Professional Documents
Culture Documents
Smartgrid Privacy
Smartgrid Privacy
Introduction
Literature Review
Problem Statement
Proposed Approach
Results
Conclusion
Future Work
1
INTRODUCTION: SMART GRID
• HTTPS://WWW.EOLASMAGAZINE.IE/SMART-GRID-EVOLUTION/
• HTTPS://WWW.SCIENCEDIRECT.COM/SCIENCE/ARTICLE/PII/S0045790617313423 2
INTRODUCTION: SMART METER
Intrusive data
Publicity seekers
management agencies Active attackers
Who are more interested
Who want to gather Who want to perform
in getting famous rather
private information and large-scale attacks.
than harming the users
create user profiles for Terrorist activities fall into
and gaining financial
marketing and economic this category.
rewards.
purposes.
4
INTRODUCTION: ATTACKS ON SMART METER
• Attacks on network
• Attacks on physical hardware
• Attacks on data
Our focus is “Attacks on data” we are trying to secure the data of smart meter.
5
INTRODUCTION: SMART METER
DATA
• HTTPS://ARXIV.ORG/FTP/ARXIV/PAPERS/1508/1508.02353.PDF 6
INTRODUCTION: NON INTRUTSIVE
LOAD MONITORING (NILM)
BATRA, NIPUN, ET AL. "NILMTK: AN OPEN SOURCE TOOLKIT FOR NON-INTRUSIVE LOAD MONITORING." PROCEEDINGS OF THE
5TH INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS. ACM, 2014. 7
LITERATURE REVIEW: SMART GRID PRIVACY VIA ANONYMIZATION OF SMART
METERING DATA
Proposed 3rd party escrow mechanism for authenticated anonymous meter readings.
• EFTHYMIOU, COSTAS, AND GEORGIOS KALOGRIDIS. "SMART GRID PRIVACY VIA ANONYMIZATION OF SMART METERING
DATA." 2010 FIRST IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS. IEEE, 2010.
LITERATURE REVIEW: PRIVACY FOR SMART METERS: TOWARDS UNDETECTABLE
APPLIANCE LOAD SIGNATURES
9
• KALOGRIDIS, GEORGIOS, ET AL. "PRIVACY FOR SMART METERS: TOWARDS UNDETECTABLE APPLIANCE LOAD
SIGNATURES." 2010 FIRST IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS. IEEE, 2010.
LITERATURE REVIEW: CONDITIONAL ACCESS SMART METER PRIVACY
BASED ON MULTI-RESOLUTION WAVELET ANALYSIS
Multi-resolution representation of the load data is created using the simple wavelet transform.
10
• ENGEL, DOMINIK. "CONDITIONAL ACCESS SMART METER PRIVACY BASED ON MULTI-RESOLUTION WAVELET
ANALYSIS." PROCEEDINGS OF THE 4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION
TECHNOLOGIES. ACM, 2011.
PROBLEM STATEMENT
We are trying to secure the smart data in such way that eavesdropper can not
recognize and track appliance usage.
Trying to build a solution that have low computation cost.
11
ORIGINAL DATA
We use REDD-MIT dataset released in 2011 by Zico Kolter and Matthew J. Johnson. They compute
the average power once in a second of the 5 different houses for a week.
12
ZICO KOLTTER MATTEW J.JOHNSON, AND WILLIAM KNOTTENBELT. "THE REDD DATASET, DOMESTIC APPLIANCE-LEVEL
ELECTRICITY DEMAND AND WHOLE-HOUSE DEMAND FROM FIVE HOMES." SCIENTIFIC DATA 2 (2011): 150007.
DCT TRANSFORM
A discrete cosine transform (DCT) expresses a finite sequence of data points in terms of a sum of cosine
functions oscillating at different frequencies.
Take the inner product of original data with ortho bases of DCT.
The advantage of the DCT is that only few coefficients capture all the behavior of the load profile.
13
DCT COEFFICIENTS
14
CHAOS SIGNAL
Lorenz attractor is the system of three ODEs and resemble like a butterfly.
Small change in initial values changes a lot the chaotic behavior of the system.
HTTPS://EN.WIKIPEDIA.ORG/WIKI/LORENZ_SYSTEM
ENCRYPT DCT COEFFICIENTS
16
DECRYPT OBFUSCATED DATA
17