SDAFA: Secure Data Aggregation in Fog-Assisted Smart Grid Environment
Abstract
:1. Introduction
Problem Definition and Motivation
- In the existing works, a huge amount of data is sent to BS across a point-to-point network which can lead to increase in communication costs. Schemes such as in [14,15,16] aggregate data without using any kind of compression method but only asymmetric keys, which increases communication costs owing to huge message length, memory requirements and computation time. The proposed scheme is capable of sending huge amount of data in an aggregated manner with a compression technique—securely and efficiently through the network;
- Previous schemes were not implemented in IoT-based fog environment, but the proposed approach makes use of this environment. Computation is high due to the large number of heterogeneous devices’ data which is challenging due to more energy consumption along with security constraint. The SDAFA scheme uses a compression technique before transmitting the data, which ensures the security as well as energy conservation;
- The proposed scheme uses timestamps to validate the data and if the timestamp expires for a message, then the message is rejected for real-time data of smart meters (this is done to avoid processing of the delayed data which is of no use after a certain amount of time because specific actions such as prediction of uncertain events requires instant action), whereas there was no equivalent to this in existing schemes;
- Based on the limitations we have studied in existing or previous work, a technique has been proposed that uses a three-layer model to reduce the communication cost and improve energy conservation as described in Algorithm 1, Section 5;
- We performed a comparative analysis with GCEDA and SPPDA for various performance parameters, such as storage space, communication cost and transmission cost, and proved that the proposed solution outperforms state-of-the-art techniques and can be used for efficient and secure data transmission in a smart grid environment.
2. Related Work
3. System Model
3.1. Major Components
- Trusted Authority (TA): Being the most trustworthy component of the system, TA creates the secure public and private keys. In addition to this, it is capable of producing extra secret parameters and distributing them to every user and CC. Once the key distribution is complete, there is no use of TA in the data aggregation process.
- Smart Meters (SMs): It collects usage data for every appliance on a user’s property. Additionally, for the purposes of maintaining privacy, data integration and sender authentication, SMs can also undergo encryption operations. SMs can report their data consumption to their local fog node.
- Fog Nodes (FN): They play an important role in extending the cloud’s processing and the storage capabilities to network edge. In our suggested paradigm, FN is in charge of aggregating and transmitting user consumption data to CC. FN additionally ensures the metering data’s data integrity and source authenticity.
- Cloud: The cloud validates the integrity and source authentication of the aggregated data coming from the fog nodes before storing them.
- Control Center: The control center (CC) has cloud access and receives aggregated data from the FNs. It uses the secret key to decrypt the data and allows the user to consume the aggregated data.
3.2. Security Goals
- Privacy: In case data communicated over an unsecured channel are attacked by the attacker, adversary A will still not be capable of accessing the user’s data. There is no possibility for FN to decipher the user’s data so that FN’s security does not get jeopardize affecting the privacy of the user. In addition, CC decrypts data. Only aggregated data are available to CC after decryption; however, there is no means of obtaining data on an individual basis from each SM. As a result, individual privacy must be protected.
- Fault Tolerance: We assume that some SMs will be inactive for a period of time and will not provide FN with their consumption data. Our system being fault-tolerant will enable it to aggregate and decipher SM readings. Previous systems were incapable of solving the issue of fault tolerance leading to communication delays, as a result, the CC permission of TA for missing values was affected and it halts the data aggregation process. Our objective is to keep this delay as short as possible.
- Integrity: The integration of the metering data needs to be maintained, and unauthorized alteration of any type should be detected. If the reading of the meters has been changed, the fog node and control centre should notice it.
- Authentication: FN and CC are responsible for making sure that the data are coming from a trusted and authorized source only as the same secret key is shared with both SM and the associated FN. Similarly, CC validates the source authenticity of each FN’s aggregated data. It is necessary to avoid any fake values being injected by malicious entities that can result in victimizing an innocent user by injecting dummy data.
4. Problem Identification
5. Proposed Data Aggregation Scheme for Smart Grid
Algorithm 1 Message Aggregation at FN | |
1 | Initialize: Agg − Msgm = NULL |
2 | Begin: Receive Msgn |
3 | Msgn = (SMn) || T || CD) from meter SMn |
4 | if T − T < then |
5 | if H(Msgn) equals to H(Msgn) then |
6 | Agg − Msgm = Agg − Msgm + Msgn |
7 | else |
8 | Rejects message because of loss of integrity |
9 | else if |
10 | else |
11 | Rejects message because of failure of freshness |
12 | end if |
13 | End |
Algorithm 2 Data Extraction at Cloud | |
1 | Begin: Receive Datam |
2 | Datam = Agg − Msgm Keym, c |
3 | if H(Datam) equals to H(Datam) then |
4 | Agg − Msgm = Datam Keym, c |
5 | For count = 1 to q |
6 | Extract Msgn = (SMn || T || CD) from FN |
7 | if T T < then |
8 | Extract (cn || hn) using decompress CD |
9 | Calculate hn = h(cn || Keyn, c || T) |
10 | if hn equals to calculated h’n then |
11 | hn = cn Keyn, c |
12 | Store in cloud local repository |
13 | else |
14 | Rejects message because of loss of integrity |
15 | endif |
16 | else |
17 | Rejects message because of failure of freshness |
18 | else |
19 | Rejects message because of loss of integrity in |
20 | Agg − Msgm |
21 | endif |
22 | End |
6. Results and Discussion
6.1. Storage
6.2. Communication Cost
6.3. Transmission Cost
7. Conclusions and Future Scope
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Sayghe, A.; Hu, Y.; Zografopoulos, I.; Liu, X.; Dutta, R.G.; Jin, Y.; Konstantinou, C. Survey of machine learning methods for detecting false data injection attacks in power systems. IET Smart Grid 2020, 3, 581–595. [Google Scholar] [CrossRef]
- Prasanna Srinivasan, V.; Balasubadra, K.; Saravanan, K.; Arjun, V.S.; Malarkodi, S. Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid. KSII Trans. Internet Inf. Syst. 2021, 15, 2168–2187. [Google Scholar] [CrossRef]
- Ganjkhani, M.; Fallah, S.N.; Badakhshan, S.; Shamshirband, S.; Chau, K.W. A Novel Detection Algorithm to Identify False Data Injection Attacks on Power System State Estimation. Energies 2019, 12, 2209. [Google Scholar] [CrossRef] [Green Version]
- Li, B.; Lu, R.; Choo, K.K.R.; Wang, W.; Luo, S. On reliability analysis of smart grids under topology attacks: A stochastic petri net approach. ACM Trans. Cyber-Phys. Syst. 2018, 3, 1–25. [Google Scholar] [CrossRef] [Green Version]
- Dileep, G. A survey on smart grid technologies and applications. Renew. Energy 2020, 146, 2589–2625. [Google Scholar] [CrossRef]
- Kumar, P.; Lin, Y.; Bai, G.; Paverd, A.; Dong, J.S.; Martin, A. Smart grid metering networks: A survey on security, privacy and open research issues. IEEE Commun. Surv. Tutor. 2019, 21, 2886–2927. [Google Scholar] [CrossRef] [Green Version]
- Ganguly, P.; Nasipuri, M.; Dutta, S. Challenges of the existing security measures deployed in the smart grid framework. In Proceedings of the 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 12–14 August 2019; pp. 1–5. [Google Scholar]
- Wood, G.; Newborough, M. Dynamic energy-consumption indicators for domestic appliances: Environment, behaviour and design. Energy Build. 2003, 35, 821–841. [Google Scholar] [CrossRef]
- Luo, X.; Zhang, D.; Yang, L.T.; Liu, J.; Chang, X.; Ning, H. A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems. Future Gener. Comput. Syst. 2016, 61, 85–96. [Google Scholar] [CrossRef]
- Lyu, L.; Nandakumar, K.; Rubinstein, B.; Jin, J.; Bedo, J.; Palaniswami, M. PPFA: Privacy preserving fog-enabled aggregation in smart grid. IEEE Trans. Ind. Inform. 2018, 14, 3733–3744. [Google Scholar] [CrossRef]
- Wang, H.; Wang, Z.; Domingo-Ferrer, J. Anonymous and secure aggregation scheme in fog- based public cloud computing. Future Gener. Comput. Syst. 2018, 78, 712–719. [Google Scholar] [CrossRef]
- Liu, N.J.; Weng, J.; Yang, A.; Chen, Y.; Lin, X. Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid. IEEE Trans. Smart Grid 2019, 11, 247–257. [Google Scholar] [CrossRef]
- Guan, Z.; Zhang, Y.; Wu, L.; Wu, J.; Li, J.; Ma, Y.; Hu, J. Appa: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J. Netw. Comput. Appl. 2019, 125, 82–92. [Google Scholar] [CrossRef]
- Kishor, A.; Chakraborty, C.; Jeberson, W. A Novel Fog Computing Approach for Minimization of Latency in Healthcare using Machine Learning. Int. J. Interact. Multimed. Artif. Intell. 2021, 6, 7–17. [Google Scholar] [CrossRef]
- Han, S.; Zhao, S.; Li, Q.; Ju, C.H. Privacy-preserving and multi functional health data aggregation with fault tolerance. IEEE Trans. Inf. Forensics Secur. 2015, 11, 1940–1955. [Google Scholar] [CrossRef]
- Zhang, C.; Li, C.; Zhang, J. A secure privacy-preserving data aggregation model in wearable wireless sensor networks. J. Electr. Comput. Eng. 2015, 2015. [Google Scholar] [CrossRef] [Green Version]
- Patel, P.D.; Lapsiwala, P.B.; Kshirsagar, R.V. Data aggregation in wireless sensor network. Int. J. Manag. IT Eng. 2012, 2, 457–472. [Google Scholar]
- Fasolo, E.; Rossi, M.; Widmer, J.; Zorzi, M. In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wirel. Commun. 2007, 14, 70–87. [Google Scholar] [CrossRef]
- Othman, S.; Trad, A.; Youssef, H.; Alzaid, H. Secure data aggregation with mac authentication in wireless sensor networks. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications; IEEE: Manhattan, NY, USA, 2013; pp. 188–195. [Google Scholar]
- Berjón, R.; Mateos, M.; Beato, M.E.; Fermoso García, A. An Event Mesh for Event Driven IoT Applications. Int. J. Interact. Multimed. Artif. Intell. 2022, 7, 54–59. [Google Scholar] [CrossRef]
- Zhu, X.; Deng, H. A Security Situation Awareness Approach for IoT Software Chain Based on Markov Game Model. Int. J. Interact. Multimed. Artif. Intell. 2022, 7, 59–65. [Google Scholar] [CrossRef]
- Kaur, N.; Mittal, A. Fog computing serverless architecture for real time unpredictable traffic. In IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2021; Volume 1022, p. 012026. [Google Scholar]
- Kashyap, V.; Kumar, A. Load balancing techniques for fog computing environment: Comparison, taxonomy, open issues, and challenges. Concurr. Comput. Pract. Exp. 2022, 34, e7183. [Google Scholar] [CrossRef]
- Lin, X.; Lu, R.; Shen, X. Mdpa: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wirel. Commun. Mob. Comput. 2010, 10, 843–856. [Google Scholar] [CrossRef]
- Lalos, A.S.; Antonopoulos, A.; Kartsakli, E.; Di Renzo, M.; Tennina, S.; Alonso, L.; Verikoukis, C. Rlnc-aided cooperative compressed sensing for energy efficient vital signal telemonitoring. IEEE Trans. Wirel. Commun. 2015, 14, 3685–3699. [Google Scholar] [CrossRef] [Green Version]
- Mahmud, R.; Ramamohanarao, K.; Buyya, R. Application management in fog computing environments: A taxonomy, review and future directions. ACM Comput. Surv. (CSUR) 2020, 53, 1–43. [Google Scholar] [CrossRef]
- Gelogo, Y.E.; Kim, C.H. A design of secure e-health data management system. J. Secur. Eng. 2015, 12, 181–190. [Google Scholar] [CrossRef]
- Mantri, D.; Prasad, N.R.; Prasad, R. Grouping of clusters for efficient data aggregation (GCEDA) in wireless sensor network. In Proceedings of the 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 22–23 February 2013; pp. 132–137. [Google Scholar]
Features | Ref. [7] | Ref. [8] | Ref. [9] |
---|---|---|---|
Key Length | It should be same as that of message | No need for key | No mention of key length |
Communication cost | An additional round of communication among (fog nodes, smart meters, etc.) leads to increase in communication cost | High | Reduces cost to some extent |
Latency | High | High | No mention of latency |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shruti; Rani, S.; Singh, A.; Alkanhel, R.; Hassan, D.S.M. SDAFA: Secure Data Aggregation in Fog-Assisted Smart Grid Environment. Sustainability 2023, 15, 5071. https://doi.org/10.3390/su15065071
Shruti, Rani S, Singh A, Alkanhel R, Hassan DSM. SDAFA: Secure Data Aggregation in Fog-Assisted Smart Grid Environment. Sustainability. 2023; 15(6):5071. https://doi.org/10.3390/su15065071
Chicago/Turabian StyleShruti, Shalli Rani, Aman Singh, Reem Alkanhel, and Dina S. M. Hassan. 2023. "SDAFA: Secure Data Aggregation in Fog-Assisted Smart Grid Environment" Sustainability 15, no. 6: 5071. https://doi.org/10.3390/su15065071
APA StyleShruti, Rani, S., Singh, A., Alkanhel, R., & Hassan, D. S. M. (2023). SDAFA: Secure Data Aggregation in Fog-Assisted Smart Grid Environment. Sustainability, 15(6), 5071. https://doi.org/10.3390/su15065071