be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring. Therefore, to
prevent the disclosure of personal information through the analysis of energy consumption patterns, the metering data must
be securely handled. Peer-to-peer networking is a promising approach for interconnecting communication nodes among the
automatic metering infrastructure to efficiently perform data collection while ensuring privacy and confidentiality, but it is
also prone to various security attacks. This paper discusses the impact of the most relevant peer-to-peer attack scenarios on
the performance of a protocol for privacy preserving aggregation of metering data. The protocol relies on communication
gateways located in the customers’ households and interconnected by means of a variant of the Chord overlay. We also
propose some countermeasures to mitigate the effects of such attacks: we integrate a verifiable secret sharing scheme
based on Pedersen commitments in the aggregation protocol, which ensures data integrity, with compliance checks aimed
at identifying the injection of altered measurements. Moreover, we introduce Chord auxiliary routing tables to counteract
the routing pollution performed by dishonest nodes. The paper evaluates the computational complexity and effectiveness
of the proposed solutions through analytical and numerical results
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.