Secure Data Provenance in Home Energy Monitoring Networks

Chia, M. H., Keoh, S. L. and Tang, Z. (2017) Secure Data Provenance in Home Energy Monitoring Networks. In: The 3rd Industrial Control System Security Workshop (ICSS), Orlando, FL, USA, 05 Dec 2017, pp. 7-14. ISBN 9781450363334 (doi: 10.1145/3174776.3174778)

153482.pdf - Accepted Version



Smart grid empowers home owners to efficiently manage their smart home appliances within a Home Area Network (HAN), by real time monitoring and fine-grained control. However, it offers the possibility for a malicious user to intrude into the HAN and deceive the smart metering system with fraudulent energy usage report. While most of the existing works have focused on how to prevent data tampering in HAN's communication channel, this paper looks into a relatively less studied security aspect namely data provenance. We propose a novel solution based on Shamir's secret sharing and threshold cryptography to guarantee that the reported energy usage is collected from the specific appliance as claimed at a particular location, and that it reflects the real consumption of the energy. A byproduct of the proposed security solution is a guarantee of data integrity. A prototype implementation is presented to demonstrate the feasibility and practicality of the proposed solution.

Item Type:Conference Proceedings
Glasgow Author(s) Enlighten ID:Tang, Dr Zhaohui and Keoh, Dr Sye Loong
Authors: Chia, M. H., Keoh, S. L., and Tang, Z.
College/School:College of Science and Engineering > School of Computing Science
College of Science and Engineering > School of Engineering
Copyright Holders:Copyright © 2017 Association for Computing Machinery
First Published:First published in Proceedings of the 3rd Annual Industrial Control System Security Workshop (ICSS 2017): 7-14
Publisher Policy:Reproduced in accordance with the copyright policy of the publisher
Related URLs:

University Staff: Request a correction | Enlighten Editors: Update this record