
Research Article
Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications
@INPROCEEDINGS{10.1007/978-3-031-20398-5_7, author={Thokozani Felix Vallent and Damien Hanyurwimfura and Jayavel Kayalvizhi and Hyunsung Kim and Chomora Mikeka}, title={Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications}, proceedings={Smart Grid and Internet of Things. 5th EAI International Conference, SGIoT 2021, Virtual Event, December 18-19, 2021, Proceedings}, proceedings_a={SGIOT}, year={2022}, month={11}, keywords={Smart grid Data aggregation Bi-directional communication Elliptic curve cryptography Internet of things Privacy-preserving}, doi={10.1007/978-3-031-20398-5_7} }
- Thokozani Felix Vallent
Damien Hanyurwimfura
Jayavel Kayalvizhi
Hyunsung Kim
Chomora Mikeka
Year: 2022
Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications
SGIOT
Springer
DOI: 10.1007/978-3-031-20398-5_7
Abstract
Smart grid (SG) is a modern electricity grid based on bi-directional flow of electricity and information for efficient energy management. Due to dependence on information communication, the system is prone to potential cyber-security attacks such as, user identity theft and data privacy breach. Addressing these cyber-security issues with optimal efficiency in smart grid is an open research problem. From this perspective this paper proposes a lightweight scheme for robust information security and privacy-preservation in data aggregation in SG. The proposed scheme utilizes elliptic curve variant of El Gamal encryption cryptosystem and signcryption techniques to achieve user anonymity with greater efficiency. The scheme satisfies the standard security requirements proven in the random oracle model and does not need a trusted third-party or certificate issuance during scheme run. Performance evaluation analysis shows that the proposed scheme has a better overall performance to most relevant comparable schemes, since it does not use heavy computation operations such as bilinear pairings, map-to-point hash operations, exponentiation among others. Furthermore, the proposed scheme does not depend on trusted authority (TA) neither suffers from coalition attack nor insider attacks.