Proceedings of the 27th Annual Computer Security Applications Conference 2011
DOI: 10.1145/2076732.2076764
|View full text |Cite
|
Sign up to set email alerts
|

Smart metering de-pseudonymization

Abstract: Consumption traces collected by Smart Meters are highly privacy sensitive data. For this reason, current best practice is to store and process such data in pseudonymized form, separating identity information from the consumption traces. However, even the consumption traces alone may provide many valuable clues to an attacker, if combined with limited external indicators. Based on this observation, we identify two attack vectors using anomaly detection and behavior pattern matching that allow effective depseudo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
40
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 73 publications
(41 citation statements)
references
References 16 publications
1
40
0
Order By: Relevance
“…Thus, for the consumer, it represents a privacy invasion [10,11]. Previous studies [8,9,13,15,16,17,19,22] have shown that and how information about a household and its inhabitants can be inferred from its high-resolution energy consumption data. Furthermore, any viable solution for forecasting consumption must also anticipate failing smart meters or communication links.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, for the consumer, it represents a privacy invasion [10,11]. Previous studies [8,9,13,15,16,17,19,22] have shown that and how information about a household and its inhabitants can be inferred from its high-resolution energy consumption data. Furthermore, any viable solution for forecasting consumption must also anticipate failing smart meters or communication links.…”
Section: Introductionmentioning
confidence: 99%
“…Jawurek et al [9] present the problem of breaking smart meter privacy by using de-pseudonymization. They propose a framework based on machine learning with support vector machines for the analysis of consumption traces and tracking consumption traces across different pseudonyms by using two linking procedures.…”
Section: Overview Of Smart Grid Privacy Mechanisms In the Literaturementioning
confidence: 99%
“…Out of the presented papers above, the ones that are most closely related to ours are [3,4,7,9]. Efthymiou and Kalogridis [7] set up the terminology on which we build our framework.…”
Section: Related Work Especially Relevant To This Papermentioning
confidence: 99%
See 1 more Smart Citation
“…This is done by homomorphic encryption, i.e., encrypting the readings in a way that the encrypted ciphertexts can be added up, and the sum of ciphertexts -and only the sum-can then be deciphered to show the sum of the plaintexts. This approach, where applicable, is superior to collecting data and then restricting access to it (which creates a security problem as well, and has failed numerous times in the past) or anonymizing the smart grid data, which has also been shown to be insufficient [2]. To go one step further and make this technology applicable for a real roll-out, it is vital to show these advantages, demonstrate how aggregation protocols can be used in a real setting, and validate applicability, performance, and robustness.…”
Section: Introductionmentioning
confidence: 99%