Smart Grid and Internet of Things. Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings

Research Article

Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid

Download
123 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-05928-6_8,
        author={Md Bhuiyan and Mdaliuz Zaman and Guojun Wang and Tian Wang and Md. Rahman and Hai Tao},
        title={Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid},
        proceedings={Smart Grid and Internet of Things. Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings},
        proceedings_a={SGIOT},
        year={2019},
        month={1},
        keywords={Internet of Things (IoT) Smart grid Demand response Security attack Privacy Compromised information injection},
        doi={10.1007/978-3-030-05928-6_8}
    }
    
  • Md Bhuiyan
    Mdaliuz Zaman
    Guojun Wang
    Tian Wang
    Md. Rahman
    Hai Tao
    Year: 2019
    Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid
    SGIOT
    Springer
    DOI: 10.1007/978-3-030-05928-6_8
Md Bhuiyan, Mdaliuz Zaman1, Guojun Wang2,*, Tian Wang3, Md. Rahman4, Hai Tao5
  • 1: Fordham University
  • 2: Guangzhou University
  • 3: Huaqiao University
  • 4: Universiti Malaysia Pahang
  • 5: Baoji University of Arts and Sciences
*Contact email: csgjwang@gmail.com

Abstract

The smart grid is regarded as one of the important application field of the Internet of Things (IoT) composed of embedded sensors, which sense and control the behavior of the energy world. IoT is attractive for features of grid catastrophe prevention and decrease of grid transmission line and reliable load fluctuation control. Automated Demand Response (ADR) in smart grids maintain demand-supply stability and in regulating customer side electric energy charges. An important goal of IoT-based demand-response using IoT is to enable a type of DR approach called automatic demand bidding (ADR-DB). However, compromised information board can be injected into during the DR process that influences the data privacy and security in the ADR-DB bidding process, while protecting privacy oriented consumer data is in the bidding process is must. In this work, we present a bidding approach that is secure and private for incentive-based ADR system. We use cryptography method instead of using any trusted third-party for the security and privacy. We show that proposed ADR bidding are computationally practical through simulations performed in three simulation environments.