2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) 2020
DOI: 10.1109/isgt-europe47291.2020.9248831
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Cost Management in Smart Meters Using Deep Reinforcement Learning

Abstract: Smart meters (SMs) play a pivotal rule in the smart grid by being able to report the electricity usage of consumers to the utility provider (UP) almost in real-time. However, this could leak sensitive information about the consumers to the UP or a third-party. Recent works have leveraged the availability of energy storage devices, e.g., a rechargeable battery (RB), in order to provide privacy to the consumers with minimal additional energy cost. In this paper, a privacy-cost management unit (PCMU) is proposed … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…Reinforcement Learning [69][70][71][72][73][74][75][76][77][78] MDP [70,79] Bargain Theory [41][42][43] Price Theory [35][36][37] Contract Theory [45][46][47] Auction Theory [29-31]…”
Section: Simulation Models 1 Incentive Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Reinforcement Learning [69][70][71][72][73][74][75][76][77][78] MDP [70,79] Bargain Theory [41][42][43] Price Theory [35][36][37] Contract Theory [45][46][47] Auction Theory [29-31]…”
Section: Simulation Models 1 Incentive Modelsmentioning
confidence: 99%
“…on the smart grid with three micro-grids each equipped with wind turbines show that this scheme increases the micro-grid utility compared to the existing schemes. Shateri et al [76] proposed a deep reinforcement learning algorithm named deep double Q-learning to manage the privacy cost in smart meters during energy trading in the smart grid. Wang et al [77] proposed an energy trading model based on the repeated game in which each micro-grid chooses its approach individually and randomly for trading and maximize its revenue.…”
Section: ) Reinforcement Learningmentioning
confidence: 99%
“…A substantial amount of studies on SMs privacy were conducted, which can be classified in two main families: (i) SMs data manipulation techniques [5]- [11]; and (ii) user's demand load shaping approaches [12]- [22]. On the one hand, in the first family of methods, the consumers' load data are manipulated by a noisy transformation before sharing it to the UP.…”
Section: B Related Workmentioning
confidence: 99%
“…In some recent studies, physical resources are used to minimize the average relative difference between the grid load and a constant (or piecewise constant to accommodate a timevarying energy price) target load [20]- [22], i.e., to flatten the electricity consumption reported by the SMs. In [22], following the formulation in [21], the SMs privacy problem is cast as a Markov decision process (MDP) and a modelfree deep reinforcement learning (RL) algorithm known as the deep double Q-learning (DDQL) method is used to tackle this MDP problem. Even though this framework has been shown to be useful in limiting the leakage of sensitive information, the effectiveness of the flatness-based privacy measure remains unclear.…”
Section: B Related Workmentioning
confidence: 99%
“…Many of the most recent studies of this family, incorporated information theoretic measures such as Mutual Information (MI) or Directed Information (DI) to model the amount of information leaked about the sensitive attributes and used Machine Learning (ML) algorithms for their implementation. On the other hand, the DLS approaches use physical resources such as rechargeable batteries, electric vehicles, and even renewable energy resources, to shape the users' power consumption to mask the sensitive patterns [14]- [25]. Recently, Reinforcement Learning (RL) and Deep Reinforcement Learning (DRL) methods have been used to tackle this problem, showing good performance against strong ML based attackers.…”
Section: Introductionmentioning
confidence: 99%