首页> 外文OA文献 >Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids
【2h】

Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

机译:缓解智能电网自动计量基础架构中的对等覆盖攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring. Therefore, toprevent the disclosure of personal information through the analysis of energy consumption patterns, the metering data mustbe securely handled. Peer-to-peer networking is a promising approach for interconnecting communication nodes among theautomatic metering infrastructure to efficiently perform data collection while ensuring privacy and confidentiality, but it isalso prone to various security attacks. This paper discusses the impact of the most relevant peer-to-peer attack scenarios onthe performance of a protocol for privacy preserving aggregation of metering data. The protocol relies on communicationgateways located in the customers’ households and interconnected by means of a variant of the Chord overlay. We alsopropose some countermeasures to mitigate the effects of such attacks: we integrate a verifiable secret sharing schemebased on Pedersen commitments in the aggregation protocol, which ensures data integrity, with compliance checks aimedat identifying the injection of altered measurements. Moreover, we introduce Chord auxiliary routing tables to counteractthe routing pollution performed by dishonest nodes. The paper evaluates the computational complexity and effectivenessof the proposed solutions through analytical and numerical results.
机译:可以由众多外部主题出于不同目的进行访问,从计费到网格监控。因此,为了通过能量消耗模式的分析来防止个人信息的泄露,必须安全地处理计量数据。对等网络是一种在自动计量基础设施之间互连通信节点以在确保隐私和机密性的同时高效执行数据收集的有前途的方法,但是它也容易受到各种安全攻击。本文讨论了最相关的点对点攻击方案对保密性的计量数据聚合协议性能的影响。该协议依赖于位于客户家庭中的通信网关,并通过Chord覆盖的变体相互连接。我们还提出了一些缓解措施,以减轻此类攻击的影响:我们在聚合协议中集成了基于Pedersen承诺的可验证秘密共享方案,该方案可确保数据完整性,并具有旨在识别注入更改后的度量值的合规性检查。此外,我们引入了Chord辅助路由表,以抵消不诚实节点执行的路由污染。本文通过分析和数值结果评估了所提出解决方案的计算复杂性和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号