CC by Agg. CC can decrypt the aggregated data. Throughout this process, all entities except the user are unable to access the corresponding personal private data.

4.2 Attack model

In our proposed solution, we specifically consider the following attack models:

1) External attacks: external attacks refer to attackers from outside the system, such as malicious smart meters, aggregator and other attackers. They attempt to forge legal identities to steal power data, forge false power data to disrupt the stable operation of the power system, and may also launch denial of service attacks (DoS attacks).

2) Internal attack: In our proposed solution, CC and Agg are both honest and curious entities that faithfully complete system tasks. Agg may learn plaintext message content from the received SM data, and CC may learn user personal power data from the received aggregated data.

3) Collusive attack: CC and Agg may launch a collusive attack to obtain data from a single user.

4.3 Design objectives

Our solution should meet the following design goals for the defined attack model:

1) Authentication of legitimate users: Before uploading user data, the scheme can verify the identity of each participant in the system and detect the false identity of malicious attackers, ensuring that the data is forwarded by legitimate entities.

2) Integrity and confidentiality of power data: In the proposed solution, we should ensure the security of encrypted power data, that is, integrity and confidentiality. In the process of power data transmission, even if a malicious attacker obtains encrypted data, he/she cannot decrypt the data, and internal attackers cannot obtain detailed personal data. Even if a collusive attack is launched, only aggregated data can be obtained.

3) Batch verification: The solution should enable batch processing of identity verification during the message upload process, improve verification efficiency, and reduce system operation consumption.

4) Privacy of user: In the scheme, we should ensure the privacy of user, while CC can only obtain aggregated power data, Agg can only obtain encrypted data, and they cannot infer any information about the user.

5 Proposed solution

In this section, we will provide a detailed design process, which is divided into five stages: A. System initialization stage; B. Certification stage; C. Data reporting stage; D. Decrypting data stage; E. Analysis and feedback stage and Table 1 provides some symbols used in the proposed scheme.

TABLE 1
www.frontiersin.org

TABLE 1. Symbols and interpretation.

5.1 System initialization phase

1) Generating system parameters: TA defines two multiplicative cyclic group G,GT with prime q. G randomly generates g and defines a Bilinear map e: e:G×GGT. Hash function H:0,1*G, H1:0,1*0,1λ, For SMij randomly generates random numbers yijR, satisfies i=1nyij=0. TA broadcasting system parameters G,GT,g,e,H,H1 are given to all participating entities, and CC generates encrypted public and private key pairs h,fRq*×R through the NTRU algorithm.

2) Registered identity: CC randomly selects a random number xCzq. Calculate XC=gxC, send H1IDCXC to TA, and TA calculates H1IDC based on the stored identity IDC, if CC’s authentication passes, TA broadcasts XC; Aggi randomly select a random number xizq, calculate Xi=gxi, send H1IDiXi to TA, and TA calculates H1IDi based on the stored IDi, if the identity of Aggi verification passed, TA broadcast Xi; SMij randomly select a random number xijzq, calculate Xij=gxij, send H1IDijXij to TA, and TA calculates H1IDij based on the stored IDij, if the identity of SMij verification passed, TA broadcast Xij; Distribute yij through secure channels to SMij.

5.2 Certification stage

1) CCAggi: CC wants to collect user data, first of all, it needs to report to Aggi prove its identity, use own identity private key to encrypted the collect data request Q, generate a signature and send it to Aggi. Namely, σc=HQ,Tvxc, Tv is a timestamp, which can resist Replay attack. Send Q,σc,h,Tv To Aggi. Aggi receive the request and signature sent by CC, first verify the timestamp, and then calculate eHQ,Tv,XC=eσc,g to verify the identity of CC.

2) AggiSMij: After Aggi verifying the identity of CC, it need to forward the data collection request to SMij. Aggi first need to report to SMij proves identity, encrypts data collection request Q using its own identity private key, generates a signature, and sends it to SMij, i.e., σi=HQ,Tvxi, Tv is the timestamp, sending Q,σi,h,Tv To SMij, SMij received the request and signature sent by Aggi first verify the timestamp, and then calculate eHQ,Tv,Xi=eσi,g Verify the identity of Aggi. If the identity of Aggi is correct, then SMij executes data collection requests.

Algorithm 1.Authentication Algorithm.

1   Input:

2    Q,xzq,g,H.

3   Output:

4    Q,σ,Tv

5   A randomly select xzq

6   Let X=gx

7   Let σ=HQ,Tvx

8   Send Q,σ,Tv to B

9   B check Tv, then

10   If eHQ,Tv,XC=eσ,g then

11    Verification passed

12    Else

13    reject

14   End

5.3 Data reporting phase

1) SMijAggi: After SMij verified the identity of Aggi, execute the request to collect data and generate electricity data mij, encrypting power data using the public key h sent by CC, SMij select random number sij,eijγ¯α, TA generated yij for SMij, use Formula 3 to calculate the encrypted ciphertext: Cij=hsij+peij+mij+yij, generate a signature using the identity private key before forwarding the ciphertext: σij=HCij,Tvxij, forwarding Cij,σij,Tv To Aggi.

2) AggiCC: After Aggi have received all the data is forwarded by SMij, the timestamp Tv needs to be verified first. Then calculate j=1neHCij,Tv,Xij=j=1neσij,g, if the equation holds, then Aggi aggregate all received power data form SMij, Ci=j=1nCij, otherwise, discard the data. Illegal users can be found by verifying a single identity signature. After aggregating all data, Aggi calculate σi=HCi,Tvxi, generate its signature, forward Ci,σi,Tv To CC. The specific identity authentication and encryption algorithms are described in Algorithm 1 and Algorithm 2.

Algorithm 2.Encryption Algorithm.

1   Input:

2    n,qZ,pRq*,σR,sij,eijγ¯α,yijR,mij.

3   Output:

4    Cij

5   Sample f from DZn,σ, let f=pf+1

6   If fmodqRq*,

7    resample.

8   Sample g from DZn,σ,

9   If gmodqRq*,

10    resample

11   Return secret key sk=f and public key pk=pgfRq*.

12   Set sij,eijγ¯α,yijR

13   Let Cij=hsij+peij+mij+yij

14   Return Cij

5.4 Decrypting data stage

CC decrypts data: After CC received data form Aggi aggregated SMij, first verify the timestamp, and then calculate i=1meHCi,Tv,Xi=i=1meσi,g. If the equation holds, CC receives the correct aggregated data, and vice versa, discards the data. CC decrypts the received aggregated data through its own encrypted private key f. CC is calculated using Formula 4:

C=fCi=fj=1nhsij+peij+mij+yij(7)

use Formula 5 to calculate:

mi=Cmodp=j=1mmij(8)

mi is the decrypted aggregated data. Algorithm 3 describes the decryption algorithm Formula 9 proves the correctness of decryption.

Algorithm 3.Decryption Algorithm.

1   Input:

2    Cij,f.

3   Output:

4    mi

5   Let Ci=j=1nCij

6   Let C=fCi = fj=1nhsij+peij+mij+yij

7   Let mi=Cmodp=j=1mmij

8   Return mi

5.5 Analysis and feedback stage

After CC decrypts the aggregated data, it analyzes the data and predicts the power generation W and time of use electricity price P for the next period of time. The time of use electricity price P is sent to users for adjusting their electricity consumption (Table 2).

TABLE 2
www.frontiersin.org

TABLE 2. Flow chart of the proposed solution.

6 Safety analysis

In this section, we provide a security proof of the scheme based on the design objectives, which mainly includes four aspects: secure identity authentication, integrity of power data, confidentiality of power data, and privacy of user identity. At the same time, we also made comparisons with other solutions.

6.1 Secure identity authentication

We have described the security verification of the proposed scheme. Specifically, the signature verification of the scheme is based on the CDH assumption of hardness, and only the verified ID can perform correct signature verification. Without the help of the trust center, attackers cannot forge a valid signature because the collision resistance and unidirectionality of the hash function cannot find two different IDs with the same output, nor can input values be found through hash values. Therefore, we have achieved resistance to external attacks.

Theorem 1. Assuming a hash function H1 is a random oracle. If the CDH problem is difficult to solve, then our identity authentication algorithm has the ability to reduce losses L=qH's EU-CMA security model is provably secure, where qH is the number of hash requests queried from the random oracle (Wei et al., 2020).

Proof: Assuming the existence of an adversary A, it is possible to use advantage of t,qs,ε breaking the signature scheme. We can construct a simulator B to call adversary A to solve the CDH problem, given g,ga,gbG, and calculate gab. Simulator B controls the random oracle and calls A to perform the following steps.

1) Setup: B sets the public key X=gx. The public key is obtained from the given G, and the simulator does not know the private key x.

2) H-Query: A performs a hash query at this stage. B randomly selects an integer i*1,qH before receiving A 's query. Then B prepares a Hash table (initially empty) to store all hash queries and results. Assuming the i-th hash query is mi. The timestamp is Tv. If mi is already in the Hash table, and B responds to the corresponding information in the table. Otherwise, B randomly selects a wizq. Respond to the following information:

Hmi,Tv=gb+wi,if i=i*gwi,otherwise

B responds to the query corresponding to Hmi,Tv and adds i,mi,wi,Hmi to the Hash table.

3) Query: A performs signature query at this stage. For signature query on mi, if mi is the i*-th query message in the Hash table, it will be aborted. Otherwise, obtain Hmi,Tv=gwi, and B calculates the signature: σmi=gawi, σi is the correct signature of mi.

4) Forgery: A returns a forged signature σm* for a message m*. If m* has’t been queried the i*-th query message in the Hash table, terminate; otherwise, Hm*,Tv=gb+wi* is obtained. Through the definition of signature, we obtain: σm*=gb+wi*a=gab+awi*, B calculation:

σm*gawi*=gab+awi*gawi*=gab

gab is the solution to the CDH problem.

6.2 Integrity of power data

In this section, we explain that the proposed scheme can ensure the integrity of power data.

1) Security of signature algorithms

We use signature algorithms to ensure legal identity while transmitting data, and also verify whether the encrypted ciphertext has been tampered and forged. In SMij forwarded the message to Aggi, we perform a hash operation on the ciphertext and timestamp. If the ciphertext is tampered with and forged during transmission, the equation: j=1neHCij,Tv,Xij=j=1neσij,g is not hold, ensures the integrity of our ciphertext.

2) The correctness of encryption algorithm decryption

Lemma 1. If ωn1.5lognαdegpp2σ<1resp.ωn0.5lognαp2σ<1ifdegp1, then when the NTRU decryption algorithm selects s,e,f,g with a probability of 1nω1 Restore mi (Zhao et al., 2022).

Proof: In the decryption algorithm, we have C=fj=1nhsij+peij+mij+yijmodq, on R, we calculate C=fj=1nhsij+peij+mij+yij. If C<q2, then C=C on R, therefore, when f=1modp, Cmodp=Cmodp=mimodp, which means our decrypted plaintext ensures the integrity of the data. The specific decryption accuracy is as follows Formulas 1, 2, 6, 7, and 8 can verify Formula 9:

mi=Cmodp
=fj=1nhsij+peij+mij+yijmodp
=j=1nfpgfsij+fpeij+fmij+yijmodp
=j=1mmij(9)

6.3 Confidentiality of power data

In this section, we provide a solution that ensures the confidentiality of power data.

1) Lemma 2 Assuming n is a power of 2, such that Φ=xn+1 is decomposed into n linear factor modulo prime numbers q=ω1. set up ε,δ>0,pRq*,σ2nln8nqq1/2+ε. If there is an IND-CPA attack against the NTRU encryption algorithm, it runs within time T and has a success probability of 1/2+δ. Then there exists a solution with parameters q and α RLWEHNF* algorithm, which runs within time T=T+On and has a success probability of δ=δqΩn (Zhao et al., 2022).

Proof: Assuming A defines an IND-CPA attack algorithm. We constructed a B for algorithm RLWEHNF*. It runs as follows, given from URq*×R or As,ψ* for some previously selected sψ,ψγ¯α to sampling of oracle machine O. Algorithm B first calls O from Rq*×R obtains a sample h,C. Then, algorithm B uses the public key h=phRq runs A. When A outputs a challenge message M0,M1, algorithm B selects bU0,1 and calculates the challenge ciphertext C=pC+MbRq. And return C to A. Finally, when A outputs its guess of b, if b=b, then algorithm B outputs 1, otherwise it outputs 0.

Due to the reversibility of pmodq, the h used by B in Rq* is uniformly random, so the public key h given to A is also uniformly random. Therefore, according to Theorem 3 (Wei et al., 2020), the private key given to A is within the Statistical distance qΩn of the public key distribution in the real attack. In addition, the ciphertext C given to A by C=hs+e has the same correct distribution as in IND-CPA attacks. Overall, if O output the sample from As,ψ*, the probability of A succeeding and B returning 1 is greater than or equal the 1/2+δqΩn.

2) Resist internal attacks: In our solution, we can resist internal attacks. Assuming Aggi want to obtain electricity data for individual users, Aggi need to decrypt the private key of the ciphertext because the message power data is encrypted through the public key, and the private key is only known by CC, so Aggi cannot obtain clear text of power data. Assuming CC wants to obtain user personal data, this cannot be achieved because encrypted data is stored in Aggi after aggregation, CC can only obtain multiple user data after aggregation, and cannot obtain detailed personal data from the aggregated data.

3) Resisting Collusion Attacks: Assuming Aggi colluded with CC to launch a collusive attack, which cannot be achieved because we added yij only known for SMij when encrypting ciphertext, if CC gives the decryption private key to Aggi is used to decrypt individual data, because of the random number yij, Aggi unable to decrypt individual data; If Aggi sends individual user data to CC, CC is also unable to decrypt individual data, as cannot be known yij. Because i=1nyij=0, so only after aggregating all ciphertext can decryption be performed.

6.4 Privacy protection of user identity

Our scheme can protect the identity privacy of users. During the initialization phase, we used TA to authenticate the participating entities. Only authenticated entities can broadcast public keys, and only those that sign with private keys can be verified. Our solution does not involve user identity information during data transmission, thus ensuring the privacy of user identity.

6.5 Comparisons

We conducted a comparison of security and functionality with other relevant schemes. Certification is used to ensure that all participating entities are legal, represented by A. Confidentiality represents that data transmission is not accessible to other unauthorized participants, represented by C. Integrity refers to ensuring that information or data is not unauthorized tampered with during transmission or storage, or can be promptly detected after tampering, represented by I. Batch verification is represented by B and can improve the efficiency in identity verification process and reduce computational costs. Privacy protection is represented by P, indicating whether the proposed scheme implements data privacy protection. Y and N represent implementation and non-implementation, respectively. Details are shown in Table 3.

TABLE 3
www.frontiersin.org

TABLE 3. Safety and function comparison.

7 Performance analysis

In this section, we analyzed the performance of the proposed scheme, mainly including computational cost and communication overhead. We compared it with recent privacy protection schemes to highlight the efficiency of our scheme. The experiment was conducted on an Intel (R) Core (TM) i5-10210U CPU @ 2.10 GHz 8.00 GB RAM laptop.

7.1 Communication overhead

We conducted a study on the performance of communication overhead in this section. In Li’s scheme, G with a 160-bit order is selected and the point compression technique is used. The elements in G are approximate 161 bits. AES ciphertext with a 256-bit is chosen, and Cij should be generated based on the 256-bit block encryption. Therefore, the total communication overhead can be calculated as (161* min (lij mij)+80)/256 * 256 + 80 + 336) bits. In Guo’s scheme, when a smart meter sends a usage report to both the demand response management unit and the consumer, it analyzes the consumer’s desire to follow the instructions of the demand response management unit and provides proof of confirmation. The size of the report is 8| G |+3| Zq* |+|ID|+|t|, with a length of 1768 bits, excluding identity and timestamp. In comparison, In our scheme, the authentication phase does not need to occur every time data is reported. Only when new entities join or exit, the added entities are authenticated. Therefore, we do not consider the cost of the authentication phase, but only consider the communication and sales during the data reporting and decryption phases. Specifically, SMij Send Cij,σij,Tv To Aggi. Aggi Send Ci,σi,Tv to CC, the size of the ciphertext and signature are consistent with the timestamp size. We set the ciphertext length to 530bit, the signature size to 1024bit, and the timestamp size can be ignored, Therefore, the total size is 1554bit. We compared it with other schemes, as shown in Figure 2. Compared with the other two schemes, our scheme has lower communication overhead and can achieve efficient information transmission with the same number of electricity meters.

FIGURE 2
www.frontiersin.org

FIGURE 2. Comparison of communication costs with other solutions.

7.2 Calculate costs

In our scheme, the NTRU lattice scheme is used to encrypt plaintext. The encryption operation involves addition and multiplication, and the computational cost is relatively small compared to other encryption schemes. In terms of signature verification, we have implemented batch signature verification operations, which can reduce the computational cost. In Figure 3, we compared the computational cost of batch verification with that of individual verification. The results show that under the same number of signatures, The computational cost of batch validation is approximately half that of individual validation. We provide the calculation costs of our scheme and other schemes in Table 4, and conduct experimental comparisons in Figure 4. We use cs represents the calculation cost of the hash function, using cx represents XOR calculation cost, ce represents the computational cost of the power operation, cm represents the computational cost of multiplication, Gp and Gm represents the computational cost of pairing operations and multiplication operations in G. The calculation cost of our plan is 3cm+2ce+2Gp+2cs. Li et al. calculated the cost as 2Gm+2ce+Gp+3cs. The computational cost of Guo et al.’s (Abdallah and Shen, 2018) scheme is 3Gm+9ce+cx+3cs. Since Li (Nyangaresi, 2022) and others use homomorphic encryption based on Paillier, which relatively increases the computing cost, the experimental results show that our scheme has low computing cost and can achieve efficient operation.

FIGURE 3
www.frontiersin.org

FIGURE 3. Comparison between batch validation and individual validation.

TABLE 4
www.frontiersin.org

TABLE 4. Calculated costs for our plan and other plans.

FIGURE 4
www.frontiersin.org

FIGURE 4. Comparison of calculated costs between our scheme and other schemes.

In the proposed solution, a trusted center is included, assuming that it is a trusted third party. However, in real life, it is difficult to find an absolutely trustworthy third party to implement our solution, which is one of the limitations of the proposed solution. Other solutions that involve a third-party trust agency also face similar problems. At the same time, although our solution is lightweight, there must be a more efficient solution available. Therefore, establishing a solution without a trusted third party and improving efficiency is the direction of our next research.

8 Conclusion

Privacy protection is one of the obstacles to the rapid development of smart grids. Only by solving the privacy issues of the participating entities involved in smart grids can the collected granular data be efficiently used to make the grid intelligent. Considering the massive information collection in smart grids and the limitations of edge devices, an efficient privacy protection solution is needed. In this paper, we propose an efficient and batch-verified privacy protection scheme for smart grids. This scheme uses homomorphic encryption technology to achieve effective aggregation of user power data. During the transmission of power data, legitimate users sign the messages, ensuring confidentiality, integrity, and availability of the data. To improve efficiency, we have proposed a method for batch verification, reducing computational cost and communication overhead, in order to protect user privacy. Security analysis shows that our scheme is resistant to external attacks, internal attacks, and collusion attacks. Performance analysis shows that our scheme enables efficient data aggregation and is applicable to edge devices in smart grids. In summary, the proposed new privacy protection scheme enhances efficiency and can withstand malicious attacks such as tampering, forgery, and theft, thereby improving the privacy security of smart grids.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Materials, further inquiries can be directed to the corresponding author.

Author contributions

MW: Methodology, Validation, Writing–original draft. LZ: Funding acquisition, Writing–review and editing.

Funding

The author(s) declare financial support was received for the research, authorship, and/or publication of this article. The work of LZ was supported by Natural Science Foundation of Heilongjiang Province of China (LH2020F041), and the research start-up funds of Guangdong Polytechnic Normal University (Grant No. 991682313).

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Abdallah, A., and Shen, X. S. (2018). A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans. Smart Grid 9 (1), 396–405. doi:10.1109/tsg.2016.2553647

CrossRef Full Text | Google Scholar

Abdallah, A. R., and Shen, X. S. (2014). “A lightweight lattice-based security and privacy-preserving scheme for smart grid,” in Global Communications Conference, Austin, Texas, 8-12 December, 2014 (IEEE).

CrossRef Full Text | Google Scholar

Baghestani, S. H., Moazami, F., and Tahavori, M. (2022). Lightweight authenticated key agreement for smart metering in smart grid. IEEE Syst. J. 16 (3), 4983–4991. doi:10.1109/jsyst.2022.3188759

CrossRef Full Text | Google Scholar

Cao, Y.-N., Wang, Y., Ding, Y., Guo, Z., Wu, Q., and Liang, H. (2023). Blockchain-empowered security and privacy protection technologies for smart grid. Comput. Stand. Interfaces 85, 103708. doi:10.1016/j.csi.2022.103708

CrossRef Full Text | Google Scholar

Deng, L., Wang, T., Feng, S., Qu, Y., and Li, S. (2023). Secure identity-based designated verifier anonymous aggregate signature scheme suitable for smart grids. IEEE Internet Things J. 10 (1), 57–65. doi:10.1109/jiot.2022.3199480

CrossRef Full Text | Google Scholar

Fan, C. I., Huang, S. Y., and Lai, Y. L. (2013). Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Industrial Inf. 10 (1), 666–675. doi:10.1109/tii.2013.2277938

CrossRef Full Text | Google Scholar

Fan, W. A., Xiong, L., Lx, D., and Kumari, S. (2020). A privacy-preserving scheme with identity traceable property for smart grid. Comput. Commun. 157, 38–44. doi:10.1016/j.comcom.2020.03.047

CrossRef Full Text | Google Scholar

Gong, X., Hua, Q. S., Qian, L., Yu, D., and Jin, H. (2018). “Communication-efficient and privacy-preserving data aggregation without trusted authority,” in IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, Hawaii, 16-19 April 2018 (IEEE).

CrossRef Full Text | Google Scholar

Guo, C., Jiang, X., Choo, K. K. R., Tang, X., and Zhang, J. (2020). Lightweight privacy preserving data aggregation with batch verification for smart grid. Future Gener. Comput. Syst., 112. doi:10.1016/j.future.2020.06.001

CrossRef Full Text | Google Scholar

Guo, F., Susilo, W., and Mu, Yi (2018). Introduction to security reduction. Cham: Springer.

Google Scholar

Hu, S., Chen, Y., Zheng, Y., Xing, B., Li, Y., Zhang, L., et al. (2023). Provably secure ECC-based authentication and key agreement scheme for advanced metering infrastructure in the smart grid. IEEE Trans. Industrial Inf. 19 (4), 5985–5994. doi:10.1109/tii.2022.3191319

CrossRef Full Text | Google Scholar

Hua, S. A., Yl, A., Zhe, X. D., and Zhang, M. (2020). An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Inf. Sci. 526, 289–300. doi:10.1016/j.ins.2020.03.107

CrossRef Full Text | Google Scholar

Li, C., Lu, R., Li, H., Chen, L., and Chen, J. (2015). PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications. Secur. Commun. Netw. 8 (15), 2494–2506. doi:10.1002/sec.1191

CrossRef Full Text | Google Scholar

Li, H., Lin, X., Yang, H., Liang, X., Lu, R., and Shen, X. (2014). EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel & Distributed Syst. 25 (8), 2053–2064. doi:10.1109/tpds.2013.124

CrossRef Full Text | Google Scholar

Mall, P., Amin, R., Das, A. K., Leung, M. T., and Choo, K.-K. R. (2022). PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: a comprehensive survey. IEEE Internet Things J. 9 (11), 8205–8228. doi:10.1109/jiot.2022.3142084

CrossRef Full Text | Google Scholar

Nyangaresi, V. O. (2022). Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. J. Syst. Archit. 133, 102763. doi:10.1016/j.sysarc.2022.102763

CrossRef Full Text | Google Scholar

Patil, A. S., Hamza, R., Hassan, A., Jiang, N., Yan, H., and Li, J. (2020). Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Comput. Secur. 97, 101958. doi:10.1016/j.cose.2020.101958

CrossRef Full Text | Google Scholar

Qian, J., Cao, Z., Dong, X., Shen, J., Liu, Z., and Ye, Y. (2021). Two secure and efficient lightweight data aggregation schemes for smart grid. IEEE Trans. Smart Grid 12 (3), 2625–2637. doi:10.1109/tsg.2020.3044916

CrossRef Full Text | Google Scholar

Roozbeh, S., Mahmoud, S., Ameri, M. H., and Aref, M. R. (2021). A secure and privacy-preserving protocol for holding double auctions in smart grid. Inf. Sci. Int. J. 557 (1), 108–129. doi:10.1016/j.ins.2020.12.038

CrossRef Full Text | Google Scholar

Sadhukhan, D., Ray, S., Obaidat, M., and Dasgupta, M. (2022). A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. J. Syst. Archit. 114, 2021. doi:10.1016/j.sysarc.2020.101938

CrossRef Full Text | Google Scholar

Sanaullah Badar, H. M., Mahmood, K., Akram, W., Ghaffar, Z., Umar, M., and Das, A. K. (2022). Secure authentication protocol for home area network in smart grid-based smart cities. Comput. Electr. Eng. 108, 108721. doi:10.1016/j.compeleceng.2023.108721

CrossRef Full Text | Google Scholar

Sani, A. S., Bertino, E., Yuan, D., Meng, K., and Dong, Z. Y. (2022). SPrivAD: a secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Comput. Secur. 115, 102610. doi:10.1016/j.cose.2022.102610

CrossRef Full Text | Google Scholar

Song, J., Liu, Y., Shao, J., and Tang, C. (2020). A dynamic membership data aggregation (DMDA) protocol for smart grid. IEEE Syst. J. 14 (1), 900–908. doi:10.1109/jsyst.2019.2912415

CrossRef Full Text | Google Scholar

Stehlé, D., and Steinfeld, R. (2011). Making NTRU as secure as worst-case problems over ideal lattices. Cham: Springer-Verlag.

Google Scholar

Sui, Z. Y., and Meer, H. D. (2020). BAP: a batch and auditable privacy preservation scheme for demand response in smart grids. IEEE Trans. Industrial Inf. 16 (2), 842–853. doi:10.1109/tii.2019.2926325

CrossRef Full Text | Google Scholar

Verma, G. K., Gope, P., Saxena, N., and Kumar, N. (2023). CB-DA: lightweight and escrow-free certificate-based data aggregation for smart grid. IEEE Trans. Dependable Secure Comput. 20 (3), 2011–2024. doi:10.1109/tdsc.2022.3169952

CrossRef Full Text | Google Scholar

Vincent, H., Bhaskar, B., and Caroline, F. (2018). Design and implementation of low-depth pairing-based homomorphic encryption scheme. J. Cryptogr. Eng., 1–17. doi:10.1007/s13389-018-0192-y

CrossRef Full Text | Google Scholar

Wei, K., Jian, S., Pv, C., Cho, Y., and Chang, V. (2020). A practical group blind signature scheme for privacy protection in smart grid. J. Parallel Distributed Comput. 136, 29–39. doi:10.1016/j.jpdc.2019.09.016

CrossRef Full Text | Google Scholar

Zhang, J., and Dong, C. (2023). Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators. J. King Saud Univ. - Comput. Inf. Sci. 35 (4), 100–111. doi:10.1016/j.jksuci.2023.03.002

CrossRef Full Text | Google Scholar

Zhang, W., Liu, S., Xia, Z., Han, J., and Gao, J. F. (2022b). Hydrophobic and porous carbon nanofiber membrane for high performance solar-driven interfacial evaporation with excellent salt resistance. J. Inf. Secur. Appl. 612, 66–75. May. doi:10.1016/j.jcis.2021.12.093

CrossRef Full Text | Google Scholar

Zhang, W., Huang, C., Gu, D., Zhang, J., Xue, J., and Wang, H. (2022a). Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. J. Syst. Archit. 2022 (127), 127. doi:10.1016/j.sysarc.2022.102508

CrossRef Full Text | Google Scholar

Zhao, P., Huang, Y., Gao, J., Xing, L., Wu, H., and Ma, H. (2022). Federated learning-based collaborative authentication protocol for shared data in social IoV. IEEE Sensors J. 22 (7), 7385–7398. doi:10.1109/jsen.2022.3153338

CrossRef Full Text | Google Scholar

Keywords: high efficiency, batch validation, privacy protection, mutual authentication, homomorphic aggregation

Citation: Wang M and Zhang L (2024) Efficient privacy protection scheme with batch verification in smart grid. Front. Energy Res. 11:1298837. doi: 10.3389/fenrg.2023.1298837

Received: 22 September 2023; Accepted: 20 December 2023;
Published: 09 January 2024.

Edited by:

Haris M. Khalid, University of Dubai, United Arab Emirates

Reviewed by:

Aravind C. K., Mepco Schlenk Engineering College, India
Md. Rasel Sarkar, University of New South Wales, Australia

Copyright © 2024 Wang and Zhang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Lei Zhang, zhanglei@gpnu.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.