Anda di halaman 1dari 17

OUTLINE

Introduction

Literature Review

Problem Statement

Proposed Approach

Results

Conclusion

Future Work

1
INTRODUCTION: SMART GRID

 Smart grid is the next generation power delivery


infrastructure.
 Improve the electrical power delivery system and
solving many of the current problems in power
delivery.
 A smart grid is a large complex system, separated
into five categories that make up different
components of the smart grid w.r.t security
1. Process Control System (PCS) Security
2. Smart Meter Security
3. Power System State Estimation Security
4. Smart Grid Communication Protocol Security
5. Smart Grid Simulation for Security Analysis

• HTTPS://WWW.EOLASMAGAZINE.IE/SMART-GRID-EVOLUTION/
• HTTPS://WWW.SCIENCEDIRECT.COM/SCIENCE/ARTICLE/PII/S0045790617313423 2
INTRODUCTION: SMART METER

 Advance metering infrastructure.


 Smart meter is an essential component of a
smart grid that provides accurate measurement
and automate remote reading of power
consumption.
 Has ability to do two-way communication.
 Two main communication functions :
1. Send the collected data to the utility company
and receive operational commands from
operator.
2. Exchange data with equipment that supports
home energy management system.

These abilities make it an interesting target for attackers.


• HTTPS://WWW.ELP.COM/ARTICLES/POWERGRID_INTERNATIONAL/PRINT/VOLUME-16/ISSUE-4/FEATURES/THE-INCREASING-
IMPORTANCE-OF-SECURITY-FOR-THE-SMART-GRID.HTML 3
INTRODUCTION: ATTACKER TYPES

Curious eavesdroppers Motivated eavesdroppers Unethical customers


Who just want to know Who want to gather Who want to steal
about the activities of their information for malicious electricity and not pay for
neighbors. purposes. the services.

Intrusive data
Publicity seekers
management agencies Active attackers
Who are more interested
Who want to gather Who want to perform
in getting famous rather
private information and large-scale attacks.
than harming the users
create user profiles for Terrorist activities fall into
and gaining financial
marketing and economic this category.
rewards.
purposes.

4
INTRODUCTION: ATTACKS ON SMART METER

Security issues can be categorized into three categories:

• Attacks on network
• Attacks on physical hardware
• Attacks on data

Our focus is “Attacks on data” we are trying to secure the data of smart meter.
5
INTRODUCTION: SMART METER
DATA

 Smart meter measure the voltage and


current at a frequency of about once a
second.
 Generate the power load profile using
𝑉 𝑎𝑛𝑑 I
 There are such algorithm exist that can
determine which appliances were used at
the home in what time duration.
 NONINTRUSIVE LOAD MORIITORING
(NILM)

• HTTPS://ARXIV.ORG/FTP/ARXIV/PAPERS/1508/1508.02353.PDF 6
INTRODUCTION: NON INTRUTSIVE
LOAD MONITORING (NILM)

 NILM has 90% accuracy in detection of


appliances.
 NILM can use to determine occupancy
patterns of the person present in the home.
 Determine which specific brands of appliance
use.
 The availability of data at such fine
granularities has raised privacy concerns.
 So it is very important to secure the smart
meter data.

BATRA, NIPUN, ET AL. "NILMTK: AN OPEN SOURCE TOOLKIT FOR NON-INTRUSIVE LOAD MONITORING." PROCEEDINGS OF THE
5TH INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS. ACM, 2014. 7
LITERATURE REVIEW: SMART GRID PRIVACY VIA ANONYMIZATION OF SMART
METERING DATA

 Proposed 3rd party escrow mechanism for authenticated anonymous meter readings.

• EFTHYMIOU, COSTAS, AND GEORGIOS KALOGRIDIS. "SMART GRID PRIVACY VIA ANONYMIZATION OF SMART METERING
DATA." 2010 FIRST IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS. IEEE, 2010.
LITERATURE REVIEW: PRIVACY FOR SMART METERS: TOWARDS UNDETECTABLE
APPLIANCE LOAD SIGNATURES

• Moderate the home’s load signature in order to


hide appliance usage information.
• Proposed power management model using
rechargeable battery.

9
• KALOGRIDIS, GEORGIOS, ET AL. "PRIVACY FOR SMART METERS: TOWARDS UNDETECTABLE APPLIANCE LOAD
SIGNATURES." 2010 FIRST IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS. IEEE, 2010.
LITERATURE REVIEW: CONDITIONAL ACCESS SMART METER PRIVACY
BASED ON MULTI-RESOLUTION WAVELET ANALYSIS

 Multi-resolution representation of the load data is created using the simple wavelet transform.

10
• ENGEL, DOMINIK. "CONDITIONAL ACCESS SMART METER PRIVACY BASED ON MULTI-RESOLUTION WAVELET
ANALYSIS." PROCEEDINGS OF THE 4TH INTERNATIONAL SYMPOSIUM ON APPLIED SCIENCES IN BIOMEDICAL AND COMMUNICATION
TECHNOLOGIES. ACM, 2011.
PROBLEM STATEMENT

 We are trying to secure the smart data in such way that eavesdropper can not
recognize and track appliance usage.
 Trying to build a solution that have low computation cost.

11
ORIGINAL DATA

We use REDD-MIT dataset released in 2011 by Zico Kolter and Matthew J. Johnson. They compute
the average power once in a second of the 5 different houses for a week.

12
ZICO KOLTTER MATTEW J.JOHNSON, AND WILLIAM KNOTTENBELT. "THE REDD DATASET, DOMESTIC APPLIANCE-LEVEL
ELECTRICITY DEMAND AND WHOLE-HOUSE DEMAND FROM FIVE HOMES." SCIENTIFIC DATA 2 (2011): 150007.
DCT TRANSFORM

A discrete cosine transform (DCT) expresses a finite sequence of data points in terms of a sum of cosine
functions oscillating at different frequencies.

Take the inner product of original data with ortho bases of DCT.

The advantage of the DCT is that only few coefficients capture all the behavior of the load profile.
13
DCT COEFFICIENTS

14
CHAOS SIGNAL

Chaos signal is generating using the Lorenz attractor.

Lorenz attractor is the system of three ODEs and resemble like a butterfly.

Solution of ODEs is depending on the initial values of 𝑥, 𝑦, and 𝑧.

Small change in initial values changes a lot the chaotic behavior of the system.

Chaos signal is generated by multiplying each component.


=100(𝑥 × 𝑦 × 𝑧)
15

HTTPS://EN.WIKIPEDIA.ORG/WIKI/LORENZ_SYSTEM
ENCRYPT DCT COEFFICIENTS

16
DECRYPT OBFUSCATED DATA

17

Anda mungkin juga menyukai