Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures
- 1 October 2010
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 7, 232-237
- https://doi.org/10.1109/smartgrid.2010.5622047
Abstract
Smart grid privacy encompasses the privacy of information extracted by analysing smart metering data. In this paper, we suggest that home electrical power routing can be used to moderate the home's load signature in order to hide appliance usage information. In particular, (1) we introduce a power management model using a rechargeable battery, (2) we propose a power mixing algorithm, and (3) we evaluate its protection level by proposing three different privacy metrics: an information theoretic (relative entropy), a clustering classification, and a correlation/regression one; these are tested on different metering datasets. This paper sets the ground for further research on the subject of optimising home energy management with regards to hiding load signatures.Keywords
This publication has 12 references indexed in Scilit:
- The new frontier of communications researchPublished by Association for Computing Machinery (ACM) ,2010
- Is digital inclusion a good thing? How can we make sure it is?IEEE Communications Magazine, 2010
- Grid of the futureIEEE Power and Energy Magazine, 2009
- Privacy and the New Energy InfrastructureSSRN Electronic Journal, 2009
- Anonymity protocols as noisy channelsInformation and Computation, 2008
- A Novel Method to Construct Taxonomy Electrical Appliances Based on Load SignaturesofIEEE Transactions on Consumer Electronics, 2007
- Power signature analysisIEEE Power and Energy Magazine, 2003
- A neuron nets based procedure for identifying domestic appliances pattern-of-use from energy recordings at meter panelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Nonintrusive appliance load monitoringProceedings of the IEEE, 1992
- The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1988