be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring. Therefore, toprevent the disclosure of personal information through the analysis of energy consumption patterns, the metering data mustbe securely handled. Peer-to-peer networking is a promising approach for interconnecting communication nodes among theautomatic metering infrastructure to efficiently perform data collection while ensuring privacy and confidentiality, but it isalso prone to various security attacks. This paper discusses the impact of the most relevant peer-to-peer attack scenarios onthe performance of a protocol for privacy preserving aggregation of metering data. The protocol relies on communicationgateways located in the customers’ households and interconnected by means of a variant of the Chord overlay. We alsopropose some countermeasures to mitigate the effects of such attacks: we integrate a verifiable secret sharing schemebased on Pedersen commitments in the aggregation protocol, which ensures data integrity, with compliance checks aimedat identifying the injection of altered measurements. Moreover, we introduce Chord auxiliary routing tables to counteractthe routing pollution performed by dishonest nodes. The paper evaluates the computational complexity and effectivenessof the proposed solutions through analytical and numerical results.
展开▼