Secure data collection in constrained tree-based Smart Grid environments

Haiming Jin, Suleyman Uludag, King Shan Lui, Klara Nahrstedt

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

To facilitate more efficient control, massive amounts of sensors or measurement devices will be deployed in the Smart Grid. Data collection then becomes non-trivial. In this paper, we study the scenario where a data collector is responsible for collecting data from multiple measurement devices, but only some of them can communicate with the data collector directly. Others have to rely on other devices to relay the data. We first develop a communication protocol so that the data reported by each device is protected again honest-but-curious data collector and devices. To reduce the time to collect data from all devices within a certain security level, we formulate our approach as an integer linear programming problem. As the problem is NP-hard, obtaining the optimal solution in a large network is not very feasible. We thus develop an approximation algorithm to solve the problem. We test the performance of our algorithm using real topologies. The results show that our algorithm successfully identifies good solutions within reasonable amount of time.

Original languageEnglish (US)
Title of host publication2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages308-313
Number of pages6
ISBN (Electronic)9781479949342
DOIs
StatePublished - Jan 12 2015
Event2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014 - Venice, Italy
Duration: Nov 3 2014Nov 6 2014

Publication series

Name2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014

Other

Other2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014
Country/TerritoryItaly
CityVenice
Period11/3/1411/6/14

ASJC Scopus subject areas

  • Communication
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Secure data collection in constrained tree-based Smart Grid environments'. Together they form a unique fingerprint.

Cite this