Secure Data Provenance in Home Energy Monitoring Networks
Ming Hong Chia, Sye Loong Keoh, Zhaohui Tang
1
Secure Data Provenance in Home Energy Monitoring Networks Ming Hong - - PowerPoint PPT Presentation
Secure Data Provenance in Home Energy Monitoring Networks Ming Hong Chia, Sye Loong Keoh, Zhaohui Tang 1 Outline Data Provenance and Smart Metering Security Threats and Requirements Proposed Architecture Threshold Cryptography
1
2
3
4
Data Collector Measurement Device Data Source
Data Collector Measurement Devices Data Source
5
NAN Data Concentrator Smart Home Appliances Smart Meter Neighbourhood Area Network (NAN) Home Area Network (HAN) ZigBee, WiFI, Ethernet WiFi, Cellular
WAN
Wide Area Network (WAN) Fibre Optic, Cellular Utility
Public Realm Private Realm Advanced Metering Infrastructure (AMI)
Utility End Collection Monitoring
6
Smart Home Appliances Smart Meter Home Area Network (HAN) ZigBee, WiFI, Ethernet
HAN
Utility
Energy Consumption Reporting
The real data source The real data source Potential compromise?
7
8
Smart Energy Plug Smart Meter Energy Magnetic Sensor Raspberry Pi 3 Bluetooth
Secure Smart Plug
Data Source
9
Smart Energy Plug Energy Magnetic Sensor Raspberry Pi 3 Bluetooth
Secure Smart Plug
scheme (k,n).
magnetic sensor and the energy plug must match.
from all data sources must also match the smart meter’s measured data.
technique.
10
11
Smart Meter
Smart Energy Plug Energy Magnetic Sensor Raspberry Pi 3 Bluetooth Secure Smart Plug
Public Key: n Share: s3 Public Key: n Share: s4 Public Key: n Shares: s , s
1 2
(PK and SK)
Data Source
12 Secure Smart Plug Estimote Beacon (Candy) Estimote Beacon (Yellow) Estimote Beacon (Beetroot) (Intersection)
13
Smart Energy Plug Energy Magnetic Sensor Raspberry Pi 3 Bluetooth
(1) Sends m to BT, where m = m1
SP i
(2) Check current location(XY)
(3) if true, generate own partial signature share by signing m SIGN { s , n , m , N }
i
(4) Sends ps to SP
Smart Meter
(6) Send all respective partial signature shares to SM
ps
= { s , n, m1 , N }
1
1
SP
ps
= { s , n, m1 , N }
2
2
SP
(1) Sends m to BT, where m = m2
MS
(4) Sends ps to MS
i
(5) Generate own partial signature share by signing m SIGN { s , n , m , N } (6) Send all respective partial signature shares to SM
ps
= { s , n, m2 , N }
4 MS 4
ps
= { s , n, m1 , N }
3 SP 3
PS1 =
SP
ps
= { s , n, m1 , N }
ps
= { s , n, m1 , N }
ps
= { s , n, m1 , N }
SP 1 1 SP 2 2 SP 3 3
PS2 =
MS
ps
= { s , n, m2 , N }
ps
= { s , n, m2 , N }
ps
= { s , n, m2 , N }
MS 1 1 MS 2 2 MS 4 4
(1) Sends m to SM, where m = m1 (5) Generate own partial signature share by signing m SIGN { s , n , m , N }
Secure Smart Plug
(1) Sends m to SM, where m = m2
SP MS i i
ps
= { s , n, m2 , N }
1
1
MS
ps
= { s , n, m2 , N }
2
2
MS
(7) Upon receiving the PS , combine and aggregate them to compute as FS for verification later. COMBINE { PS, PK , m, n, k, N } (8) Verifies m with SKd (9) VERISM FS ≡ m using PK
SK
(10) VERISM (m1 ≡ m 2) using PKe
e
SP MS
e d
i
Data Source
14
Estimote Beacon (Yellow) Estimote Beacon (Beetroot) Estimote Beacon (Candy)
WiFi Wireless Router Smart Meter
Local Area Network (LAN)
Secure Smart Plug (Raspberry Pi 3)
15
16
17
Estimote Beacon (Yellow) Estimote Beacon (Beetroot) Estimote Beacon (Candy) Original Deployed Location Coordinates (x:6.5, y: 10.0) Relocated Secure Smart Plug Location Coordinates (x:2.5, y: 2.5) Secured Smart Plug
18
19
20
Entity Components in SSP Key Size (bits) 512 1024 2048 Average (ms) 148.33 863.67 6419
Time taken to generate a partial signature
Entity Smart Meter Key Size (bits) 512 1024 2048 Combine Signature (ms) 5 8.33 18.33 Signature Verification (ms) 132 157 875
Time taken to combine partial signatures and verify signature
21
22