Next Article in Journal
A Real-Time Wearable Assist System for Upper Extremity Throwing Action Based on Accelerometers
Next Article in Special Issue
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues
Previous Article in Journal
Wind Profiling in the Lower Atmosphere from Wind-Induced Perturbations to Multirotor UAS
Previous Article in Special Issue
A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data Security and Trading Framework for Smart Grids in Neighborhood Area Networks

by
Jayme Milanezi Junior
1,2,*,
João Paulo C. L. da Costa
1,3,
Caio C. R. Garcez
1,
Robson de Oliveira Albuquerque
1,
Arnaldo Arancibia
3,
Lothar Weichenberger
3,
Fábio Lucio Lopes de Mendonça
1,
Giovanni del Galdo
4,5 and
Rafael T. de Sousa Jr.
1
1
Department of Electrical Engineering, University of Brasília, Brasília 70910-900, Brazil
2
Brazilian Electricity Regulatory Agency, ANEEL, Brasília 70830-110, Brazil.
3
Elektronische Fahrwerksysteme GmbH, 85080 Ingolstadt, Germany
4
Institute for Information Technology, Ilmenau University of Technology, 98693 Ilmenau, Germany
5
Fraunhofer Institute for Integrated Circuits IIS, 98693 Ilmenau, Germany;
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(5), 1337; https://doi.org/10.3390/s20051337
Submission received: 8 December 2019 / Revised: 18 February 2020 / Accepted: 20 February 2020 / Published: 29 February 2020

Abstract

:
Due to the drastic increase of electricity prosumers, i.e., energy consumers that are also producers, smart grids have become a key solution for electricity infrastructure. In smart grids, one of the most crucial requirements is the privacy of the final users. The vast majority of the literature addresses the privacy issue by providing ways of hiding user’s electricity consumption. However, open issues in the literature related to the privacy of the electricity producers still remain. In this paper, we propose a framework that preserves the secrecy of prosumers’ identities and provides protection against the traffic analysis attack in a competitive market for energy trade in a Neighborhood Area Network (NAN). In addition, the amount of bidders and of successful bids are hidden from malicious attackers by our framework. Due to the need for small data throughput for the bidders, the communication links of our framework are based on a proprietary communication system. Still, in terms of data security, we adopt the Advanced Encryption Standard (AES) 128 bit with Exclusive-OR (XOR) keys due to their reduced computational complexity, allowing fast processing. Our framework outperforms the state-of-the-art solutions in terms of privacy protection and trading flexibility in a prosumer-to-prosumer design.

1. Introduction

The power grid is a crucial large-scale infrastructure. In order to allow high levels of automation, information security, distributed energy control, and robust load fluctuation management of the power grids, smart grids (SGs) are essential. Several interdisciplinary aspects are treated in SG such as interoperability, information security, scalability, reliability, energy efficiency, reusability, communication backbone, electrical actuators, and sensor and control technologies [1]. Although the SGs are constantly improved, they are still vulnerable to cyber attacks. Hence, current power grids should be further improved to fit the demands regarding data security [2] and energy trade between prosumers [3,4].
To the best of our knowledge, there are open issues in the literature with respect to data protection associated with trade prices between producers. For instance, the main efforts towards privacy consists of obfuscating the instantaneous consumption pattern of each consumer [5,6]. This is generally accomplished by hiding the instantaneous power consumption of the client as fine-grained data can reveal in detail the lifestyle of the consumer [7,8]. However, the profile of traded energy also delivers relevant information about prosumers to their neighbors. As in [9], the ability to link the bids to individual consumers allows the untrusted entity to build up a profile of the consumer’s behavior. In particular, the quantities of traded energy can be very informative about the economical welfare of the owner [10]. Privacy requirements dictate that prosumers cannot gain information regarding other prosumers’ consumption and production—not even if they are trade partners [11]. Models dealing with energy trade directly among prosumers [3,12] limit themselves to exploiting the trade environment without discussing in detail data-security aspects related to the identities of the traders in relation to their neighbors. As a consequence, several topics related to privacy requirements are still open in SGs, such as power production and bidding in trading systems.
In this paper, we consider the problem of providing data privacy for self-interested players that trade energy in the context of a Neighborhood Area Network (NAN). The energy is sold by local micro-generators and locally purchased by their neighbors, also known as the final users. Our framework deals simultaneously with SG data-security requirements and energy-trade systems. As a first contribution, the proposed framework has a privacy-preserving model which has a low computational complexity and avoids completely an unauthorized party to identify the bidders, the number or types of them, and even whether the bids achieve a deal. As a second contribution, all the bids are made clear to the NAN participants, with all Smart Meter (SM) owners having access to how many bids are proposed and their types, prices, and quantities. As a third contribution, we propose a clearing price mechanism that allows for each a Smart Meter (SM) to calculate the final prices and respective amounts of energy that are traded, including a financial reward to the power-grid company. Nevertheless, the proposed framework avoids totally any access to the bidders identities. Once each node learns the bids, it processes individually the information obtained in order to know the quantities and prices effectively traded. The communication links are provided by a patent-pending proprietary communication system [13].
The remainder of this paper is as follows. Section 2 surveys the state-of-the-art in terms of SG-security requirements and energy-trading schemes for electricity markets. We use the technical requirements observed in the literature to present a detailed problem description in Section 3. Section 4 details the proposed framework for energy trade in a NAN. Section 5 shows the results, and Section 6 concludes the paper.

2. SG-Trading Systems and Data Security—State-of-the-Art

In this section, we provide an overview of the literature with respect to trading systems and data security in SG. First, we present basic characteristics of trading systems for connected prosumers in Section 2.1 and auctions in Section 2.2. In Section 2.3 and Section 2.4, data security towards privacy and cryptographic systems applied to smart grids are revised, respectively. Additionally, in Section 2.5, blockchain-based transactive energy systems are reviewed.

2.1. Trading Systems for SG Prosumers

In a Neighborhood Area Network (NAN), each household unit is represented as a Home Area Network (HAN) and is equipped with an SM [14]. Some of the HANs are prosumers that, in some occasions, export energy to the grid from their Distributed Energy Resources (DER).
There are three different compensation mechanisms in [15] associated to topologies of DER installation and billing regimes. The first mechanism is the Net Energy Metering (NEM) that allows a DER that is generating a surplus of electricity to export the excess to the grid, earning a corresponding credit in kilowatt-hours (kWh). In order to correctly effectuate the measurements, in the NEM, the SM is bidirectional. The second scheme is the Buy All, Sell All, an arrangement that provides a standard sell rate to a DER system for all of the electricity they generate. In Buy All, Sell All schemes, the HAN cannot consume the energy that the DER produces, exporting it entirely. The third arrangement is Net Billing, in which the DER system owner can consume electricity generated by the DER in real time and can export any generation in excess of on-site consumption to the grid—all net energy exports are metered and credited at a predetermined sell rate without kWh banking. For a more detailed review of the features of the three compensation mechanisms, we refer to [15].
Since the prosumers in a NAN are able to trade their energy not only with their neighbors but also with the utility company, the aforementioned mechanisms must consider consumer-to-consumer trade designs. The NEM characteristic of not allowing financial reward for the exceeding energy makes it unable to use the proposed frameworks, which are applicable to the Buy All, Sell All and Net Billing systems.
From the standpoint of energy trade, there are two predominant perspectives about the nature of electricity as a commercial good. When energy is seen as a public service, the tendency is the proposal of a cooperative game among non-selfish players, as in [16,17,18], where the underlying goal is market control and the achievement of social fairness. Alternatively, when the main goals are market efficiency and decentralization [19,20,21], energy is seen as commodity to be traded and a free market model is sought. In this paper, we align our analysis to the latter group. Table 1 summarizes the division of approaches in the literature with regards to the commercial treatment of energy.
With regards to energy prices in the SG, the consumers can purchase energy either from the power grid or from other prosumers. In the first case, a key aspect is that the utility company, which is the company responsible for managing all power grid assets and its operation, usually sells the energy for a unitary price P u to its consumers and purchases the energy from the prosumers by a smaller price, P l  [15,16,43]. Therefore, an interval of energy unitary prices that enable trades between prosumers and consumers is given by P l < P b < P u , where P b is the price of local traders with which all final users obtain profit with regards to P u and P l , since every purchaser is supposed to prefer paying P b < P u for the kWh, with a symmetric interpretation by the side of the sellers.

2.2. Auctions in the Electricity Systems and the Preston McAfee

Auction mechanisms have been the cornerstone of many applications in wholesale and retail electric power markets [40]. They are recurrent in electricity market, either under competitive or cooperative frameworks [34,36,44], as a way of obtaining prices, especially in the case of competitive trade mechanisms.
An auction is a method of allocating goods with an explicit set of rules determining resource allocation and prices on the basis of bids from the market participants [45]. According to [46], auctions can be single dimensional, when the price is the only factor taken into account, or multidimensional, when other aspects are distinguished, such as product quality. In a one-sided auction, bidders are either purchasers or sellers and the auctioneer is responsible for deciding which is the winning bid, differing from two-sided auctions, in which both sellers and purchasers offer bids. In an open-cry auction, every bidder has access to every other bid, whereas in a sealed-bid auction, only the auctioneer has access to the offers of all bidders. Single-unit and multi-unit auctions refer to when there are one or several units of a given good; they differ from combinatorial auctions, where multiple, heterogeneous goods are auctioned simultaneously.
According to [47], an ideal double-auction mechanism would satisfy the following properties:
  • Individual Rationality (IR)—A trading user should have positive utility. The IR is a necessary property for a price mechanism.
  • Incentive Compatibility (IC)—Reporting the true value is a dominant strategy.
  • Balanced Budget (BB)—The auctioneer should not lose or gain from the trade. For real-world applications, if the auctioneer does not have to subsidize the trade (called weakly BB property), then it is acceptable.
  • Economic Efficiency (EE)—The social welfare should be maximized.
In [48], it has been shown that it is impossible for a mechanism to satisfy all of the four properties. Trade-reduction mechanisms and its variations such as the Preston McAfee’s Double Auction Protocol (PMD) [49] are IR, IC, and weakly BB [47]. The McAfee’s PMD is said to be weakly BB [47], i.e., a system in which the auctioneer does not lose but may gain money. A strongly BB system is observed when the auctioneer does not lose nor gain any money [50].
Auctions are frequently analyzed in terms of the social welfare that they provide. According to [10], social welfare is the sum of consumer surplus, given by the difference between willingness-to-pay and clearing price, and producer surplus, which is the difference between clearing price and costs. In [51], an agent competition double-auction mechanism is proposed to simplify decision making and to promote transactions for the customer-to-customer marketplaces. A quasi-linear utility function is assumed for each bidder. Such function is presented as the difference between the valuation of the item and the amount of money that each bidder actually receives or pays for. A comprehensive analysis of literature towards maximization of social welfare and minimization of aggregated power consumption for Demand Response (DR) programs is presented in [52]. Ref. [37] examined the effect of energy storage on the SG in terms of global social welfare, considering that agents have homogeneous efficiency and running costs. The work in [26,53] shows mechanisms for social welfare calculations in a DR environment.
A common aspect in [10,16,19,26,37,52,53,54] is that they do not take into account the welfare of the utility company itself. It is evident that a great part of the social welfare losses in current applications lie with the utility companies, as they are resistant against energy trade from local prosumers in decentralized generation structures. In this sense, an interesting double-auction model is given by [49], which proposes the Preston McAfee’s Double Auction Protocol (PMD). In this auction, the bids of the m purchasers b i , i { 1 , 2 , , m } , are sorted as in
b 1 b 2 b m ,
while the bids of the n sellers s i , i { 1 , 2 , , n } , are
s 1 s 2 s n .
In PMD, it is necessary to determine the number of bids k such that b k s k and b k + 1 < s k + 1 . As a function of the k purchasers’ and sellers’ offers, we calculate the price
p 0 = b k + 1 + s k + 1 2 .
When the kth offer satisfies s k p 0 b k , all the k purchasers and sellers trade with price p 0 . Otherwise, only the first ( k 1 ) purchasers and sellers trade and every purchaser pays b k while every seller receives s k when the auctioneer is rewarded with
U 0 = ( k 1 ) ( b k s k ) .
According to [55], when the first condition holds, the result is a Pareto efficient mechanism, whereas in the second hypothesis, it is not. Note that McAfee’s double auction does not take into account quantities, as they were idealized for oral double auctions in the stock market [49].
Purchasers and sellers have welfare that are expressed by the positive payoff that they achieve by trading a good with an advantage in terms of their valuations. The welfare of the purchasers is the difference between willingness to pay and the clearing price, while the welfare of the sellers is the difference between the clearing price and costs [10]. Considering f i as the welfare of the purchaser i and g j as that of the seller j, I and J are the groups of purchasers and sellers and  d i , j is the price of the transaction when purchaser i achieves a deal with seller j. The social welfare maximization problem is defined in [51] as follows:
V ( f , g , d ) = Maximize i f i x i + j g j y j i , j d i , j z i , j ,
subject to
j z i , j = x i , for each i I ,
i z i , j = y j , for each j J ,
x i { 0 , 1 } , for each i I ,
y j { 0 , 1 } , for each j J ,
z i , j { 0 , 1 } , for each i I , j J ,
where x i and y j denote if purchaser i or seller j, respectively, enters a transaction while z i , j denotes if purchaser i transacts with seller j. Hence, social welfare is defined as the sum of all auctioneers’ payoff and each individual agent’s utility.

2.3. Data Security and Privacy in the Smart Grid

According to [56], SG-security objectives are availability, integrity, confidentiality, authentication, authorization, and non-repudiation. Although availability is important to provide network access for end users, data integrity and confidentiality are more critical in the Advanced Metering Structure (AMI) network near the final consumers.
Inviolability of consumption data is at the center of discussions in the realm of SG data-secrecy protection. For instance, data from off-the-shelf SM are sufficient to identify TV movies viewed [57] due to unique fluctuations in the brightness of movies influencing the energy consumption of the TV set. In [8], a study about the impact of data granularity on edge-detection methods, which are the common first step in nonintrusive load-monitoring algorithms, shows that devices in which consumption is above 50 W can be detected. Moreover, data protection is specifically difficult due to the low capacity of the SM in terms of data aggregation and data handling [58].
Masking the identity of each user is the dominant strategy in order to provide user privacy, which is achieved by means of the assignment of false Internet Protocol (IP) data to each SM [11,59]. This technique is however sensitive to de-anonymization, which consists of the reidentification of nodes’ identities behind their false IP. According to the probabilistic frameworks of [60], reported consumed energy on a 10-kWh scale can reduce the percent of reidentified SMs to between 10% and 30%. One should note that it may not be applicable in regions where the law requires that energy reporting should be done with kWh accuracy. In [57], 68% of all consumption data can be reidentified as they have found unique combinations of feature values in the energy-consumption data of 122 households. Updating the pseudonym includes revocation of current pseudonyms and registration of new ones, such that, in order to avoid linkage of the two pseudonyms, after revocating the old one, the customer waits a certain period before registering the new pseudonym [59]. This time interval can be used by a malicious observer for leveraging their reidentification capability. Furthermore, even when SM identity is masked, the problem of mutual identification remains, since all devices must know with whom they are communicating [61]. Hence, a list of the IP numbers should be made available to each node, since a basic principle is that consumers have the right to know where their information is being shared [62].
The use of Internet Protocol (IP) and commercial off-the-shelf hardware and software is one of the most serious vulnerabilities of SG [63]. The Internet as part of the Wide Area Network (WAN) is considered undesirable [62]—such integration entails cyber threats since the SG is based on ethernet, Transmission Control Protocol (TCP)/IP, and other operating systems, thus making the grid more susceptible to attacks. Furthermore, the SG imposes much more strict security requirements than the Internet in order to fully achieve efficient and secure information delivery for critical power infrastructures [56]. Hence, in this paper, we assume that the Internet and off-the-shelf protocols such as TCP/IP are not to be integrated to the SG trading infrastructure.
In [64], the authors propose a secure and privacy-friendly local electricity trading and billing in smart grid that does not require an entity playing the role of a TTP. The following premises are adopted by [64], namely, time synchronization of all entities, secure and authentic communication channel and trading platform serving as a honest-but-curious entity. As shown in Section 5, the state of the art is divided into frameworks considering and not considering the TTP. In constrast to [64] and as shown in Section 2.5, the TTP is imposed by the trade framework based on the existence of the utility company as a neutral player.

2.4. Cryptographic Solutions for the SG

Cryptography is a central aspect in SG data security. Several devices that embed cryptographic applications execute their routines using symmetric or asymmetric keys. Each of these keys needs different resources, and in practice, both types of encryption are used [65]. In fact, the state-of-the-art presents a broad division in terms of symmetric and asymmetric keys for SG when the application is related to the SM itself. For instance, the homomorphic Paillier cryptosystem, which is based on the Discrete Logarithm Problem (DLP), is a type of asymmetric key and is proposed as the solution for SM in the solutions presented in [66], while other DLP-based algorithms are also proposed for a SM application in [59,67]. However, in [7], they are described as not desirable for SG, which typically has limited resources. The Paillier encryption is also mentioned as not computationally efficient due to its expensive operations [5,62].
Lightweight keys can serve to protect data as long as the key is inaccessible. In [68], a comparison of computational overheads among XOR, Shamir’s Secret Sharing, and homomorphic encryption is presented. If  C 1 is the cost associated to the XOR operation, C 2 is the cost associated with the Shamir’s Secret Sharing scheme, and C 3 is that with homomorphic encryption, then C 1 < C 2 C 3 . Due to its extremely low overhead, XOR keys are used in AES, Educational Data Encryption Standard (E-DES), and Blowfish Encryptions [69] and utilized also as encryption method as in [6].

2.5. Blockchain in the Smart Grid

Blockchains are designed to achieve peer-to-peer electronic payments directly, without participation of a trusted third party [1] and, as such, they presuppose the lack of a central authority or coordinator from having access to all registers and actions of a network. This assumption collides with the role of the power-utility companies, which are held accountable by the local regulators for the electricity assets in their area, i.e., they are responsible for billing costumers, surveying the use of power grid assets, and further. Moreover, as largely referred to in the state-of-the-art [21,26,33,67,70], a TTP can be adopted for the data-exchange system in the SG. The role of a TTP is frequently assigned to the utility company due to its natural position in the respective SG network. At least in such cases, the financial compensation between traders demands an entity managing the energy exchanges and the respective financial transfers. Hence, due to regulatory and executive aspects, we do not consider blockchains as a feasible solution for NAN centralized trade frameworks.
In [71], a new currency, the NRGcoin, is proposed, however without a detailed description of the compensation mechanism to be mentioned here, i.e., how the financial transfer occurs and who is in charge of surveying it. In [11], a novel blockchain-based transactive energy system is described for energy trade between final prosumers. However, the Distribution System Operator (DSO) is set to ensure the safe operation of the micro-grid and to regulate its total load. In order to achieve the, the DSO can limit the energy and financial assets that the prosumers withdraw for trading. The DSO can also set a price policy for the micro-grid, i.e., the DSO operates as a TTP. For all these limitations, we envisage great challenges to employing blockchains for the specific case of SG trading systems.

3. Requirements for the NAN Architecture and Security Framework

The SG characteristics and requirements defined in this section derive from Section 2 and can be referred to as the starting point for the framework to be proposed in Section 4.
As technical requirements for data security in the proposed framework, the number of interactions between a node/unit and the central controller, which is the Trusted Third Party (TTP), as well as between final nodes should be minimal. Each node must have a different AES 128 bit key, and the encrypted messages can be combined with XOR encryption, as its main features are low cost and simplicity. Time stamps must be used as an additional way of ensuring the correctness of the sender identity, constituting an extra argument for symmetric keys. The system must be de-anonymization proof. Neither any attacker nor harmless actors are allowed to know the identities of the bidders, the quantity of them, where there are bids and of which type, or if any deal is achieved. The system must resist traffic analysis attacks. The attacker is supposed to be malicious and powerful, counting on a virtually infinite computational capability.
Although an AES 128 bit encryption key is reputably secure, an active attacker can infer recurrent data and can identify patterns if ciphertexts are repeated. Note that the repetition of ciphertexts in the case of SG trades is likely to occur since prices and quantities of energy can lie around typical values, easing the task of a malicious attacker in identifying the occurrence of offers with similar characteristics. In order to prevent this drawback, we adopt a Linear-Feedback Shift Register (LFSR) [72], which provides a linear function of the previous state of a sequence of bits according to the value of the most left-sited one at each iteration. The initial value of the LFSR is called a seed and the bits that influence the next values of the LFSR are called taps. The period of a LFSR is the minimal number of different outputs before repeating its seed and is given by p = 2 n 1 , where n is the highest position of the tap that makes the feedback polynomial achieve the maximum possible period. Tables of the taps for maximum-length LFSR in function of each n up to 168 bits are given in [73].
In the considered NAN, the aggregator, or central operator, plays the role of a TTP. We use the communication system shown in [13], which provides a reliable wireless intra-battery management system and handles low values of signal-to-noise-plus-interference ratio (SNIR) by varying the length of direct sequences of bits. This is achieved by means of code division multiplexing of several decentralized controllers with a central controller. In doing so, the proposed patent provides a reliable and adaptive link for communication between the TTP, which is the central controller and the consumers in a NAN. The patent in [13] can incorporate different families of codes, including for instance Walsh, Gold, M-sequence, Kasami, and Chaos, as well as different modulation schemes, such as Phase Shift Keying (PSK), Quadrature PSK (QPSK), and Chirp Spread Spectrum (CSS). The system in [13] outperforms systems such as ZigBee, Bluetooth, and LoRa in terms of bit error rate (BER) and latency for critical safety applications.

4. Proposed Framework for the NAN Electricity Trading System

The proposed framework is divided into three parts, namely the privacy-oriented data-security system in Section 4.1, the trading system in Section 4.2, and the social welfare of the proposed system in Section 4.3. There are common aspects between the data-security system and the trading system. Therefore, in contrast to the literature, we present a framework taking into account both systems in addition to a clearing price mechanism that includes a financial reward to the power-grid company while keeping all identities secret.

4.1. Privacy-Oriented Data-Security System

Since the creation of an AES key between each user and the TTP is a requirement to the proposed framework, a previous step for securely assigning the generated keys is necessary. Therefore, we define the setup zero stage which establishes necessary procedures regarding the purchase, approval, installation, and authentication processes of an SM device to be integrated into the network. The setup zero stage starts by considering that each SM is found accessible for purchase by means of a supplier previously authorized by the power-utility company which is directly linked to TTP in such a way that, during the purchase process, the supplier provides to a platform linked to the TTP, the buyer’s data, as well as a PIN (Personal Identification Number) which allows the TPP to uniquely identify each SM when it performs its first connection to the network.
After being installed by a TTP-authorized personnel, each SM receives an AES hardcoded key to later perform an authentication process with the TTP regarding the device’s specific keys such as PIN and other data previously assigned by the vendor during the purchase procedure. Once this authentication process is concluded, the privacy-oriented system depicted in Figure 1 takes place.
At this point, it could be argued that employment of asymmetric keys [74] establishes secure communication between the TTP and final nodes. Note that our work intends to offer a low-power processing solution due to the SM-reduced hardware capacity. We intend to avoid key pairs generation. Therefore, we decided to address to the TTP the task of securely assigning to each device a hardcoded AES key. In this sense, the setup zero phase establishes a procedure to be followed by the power-utility company or the local regulator which plays the role of a TTP in our framework.
During a day, regular intervals in which a trading session can happen are called time slots. We adopt 15 min for each slot, as in [11]. The initial time slot is called slot zero, which corresponds to step 1 in Figure 1, when each SM receives from the TTP a ciphertext on AES 128 bit encompassing as contents the XOR keys K 1 and K 2 along with the LFSR seeds and taps and the “SM Schedule”. The latter is a list of the time slots in which the respective node must act as a data confirmation agent if a trading session takes place at that time slot. Since 95 slots are specified over a day, the tap of highest order in each LFSR used must be n 7 , in this case, p = 2 7 1 = 127 different keys. The keys K 1 and K 2 are bit matrices with dimensions K 1 and K 2 Z n × u , where n is the number of houses with an SM in the NAN and u is the length of each bid. Each row of K 1 and K 2 is a different LFSR with its own seed and taps. In this paper, we adopt u = 32 . Note that the rows K 1 and K 2 are updated by the SM itself between two subsequent time slots.
Before a time slot ends, any authenticated node that desires to trade energy forwards to the TTP a purchase or a sell bid, which in Figure 1 occurs in Ssep 2, i.e., the bid submission. The plaintext of the bid, which can only be accessed by the AES key owners, must encompass the bid itself and the IP of the bidder. Only one of the existing AES keys enables the TTP to decrypt this ciphertext successfully, as there is a different AES key per node. The TTP decrypts the ciphertext by using all the existing AES keys until one of them delivers a plaintext that encompasses one of the bidders IP. At this point, the TTP validates the bid if the AES key used to attain the plaintext corresponds to the IP of the respective AES key owner. Please note that, in the considered application, a NAN contains about 100 to 150 house units. We assume that such tests of up to 150 nodes are a reasonable task for the TTP machine. In scenarios where the demand for scalability is necessary, the appropriate procedure is to segment the NAN regions by installing TTP units until computational processing requirements are met. After validating the bid, the TTP uses the same AES key to broadcast a ciphertext of a content that comprises the IP of the bidder, which is the only node able to decrypt this message properly. The bidder thus obtains the confirmation of its order registration. The trading session is open when, at any instant between two time slots, at least one valid bid is decrypted by the TTP.
In every session, a subset v of the n households forward a bid for purchasing or selling energy such that v n . After receiving the v offers, the TTP assembles the bit matrix P Z n × u , which is the plaintext of all offers. Given that there are only v bids, the TTP creates ( n v ) false offers and includes all of them in P , observing that the v true bids are inserted in random rows. Thus, with the key K 1 , the TTP computes
M 1 = K 1 P ,
where ⊕ stands for the XOR operator. Hence, in step 3, the bid disclosure occurs when the TTP broadcasts the cipher matrix M 1 to all nodes after the end of the time slot in which the bids came up. When the nodes receive M 1 , they learn that a trading session has been created. The SM owners can easily compute P since they have K 1 . They can distinguish the true bids from the false ones as the latter presents inconsistencies in their bit structures, which infringe the rule of bids assemblage, as shown in detail in Section 4.2.
Several problems can affect a trading session based solely on Equation (6), since packet losses, collision, or unfavorable SNIR conditions might prevent some nodes from receiving the cipher matrix M 1 . Therefore, a confirmation step is needed, which is provided by step 4, with bids verification. Each node that receives M 1 computes a second cipher matrix,
M 2 = K 2 P ,
which is the matrix that is used as confirmation data. The matrix K 2 Z n × u differs from K 1 as the participants must prove to know the contents of P without retransmitting M 1 . Since the nodes are not reputed trustworthily, they have to prove that they know the plaintext P by producing a different ciphertext, i.e.,  M 2 . Note that the increase in memory due to this second matrix key is irrelevant as the product n u bits reaches approximately 3 kB for each 100 house units. Note also that an external observer cannot learn how many offers are posed by the bidders as the sizes of M 1 and M 2 are always n × u . Moreover, M 1 and M 2 are cipher matrices that do not deliver any useful information for an external observer that does not know K 1 and K 2 . Recall that, in step 1, along with the SM schedule, the TTP also informs in which second of the slot the node must confirm the data. Thus, step 4 consists of broadcasting M 2 to all nodes of the NAN during the second specified by the TTP, addressing the requirement of using time stamps to ensure the correctness of the sender identity.

4.2. Trading System Framework

The prices transmitted by each bidder are P r , i in
P l < P r , i < P u ,
where r indicates the round, with  r { 1 , 2 } as the proposed system having two rounds, i denotes the node that submits the offer, and  P r , i is the actual unitary price of the kWh offered by the ith node. Given that v out of the existing n SM owners forward offers, i { 1 , 2 , , v } . The prices P 1 , i and P 2 , i are expressed in tenths of cents in order to reduce the probability of two offers having exactly the same bit sequence. Two bit strings p 1 , i and p 2 , i express the values of P 1 , i and P 2 , i . Likewise, the quantity Q i of kWh in each offer is constrained to an interval Q l < Q i < Q u , and thus, Q i is also denoted with an auxiliary bit string q i . The bit strings p 1 , i , p 2 , i , and q i comprise 10 bits each. Instead of 1024 possible values, for simplicity, we reduce them to 999 values from 0000000001 up to 1111100111. Two bits complete the entire sequence, namely the type t 1 of the offer, with  t 1 = 0 for sell and t 1 = 1 for purchase offers, and the status of the order in terms of time, with  t 2 = 0 when the bid is valid only in the next trading session and t 2 = 1 to orders that stay valid throughout the day until a bid matches it. A length of 32 bits of the bid is complete with t 1 , t 2 , p 1 , i , p 2 , i , and q i gathered sequentially, as in Figure 2.
Purchasers must offer prices P 1 , i < P 2 , i , while sellers must set P 1 , i > P 2 , i . All prices of r = 1 interact, producing deals as long as purchasers’ prices are equal or over sellers’ prices. Consequently, offers of r = 2 are combined in order to achieve further deals.
When t 2 = 1 , price uncertainty is eliminated for the other participants. This may cause several bids in the next time slot to have the same price values. In the case of this event, the time of arrival establishes the priority of all incoming bids. Therefore, for two bids with exactly the same prices, the one that arrives first at the TTP has the preference of the match.
A price mechanism is needed in order to enable the nodes to calculate the energy quantities and prices effectively traded from the knowledge of bit matrix P , as this calculation is an internal process of each node. As a way of providing such a mechanism for each node, our proposal consists of an adaptation of the Trade Reduction Mechanism (TRM) presented in [49], where the difference between specific sell and purchase offers, namely b k and s k , yield a revenue to the auctioneer, which in our case means revenue for the utility company. Diversely, our proposal consists of producing revenues for the utility company at each deal, according to the prices and quantities negotiated. The numbers m and n denote the number of true purchasing and selling bids in P , of which the indexes are denoted by i { 1 , 2 , , m } and j { 1 , 2 , , n } , respectively. Purchasers must bid P 1 , i < P 2 , i , while sellers must follow P 1 , j > P 2 , j . The matches are developed first covering all possibilities with the first round prices and then with the second round ones. In the first round, only prices P 1 , i and P 1 , j , for  i { 1 , 2 , , m } and j { 1 , 2 , , n } , are taken into account, and after all possible first matches are computed, prices P 1 , i and P 1 , j are fully ignored and bid prices P 2 , i and P 2 , j are observed. Note that prices of both rounds do not communicate, and as such, the two rounds are completely independent. A second reason for this bid constitution is that, after computing bit matrix P , each node can differ the true offers from the false ones, as bit t 1 informs the relationship between both prices and computes all bids according to their prices and quantities without needing the support of the TTP to do so. Recall that P usually contains several false bids and each user that must identify them. For instance, if a given row of P presents t 1 = 0 and P 1 , i < P 2 , i , the node concludes that the corresponding row contains a false offer and thus ignores it.
The true offers of matrix P are reorganized in matrices B Z 4 × m and in matrices S Z 4 × n , in which the columns are
[ P 1 , i P 2 , i Q i k ] ,
i.e., the bids of the first and second rounds, the quantity offered,
k = i , for matrix B , and k = j , for matrix S .
Thus, k is the index of a purchasing or a selling bid according to the type of bid and the chronological criterion. In each round, the best purchasing and selling offers P r , i and P r , j are compared, and a deal is achieved as long as
P r , i P r , j ,
for i { 1 , 2 , , m } and j { 1 , 2 , , n } . In this case, the least quantity of kWh between the respective bids Q i , Q j is stored in q ; the deal is carried out and the new best offers P r , i and P r , j are computed in a sequential process until Equation (11) no longer holds. Note that the PMD of [49] ignores the quantities of the bid in its matches. In the proposed framework, the financial reward to the auctioneer is given by
U r = i , j q ( P r , i P r , j ) ,
where P r , i , P r , j are those of (11).
The system is described in Algorithm 1. The outcome of Algorithm 1 is credit assignments for each purchaser B i , i { 1 , 2 , , m } and seller S j , j { 1 , 2 , , n } as well as the aggregated revenue for the utility company given by Equation (12). We define a function f ( X , r ) that rearranges the columns of X so that the values of the rth row of X are sorted in accordance with Equations (1) and (2) given each case.
Algorithm 1 Adapted Trade Reduction Mechanism (TRM) algorithm
1:
procedure Adapted TRM  ( B , S )
2:
     [ B 1 B 2 B m ] = zeros ( 1 , m )
3:
     [ S 1 S 2 S n [ = zeros ( 1 , n )
4:
    for r = 1 : 2 do
5:
         B f ( B , r )
6:
         S f ( S , r )
7:
         i 1
8:
         j 1
9:
        while B ( r , i ) S ( r , j ) do
10:
            q min { B ( 3 , i ) , S ( 3 , j ) }
11:
            B i = B i + q B ( r , i )
12:
            S j = S j + q S ( r , j )
13:
            U r U r + q ( B ( r , i ) S ( r , j ) )
14:
            B ( 3 , i ) B ( 3 , i ) q
15:
            S ( 3 , j ) S ( 3 , j ) q
16:
           if B ( 3 , i ) = 0 then
17:
                B ( r , i ) P l
18:
                i i + 1
19:
           end if
20:
           if S ( r , j ) = 0 then
21:
                S ( r , j ) P u
22:
                j j + 1
23:
           end if
24:
        end while
25:
    end for
26:
return  B 1 , B 2 , , B m , S 1 , S 2 , , S n , U r
27:
end procedure
Note that each node assembles B and S according to Equations (9) and (10) and performs the computations in Algorithm 1. Recall that each node is concerned only with the knowledge of all prices and quantities and, in case the node is a bidder, whether its own bid achieves a deal.
Since sellers and purchasers trade kWh over different quantities under time constraints and without disclosing any identities before making the offers public, our proposal is of a multidimensional, two-sided, sealed-bid, single-unit auction system.

4.3. Social Welfare of the Proposed System

A drawback of Equation (5) is that it does not take into account the welfare corresponding to the auctioneer itself, since it considers only the utility of purchasers and sellers. According to [49], it is important that the money earned by the mechanism be counted as part of the social welfare. In SG systems, it means that the reward due to the mechanism should be taken into account for social welfare calculation.
The trades between final prosumers substitute partially the energy supplied by the big seller, i.e., the utility company. As observed in Equation (5), the welfares f i and g j of purchasers and sellers are related to the difference of the actual clearing prices and to the willingness to pay or costs. Recall that captive consumers in a NAN are obliged to cope with prices P l and P u as shown in Equation (8). As a consequence, while prices P l and P u may not indicate the subjective expectations of local prosumers, they nevertheless inform the real prices that prosumers are obliged to practice in the case of not achieving any deal. In this sense, P l and P u give the virtual willingness to pay or costs referred to in the analysis of Equation (5) due to regulatory reasons.
Two fashions of accounting for revenues in a competitive framework are depicted in Figure 3. In both ways, it is assumed that P b P s ; otherwise, not a deal is achieved in a competitive system. In Figure 3a, the average price P a = ( P b + P s ) / 2 is the clearing price in [35,36]. Taxes are applied over the purchaser surplus ( P b P a ) and the seller surplus ( P a P s ) . Such taxes may vary in terms of percentage, according to regulatory dispositions. We assign to the utility company the sum of both taxes as a way of rewarding it. Our proposal appears in Figure 3b, where we illustrate that, when there is a deal, the purchaser practices their own purchasing price P b , the seller practices their price P s , and the utility company receives the entire difference ( P b P s ) . As such, our framework emulates the systems in [35,36] with taxes of 100%, i.e., the bidders cannot expect to pay less or to receive more than their original bids. Note that, in all cases, the welfares f i and g j are complementary to the welfare of the utility U r in such a way that f i + g j + U r = P u P l .
Note that, since the McAfee’s double-auction protocol does not consider quantities in each trade, in real applications with different quantities of a good under trade, sequential trades can be seen as several instantaneous McAfee’s deals, in which the average price P a stands for the price in Equation (3) at every interaction.
By including the utility company’s welfare in Equation (5), we have
W ( f , g , d ) = Maximize i f i x i + j g j y j + U r ,
where U r is the revenue for the utility given by Equation (12). In practice, we rewrite Equations (5) as (13) by including the revenue of the utility company, as if the company was one seller or purchaser. Note that the component i , j d i , j z i , j in Equation (5) stands for costs of the participants that are not computed in the general social welfare, constituting a case of welfare loss. In our framework, however, i , j d i , j z i , j are the transaction costs which are fully included in U r . In doing so, we achieve a full BB system. For more detailed information about the convergence of the trading system framework, we refer the reader to Appendix A.

5. Results

In Section 5.1, we illustrate the performance of our framework in terms of security requirements, and in Section 5.2, we undertake a comparison with the state-of-the-art privacy and trading systems.

5.1. Security and Computational Cost Analysis

5.1.1. Privacy Threats Along Stages of the Proposed Framework

The threat model establishes that all nodes are malicious. In the setup zero stage defined in Section 4, attackers seek access to each SM unique parameter provided by the TTP-authorized vendor. Their aim is to impersonate an authenticated node inside the network in a attempt to learn the identities of the bidders. Moreover, malicious users may induce all other nodes in error by broadcasting modified data in an attempt to gain financial advantage. Additionally, they may access all links between the TTP and final nodes in order to disrupt the grid by harming broadcasted content.
In the D-Y adversary model, an attacker is assumed unable to break cryptographic primitives [9]. Thus, the slot zero and the bids submission stage are considered data leakage proof as the required time for breaking AES keys is in the order of 10 37 seconds [69]. Note that a node that forwards an offer in the bids submission stage includes its own IP in the plaintext, which is encrypted, and that the TTP confirms the arrival of any valid offer to its author. Furthermore, the exact instant of this message forward is uncertain over the entire duration of the time slot. A successful attack in this case demands continuous and explicitly intrusive actions. This collides with the notion in [75], according to which malicious data attacker are supposed to compromise as few data as possible in order to inject undetectable attacks with the lowest cost and effort. Hence, the probability of successful attacks in the slot zero and bids submission stage is assumed significantly unlikely.
In terms of data protection, it is useful to see that, for an external observer, the messages from the SMs and the TTP can be of any content as all nodes are supposed to exchange data with the TTP informing for instance the node availability, voltage measurements, etc. In Figure 4, the adversary is represented by the red vehicle. It receives also dummy packets that can be exchanged between TTP and the SMs in order to thwart traffic analysis attacks. As a consequence, it is not possible for the adversary (spy) to infer the purpose of such messages. For internal attackers, i.e., those who possess an SM and are authenticated, it is equally not possible to devise the contents of the messages exchanged by the TTP and the other nodes, given that all the AES keys are different. As a consequence, in the slot zero and in the bids submission stages, the external observer can infer no useful information. In the bids disclosure stage, the bit matrix M 1 is broadcast to all SMs of the NAN. The nodes are now more vulnerable to attacks on the data content since the adversary can see the TTP broadcasting data of n u bits, which is always the dimension of M 1 . The spy might decide to try to alter the ciphertext bits deliberately; however, in order to compromise the entirety of broadcast data, the attacker must access all links between the TTP and final nodes, a very problematic task if the network is sufficiently spread spatially. In the bids verification stage, the matrix M 2 has, in comparison to the bit matrix M 1 , two additional protections: specified nodes are programmed to broadcast it and in specific time windows—in Figure 4, house units 6 and 4 are the scheduled nodes and have the time windows t 1 and t 2 , respectively—as a case of time-stamp application. Only when the attacker knows in advance which nodes are scheduled to broadcast M 2 in the respective time slot can it harm the broadcasts content. However, it is taken as impossible due to the lack of access to the AES keys between the TTP and the other nodes, which derives from the D-Y adversary model. Note that, due to the sequence of stages, the spy can neither infer how many orders are posed nor of which type they are.
Suppose that the attacker is an internal node and that it is scheduled to broadcast M 2 . It can broadcast a different matrix, say M 2 , to try to induce errors in all other nodes. However, such an attack cannot avoid the nodes receiving the correct M 2 from other scheduled nodes. Moreover, the TTP undertakes strict surveillance over the broadcasted M 2 contents. A node that broadcasts a false version M 2 is included in the Revocation List, even when it transmits the correct share E j . The protocol admits that a scheduled node does not broadcast M 2 , since it might not have received M 1 due to package losses. In comparison to an external observer, which is not authenticated, an internal node can learn the number and the types of bids; however they are not able to link them with the respective authors.

5.1.2. Security and Privacy Features

We classify our framework under the requirements of anonymity, untraceability, no impersonation, unforgeability, non-repudiation, verifiability, non-linkability, linkability within a single bidding round, privacy, forward security, authenticity, and integrity as presented in [76].
Anonymity is achieved when no unauthorized entity is able to identify the bidder during the bidding. Our system accomplishes this goal via AES keys between each bidder and the TTP. Dummy packets and the constant size of matrices M 1 and M 2 avoid identification by means of traffic analysis. Untraceability is attained when the bid winner cannot be identified at the end of the bidding by untrusted entities. However, the winning bidder’s legitimacy should be verifiable. Furthermore, no individual should be traceable during a bidding round. Our framework meets this requirement as the matrices M 1 and M 2 deliver and confirm all informations about the bids; all nodes can know the winner bid. Note that the winner identity is never accessible for any node.
When no one participates in the bidding with the identity of another bidder, no impersonation is achieved. Since all nodes are only admitted when their ciphertexts include their IP into the AES encrypted message, the TTP cannot accept false participants. Unforgeability is fulfilled when no one is able to falsify a valid bidding price. In the proposed framework, it derives from the no impersonation requirement.
Non-repudiation is observed when the bidders cannot deny their bid after the winning bidder has been announced. After sending a bid and after the TTP accepts, the node cannot deny its offer, which makes part of matrices M 1 and M 2 , as the TTP is assumed inviolable. Verifiability is achieved when anyone can verify the validity of the bids. This relies on the fact that matrix M 2 reproduces the content of matrix P from what is informed by M 1 .
Non-linkability among various bidding rounds consists of no participant being able to access results that enable a bidder to be identified in various bidding rounds. Due to the invariable sizes of M 1 and M 2 , it is impossible even for authenticated nodes to know when a node submits bids. Linkability within a single bidding round is achieved when anyone can determine the number of times a bidder has bid, which in the case of the proposed framework is straightforward as it imposes that each node bids a maximum of only once per time slot. In terms of privacy, untrusted entities must not be able to link bids to individual consumers. Moreover, they must not be able to infer private information about individual consumers. It is applicable even for internal nodes.
Even if the current bidding key is compromised, no information about the previous keys should be leaked, which is the concept of Forward Security. The LFSR ensures that the XOR keys are not repeated from one time slot to another, making it infeasible to access the previously submitted bids. Authenticity and integrity of all bid notifications occurs when all bids are be verifiable. The TTP verifies it with regards to each ciphertext received.
The single registration requirement consists of a bidder being required to register in the system only once, and then, they can participate in all future bid sessions. In our framework, this is provided with the secrecy of the XOR keys with their seeds and taps. Using matrices K 1 and K 2 , every node can forward intelligible bids, when it is automatically admitted as a participant. Easy revocation is defined as the ease for the registration manager to revoke a bidder. In case of errors, the TTP in our system easily revocates a scheduled node that broadcasts false contents or a bidder that tries to submit an impossible bid—for instance, a purchasing bid in a household that has not generate assets. Incentive allocation consists of the bid winner being able to claim the incentive without revealing their identity, and no other entity should be able to impersonate the winner. The winner can claim the incentive by messages between it and the TTP. Furthermore, in case of the same bid prices, the TTP chooses the winning bid with a temporal criterion, i.e., that is forwarded first and can inform this fact to a bidder that claims a deal.

5.2. Comparison with the State-of-the-Art Privacy and Trading Systems

Comparing the proposed framework with the state-of-the-art ones, Table 2 shows the results in terms of privacy in the SG, with 1 for existing and 0 for nonexisting features. As a privacy enhancement methods [1,67,76] use DLP-based encryption systems, which have a comparatively high computational complexity. In [77], nodes embedded with distributed controllers coordinate with neighboring peers in order to find the optimal operating data, such as instantaneous consumption power. In doing so, they transmit plaintext information, and therefore, none of the common cryptographic techniques is applied. In [11], employing a large number of anonymous addresses is part of the solution for privacy attainment, contrary to our framework and to the discussion of Section 2.3. The address of each SM is disclosed in [76] and in the proposed framework only to a central controller, while in [77], it is disclosed only to one-hop nodes. Interested parties can possibly be identified as such by a malicious observer in all compared systems by means of traffic analysis or address de-anonymization, i.e., an observer can identify the role of a participant by such attacks, while in our system, it is completely avoided. The proposed framework is de-anonymization proof since, even when the IP of a node is identified, an observer cannot conclude if the node is a bidder. For instance, note that the SM schedule establishes that nodes that do not take part in the bids forward the matrix M 2 .
In Table 3, the proposed framework and the state-of-the-art schemes are compared in terms of pricing systems. Our framework allows for free-price formation and a variety of different auction systems, as for instance the suggested one [49]. The proposed framework also dismisses previous information about energy consumption profile. Such data are a requisite for the systems in [41], which characterizes the operation for the benchmark scenario of a DR market where the operator has full information of all DR-related parameters, such as the utility function of the consumers, which is representative of their consumption profile and decision-making process. The proposed framework also allows the inclusion of storage elements, which are excluded from the systems such as in [20], which develops an energy-trading system of a community energy storage (CES) device for demand-side load management within a neighborhood area network. The energy users that have their own photovoltaic power generation are allowed to trade energy from their personal surplus with the grid and the CES device in a competitive game framework. Pricing freedom is fully guaranteed in [3,34]. In [53], a power market scheduling center (PMSC) is proposed, which manages all the energy providers and makes them provide a unified price to the subscribers, and energy providers generate the optimal quantity of electricity to get maximum utilities. In [41], aggregators provide DR services to the operator and guarantee a reduced electricity bill to the end users, negotiating with both sides in order to maximize its own profit. In [24], a regulatory authority calculates the instantaneous prices that minimize the total social cost based on the knowledge of the utility functions of the associated consumers, establishing a unique value to them. In these examples, the final consumers are limited to playing the role of price takers.

6. Conclusions

As an emerging cyber-physical system, the SG is attractive for enabling distributed energy control, allowing for high levels of automation and security of the power system. Power is already produced inside the boundaries of final user real states and is exported to the company or to other consumers. As a consequence, the old grid structures must be reformulated. With regards specifically to the prices in the new electrical systems, a key aspect is that the utility company usually sells the energy for a unitary price P u to their consumers and buys back the energy of prosumers for a different unitary price, P l , yielding the range for dealing prices between final users.
In the proposed framework, we provide an effective approach for privacy protection for prosumers in a NAN that takes into account the problem of self-interested players that intend to trade energy in the context of a NAN. We additionally present a clear pricing mechanism that allows for each smart meter to calculate the final prices and respective amounts of energy that are traded, including a financial reward to the power-grid company, while keeping all identities secret. The communication links are provided by a patent-pending proprietary communication system. Our results show higher consistency when compared to the state-of-the-art models, especially in what concerns privacy protection against IP de-anonymization and traffic analysis attack. In order to achieve these objectives, we use AES 128 bit associated with LFSR-based XOR matrices, which have constant sizes, independent of the number of bidders. In doing so, our cryptographic framework has a considerable low computational cost.
Concerning future works, a first step is to monitor the trends of the SM industry in order to determine whether off-the-shelf SM can utilize asymmetric keys and can resist active attacks of all types. Tests with real SMs in a NAN are also required in order to measure typical values of package losses and Signal no Noise Ratio (SNR) as a function of the NAN infrastructure and topology. Finally, the proposed energy-trade model must undergo regulatory discussions before it can be implemented in realistic scenarios.

Author Contributions

Conceptualization, J.M.J., J.P.C.L.d.C. and R.T.d.S.J.; methodology, J.P.C.L.d.C., R.d.O.A., A.A. and L.W.; validation, C.C.R.G., R.d.O.A., A.A., L.W. and F.L.L.d.M.; formal analysis, J.M.J.; investigation, J.M.J. and J.P.C.L.d.C.; resources, F.L.L.d.M. and R.T.d.S.J.; writing—original draft J.M.J.; writing—editing, C.C.R.G. and G.d.G.; supervision, R.T.d.S.J.; project administration, J.P.C.L.d.C.; funding acquisition, F.L.L.d.M. and R.T.d.S.J.; All authors have read and agreed to the published version of the manuscript.

Funding

The publication fee for this article was paid with funds from a cooperation project between the University of Brasilia and the General Attorney of the Union (TED AGU 697.935/2019).

Acknowledgments

The authors would like to thank the support of the Brazilian research, development and innovation agencies CAPES (grants 23038.007604/2014-69 FORTE and 88887.144009/2017-00 PROBRAL), CNPq (grants 312180/2019-5 PQ-2, BRICS2017-591 LargEWiN, and 465741/2014-2 INCT in Cybersecurity) and FAP-DF (grants 0193.001366/2016 UIoT and 0193.001365/2016 SSDDC), as well as the cooperation projects with the Ministry of the Economy (grants DIPLA 005/2016 and ENAP 083/2016), the Institutional Security Office of the Presidency of the Republic (grant ABIN 002/2017), the Administrative Council for Economic Defense (grant CADE 08700.000047/2019-14) and the General Attorney of the Union (grant AGU 697.935/2019).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this paper:
NANNeighborhood Area Network
AESAdvanced Encryption Standard
XORExclusive-OR
SGsSmart Grids
SMSmart Meters
HANHome Area Network
DERDistributed Energy Resources
NEMNet Energy Metering
KWhkilowatt-hours
AMSAdvanced Metering Structure
IPInternet Protocol
WANWide Area Network
DLPDiscrete Logarithm Problem
DSODistribution System Operator
TTPTrusted Third Party
LFSRLinear-Feedback Shift Register
SNIRSignal-to-Noise-plus-Interference Ratio
PSKPhase Shift Keying
QPSKQuadrature Phase Shift Keying
CSSChirp Spread Spectrum
BERBit Error Rate
TRMTrade Reduction Mechanism
PMSCPower Market Scheduling Center

Appendix A

This appendix presents an example conceived to clarify the convergence of the trading system framework discussed in Section 4.1. Example 1. Let a NAN be 150 house units numbered from 1 to 150, from which 110 are equipped with an SM. Among all 110 authorized nodes, 4 purchasers and 4 sellers forward their bids in a given time slot of the day, such that n = 110 and v = 8 . After recognizing the origin and validity of each bid in accordance to their AES key as explained in Section 4.1, the TTP knows all offers and sets up the content in Table A1. In this example, H informs the number of each participating house unit, the pair t 1 t 2 are directly given by bits, while the prices P 1 , i and P 2 , i and the amount of energy Q i are informed by their values after conversion. Furthermore, let P l = 1500 and P u = 2000 , so that the range of P r , i as given by Equation (8) is between $1.50/kWh and $2.00/kWh.
Table A1. Bids as received by the TTP in a given time slot—Example 1.
Table A1. Bids as received by the TTP in a given time slot—Example 1.
PurchasersSellers
H t 1 t 2 P 1 , i P 2 , i Q i H t 1 t 2 P 1 , i P 2 , i Q i
80111555155680310018001790140
31018201830901420019001870200
115101501187710099001910192065
7710184518463010001960158070
From all the bids of Table A1, note that the bid of house unit 99 is inconsistent, as sellers must set P 1 , i > P 2 , i . As a consequence, the TTP does not take this offer into account when assembling the matrix P that is sent to all nodes by means of M 1 . Furthermore, the node 99 is included by the TTP in the Revocation List, staying unable to take part in future bids until the problem with the node is clarified and fixed. Note also that, while assembling the matrix P , the TTP removes the information about columns H shown in Table A1. Hence, all nodes receive only the data related to the bids and not to their authors, which are learned only by the TTP.
By applying Algorithm 1, two rounds are performed: first with r = 1 and only then with r = 2 . In summary, at each step, the lowest seller and higher purchaser prices are combined until the lowest energy quantity between them is achieved. Starting with r = 1 , only the prices P 1 , i are considered. Observing Table A1, the best offers from each side purchase 30 kWh at $1.845/kWh and sell 140 kWh at $1.80/kWh from house units 77 and 31, respectively. The lowest energy amount, i.e., 30 kWh, is the quantity that is effectively traded between them. The prices of each side are practiced, so that the utility company receives the difference. Hence, at this first step, house unit 77 spends $1.845/kWh for buying 30 kWh from house unit 31, which receives $1.80/kWh for the 30 kWh, while the utility company is rewarded with 30 × $0.045 = $1.35.
As house unit 31 has still 110 kWh available after supplying house 77, the next best purchaser is considered—if its offer is compatible with the seller value, a new deal is achieved. Still with r = 1 , house unit 3 intends to purchase 90 kWh at $1.82/kWh. Since it offers a higher price than the seller, house 3 obtains 90 kWh from house 31, paying 90 × $1.82 = $163.8, while house 31 receives 90 × $1.80 = $162. The difference of $1.8 is appropriated by the utility company.
At this point, house unit 31 still has 20 kWh to trade. However, the best remaining purchase offer is lower than the selling price. Now, all deals with r = 1 are finished and the second round, r = 2 , is started.
The best prices P 2 , i from the purchase side is $1.877/kWh for 100 kWh from house unit 115. It covers the sellers’ offer of 70 kWh from house 10, the remaining 20 kWh from house 31, and part of the offer from house 142. After these deals, house 142 has still 190 kWh to sell at $1.87/kWh. However, the best remaining P 2 , i from the purchase side is now $1.846/kWh. At this point, all the deals are finished for this slot.
Note that, in this example, the offer from house unit 80 is not considered in any deal. However, it is the only bid with t 2 = 1 , making it valid throughout the day until a match is obtained. Since all the bidders learn that a purchase offer of $1.555/kWh is valid for the next slot, the bids at this price that arrives at the TTP are considered to have the preference in accordance to the instant of the bid arrival.
All the routines of this example are performed internally by each node from the knowledge of matrix P . Therefore, by the end of the Algorithm 1 application, all nodes learn which quantities were traded at each prices; however, not knowing the identities of the bidders.

References

  1. Liang, G.; Weller, S.R.; Luo, F.; Zhao, J.; Dong, Z.Y. Distributed Blockchain-Based Data Protection Framework for Modern Power Systems against Cyber Attacks. IEEE Trans. Smart Grid 2018. [Google Scholar] [CrossRef]
  2. Wu, J.; Ota, K.; Dong, M.; Li, J.; Wang, H. Big Data Analysis-Based Security Situational Awareness for Smart Grid. IEEE Trans. Big Data 2018, 4, 408–417. [Google Scholar] [CrossRef] [Green Version]
  3. Chen, T.; Su, W. Indirect Customer-to-Customer Energy Trading with Reinforcement Learning. IEEE Trans. Smart Grid 2018. [Google Scholar] [CrossRef]
  4. Chen, T.; Alsafasfeh, Q.; Pourbabak, H.; Su, W. The Next-Generation U.S. Retail Electricity Market with Customers and Prosumers—A Bibliographical Survey. Energies 2018, 11, 8. [Google Scholar] [CrossRef] [Green Version]
  5. Knirsch, F.; Eibl, G.; Engel, D. Error-Resilient Masking Approaches for Privacy Preserving Data Aggregation. IEEE Trans. Smart Grid 2018, 9, 3351–3361. [Google Scholar] [CrossRef]
  6. Chun, H.; Ren, K.; Jiang, W. Privacy-Preserving Power Usage and Supply Control in Smart Grid. Comput. Secur. 2018, 77, 709–719. [Google Scholar] [CrossRef]
  7. Jia, W.; Zhu, H.; Cao, Z.; Dong, X.; Xiao, C. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Syst. J. 2014, 8, 598–607. [Google Scholar] [CrossRef]
  8. Eibl, G.; Engel, D. Influence of Data Granularity on Smart Meter Privacy. IEEE Trans. Smart Grid 2015, 6, 930–939. [Google Scholar] [CrossRef]
  9. Paverd, A.J.; Martin, A.P.; Brown, I. Security and Privacy in Smart Grid Demand Response Systems. In Proceedings of the Smart Grid Security—Second International Workshop, SmartGridSec 2014, Munich, Germany, 26 February 2014; Revised Selected Papers. pp. 1–15. [Google Scholar] [CrossRef]
  10. Kessler, S.; Flath, C.M.; Böhm, K. Allocative and Strategic Effects of Privacy Enhancement in Smart Grids. Inf. Syst. 2015, 53, 170–181. [Google Scholar] [CrossRef]
  11. Kvaternik, K.; Laszka, A.; Walker, M.; Schmidt, D.; Sturm, M.; Lehofer, M.; Dubey, A. Privacy-Preserving Platform for Transactive Energy Systems. arXiv 2018, arXiv:1709.09597v2. [Google Scholar]
  12. Mohammadi, R.; Mashhadi, H.R.; Shahidehpour, M. Market-based Customer Reliability Provision in Distribution Systems Based on Game Theory: A Bi-level Optimization Approach. IEEE Trans. Smart Grid 2018, 10, 3840–3848. [Google Scholar] [CrossRef]
  13. Da Costa, J.P.C.L.; Weichenberger, L. Reliable Intra-System Communication for Wireless Battery Management Systems; Deutsches Patent- und Markenamt (DPMA): München, Germany.
  14. Gope, P.; Sikdar, B. An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May–1 June; pp. 1–2.
  15. Zinaman, O.; Aznar, A.; Linvill, C.; Darghouth, N.; Dubbeling, T.; Bianco, E. Grid-Connected Distributed Generation: Compensation Mechanism Basics; National Renewable Energy Laboratory: Golden, CO, USA, 2017.
  16. Tushar, W.; Yuen, C.; Smith, D.B.; Poor, H.V. Price Discrimination for Energy Trading in Smart Grid: A Game Theoretic Approach. IEEE Trans. Smart Grid 2017, 8, 1790–1801. [Google Scholar] [CrossRef]
  17. Liu, N.; Yu, X.; Wang, C.; Li, C.; Ma, L.; Lei, J. Energy-Sharing Model With Price-Based Demand Response for Microgrids of Peer-to-Peer Prosumers. IEEE Trans. Power Syst. 2017, 32, 3569–3583. [Google Scholar] [CrossRef]
  18. Jacquot, P.; Beaude, O.; Gaubert, S.; Oudjane, N. Analysis and Implementation of an Hourly Billing Mechanism for Demand Response Management. IEEE Trans. Smart Grid 2018, 10, 4265–4278. [Google Scholar] [CrossRef]
  19. Lee, J.; Guo, J.; Choi, J.K.; Zukerman, M. Distributed Energy Trading in Microgrids: A Game-Theoretic Model and Its Equilibrium Analysis. IEEE Trans. Ind. Electron. 2015, 62, 3524–3533. [Google Scholar] [CrossRef]
  20. Mediwaththe, C.P.; Stephens, E.R.; Smith, D.B.; Mahanti, A. A Dynamic Game for Electricity Load Management in Neighborhood Area Networks. IEEE Trans. Smart Grid 2016, 7, 1329–1336. [Google Scholar] [CrossRef]
  21. Ma, K.; Hu, G.; Spanos, C.J. Distributed Energy Consumption Control via Real-Time Pricing Feedback in Smart Grid. IEEE Trans. Control Syst. Technol. 2014, 22, 1907–1914. [Google Scholar] [CrossRef] [Green Version]
  22. Zhu, J.; Chen, M.Z.Q.; Zuo, Z.; Du, B. A New Pricing Scheme for Controlling Energy Storage Devices in Smart Grid. In Proceedings of the 2014 American Control Conference, Portland, OR, USA, 4–6 June 2014; pp. 2912–2917. [Google Scholar]
  23. Verschae, R.; Kato, T.; Matsuyama, T. Energy Management in Prosumer Communities: A Coordinated Approach. Energies 2016, 9, 562. [Google Scholar] [CrossRef]
  24. Guo, F.; Wen, C.; Li, Z. Distributed Optimal Energy Scheduling Based on a Novel PD Pricing Feedback Strategy in Smart Grid. In Proceedings of the 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA), Auckland, New Zealand, 15–17 June 2015; pp. 208–213. [Google Scholar] [CrossRef]
  25. Wu, Y.; Tan, X.; Qian, L.; Tsang, D.H.K.; Song, W.-Z.; Yu, L. Optimal Pricing and Energy Scheduling for Hybrid Energy Trading Market in Future Smart Grid. IEEE Trans. Ind. Inform. 2015, 11, 1585–1596. [Google Scholar] [CrossRef]
  26. Samadi, P.; Mohsenian-Rad, H.; Schober, R.; Wong, V.; Jatskevich, J. Optimal Real-Time Pricing Algorithm Based on Utility Maximization for Smart Grid. In Proceedings of the Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010. [Google Scholar]
  27. Qian, L.P.; Wu, Y.; Zhang, Y.J.; Huang, J. Demand Response Management via Real-time Electricity Price Control in Smart Grids. In Smart Grid—Networking, Data Management, and Business Models; CRC Press: Boca Raton, FL, USA; Taylor & Francis Group: New York, NY, USA, 2016. [Google Scholar]
  28. Voice, T.; Vytelingum, P.; Ramchurn, S.; Rogers, A.; Jennings, N. Decentralised Control of Micro-Storage in the Smart Grid. In Proceedings of the AAAI Conference on Artificial Intelligence, San Francisco, CA, USA, 7–11 August 2011. [Google Scholar]
  29. Ye, M.; Hu, G.; Spanos, C.J. Decentralized Optimal Load Scheduling Using Extremum Seeking-Based Optimization; Center for Research in Energy Systems Transformation (CREST): Berkeley, CA, USA, 2014. [Google Scholar]
  30. Eddy, Y.S.F.; Gooi, H.B.; Chen, S.X. Multi-Agent System for Distributed Management of Microgrids. IEEE Trans. Power Syst. 2015, 30, 24–34. [Google Scholar] [CrossRef]
  31. Mohsenian-Rad, A.-H.; Wong, V.W.S.; Jatskevich, J.; Schober, R.; Leon-Garcia, A. Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid. IEEE Trans. Smart Grids 2010, 1, 320–331. [Google Scholar] [CrossRef] [Green Version]
  32. Chakraborty, P.; Baeyens, E.; Khargonekar, P.P.; Poolla, K.; Varaiya, P. Analysis of Solar Energy Aggregation under Various Billing Mechanisms. IEEE Trans. Smart Grid 2018, 10, 4175–4187. [Google Scholar] [CrossRef] [Green Version]
  33. Wei, W.; Liu, F.; Mei, S. Energy Pricing and Dispatch for Smart Grid Retailers Under Demand Response and Market Price Uncertainty. IEEE Trans. Smart Grid 2015, 6, 1364–1374. [Google Scholar] [CrossRef]
  34. Yaagoubi, N.; Mouftah, H.T. A Distributed Game Theoretic Approach to Energy Trading in the Smart Grid. In Proceedings of the 2015 IEEE Electrical Power and Energy Conference (EPEC), London, ON, Canada, 26–28 October 2015; pp. 203–208. [Google Scholar] [CrossRef]
  35. Sikdar, S.; Rudie, K. Microgrid Level Competitive Market Using Dynamic Matching. In Proceedings of the Electrical Power & Energy Conference (EPEC), Halifax, NS, Canada, 21–23 August 2013; pp. 1–6. [Google Scholar]
  36. Wang, Y.; Saad, W.; Han, Z.; Poor, H.V.; Başar, T. A Game-Theoretic Approach to Energy Trading in the Smart Grid. arXiv 2013, arXiv:1310.1814. [Google Scholar] [CrossRef] [Green Version]
  37. Vytelingum, P.; Voice, T.D.; Ramchurn, S.D.; Rogers, A.; Jennings, N.R. Agent-Based Micro-Storage Management for the Smart Grid. In Proceedings of the Ninth International Conference on Autonomous Agents and Multiagent Systems, Toronto, ON, Canada, 10–14 May 2010; pp. 39–46. [Google Scholar]
  38. Kim, M.; Parkt, S.; Choi, J.K.; Lee, J. Energy Independence of Energy Trading System in Microgrid. In Proceedings of the 2017 IEEE Innovative Smart Grid Technologies—Asia (ISGT-Asia), Auckland, New Zealand, 4–7 December 2017. [Google Scholar] [CrossRef]
  39. Ilic, D.; da Silva, P.G.; Karnouskos, S.; Griesemer, M. An Energy Market for Trading Electricity in Smart Grid Neighbourhoods. In Proceedings of the IEEE International Conference on Digital Ecosystems and Technologies, Campione d’Italia, Italy, 18–20 June 2012; pp. 1–6. [Google Scholar]
  40. Bayram, I.S.; Shakir, M.Z.; Abdallah, M.; Qaraqe, K. A Survey on Energy Trading in Smart Grid. In Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, Atlanta, GA, USA, 3–5 December 2014; pp. 258–262. [Google Scholar]
  41. Gkatzikis, L.; Koutsopoulos, I.; Salonidis, T. The Role of Aggregators in Smart Grid Demand Response Markets. IEEE J. Sel. Areas Commun. 2013, 31, 1247–1257. [Google Scholar] [CrossRef]
  42. Ghorani, R.; Fotuhi-Firuzabad, M.; Moeini-Aghtaie, M. Optimal Bidding Strategy of Transactive Agents in Local Energy Markets. IEEE Trans. Smart Grid 2018, 10, 5152–5162. [Google Scholar] [CrossRef]
  43. McKenna, E.; Thomson, M. Photovoltaic Metering Configurations, Feed-in Tariffs and the Variable Effective Electricity Prices that Result. IET Renew. Power Gener. 2013, 7, 235–245. [Google Scholar] [CrossRef] [Green Version]
  44. Parkes, D.C.; Rabin, M.O.; Shieber, S.M.; Thorpe, C. Practical Secrecy-Preserving, Verifiably Correct and Trustworthy Auctions. Electron. Commer. Res. Appl. 2008, 7, 294–312. [Google Scholar] [CrossRef] [Green Version]
  45. Zhu, L.Y. Dominant Strategy Double Auction Mechanisms: Design and Implementation. Master’s Thesis, University of Florida, Gainesville, FL, USA, 2005. [Google Scholar]
  46. Parsons, S.; Rodriguez-Aguilar, J.A.; Klein, M. Auctions and Bidding: A Guide for Computer Scientists. ACM Comput. Surv. 2011, 43, 10. [Google Scholar] [CrossRef] [Green Version]
  47. Zhang, J.; Wen, D.; Zeng, S. A Discounted Trade Reduction Mechanism for Dynamic Ridesharing Pricing. IEEE Trans. Intell. Transp. Syst. 2016, 17, 1586–1595. [Google Scholar] [CrossRef]
  48. Myerson, R.B.; Satterthwaite, M.A. Efficient Mechanisms for Bilateral Trading. J. Econ. Theory 1983, 29, 265–281. [Google Scholar] [CrossRef] [Green Version]
  49. McAfee, R.P. A Dominant Strategy Double Auction. J. Econ. Theory 1992, 56, 434–450. [Google Scholar] [CrossRef]
  50. Segal-Halevi, E.; Hassidim, A.; Aumann, Y. SBBA: A Strongly-Budget-Balanced Double-Auction Mechanism. arXiv 2016, arXiv:1607.05139v1. [Google Scholar]
  51. Chu, L.Y.; Shen, Z.-J.M. Agent Competition Double-Auction Mechanism. Manag. Sci. 2006, 52, 1215–1222. [Google Scholar] [CrossRef] [Green Version]
  52. Vardakas, J.S.; Zorba, N.; Verikoukis, C.V. A Survey on Demand Response Programs in Smart Grids: Pricing Methods and Optimization Algorithms. IEEE Commun. Surv. Tuts. 2014, 17, 152–178. [Google Scholar] [CrossRef]
  53. Tang, Q.; Yang, K.; Zhou, D.; Luo, Y.; Yu, F. A Real-Time Dynamic Pricing Algorithm for Smart Grid With Unstable Energy Providers and Malicious Users. IEEE Internet Things J. 2016, 3, 554–562. [Google Scholar] [CrossRef]
  54. Jiang, T.; Cao, Y.; Yu, L.; Wang, Z. Load Shaping Strategy Based on Energy Storage and Dynamic Pricing in Smart Grid. IEEE Trans. Smart Grid 2014, 5, 2868–2876. [Google Scholar] [CrossRef]
  55. Takahashi, S.; Tokuro, M. A Formalization of Quantity Based Double Auction Mechanism. In Proceedings of the 19th International Conference on Systems Engineering, Las Vegas, NV, USA, 3–5 February 2008. [Google Scholar] [CrossRef]
  56. Wang, W.; Lu, Z. Cyber security in the Smart Grid: Survey and Challenges. Comput. Netw. 2013, 57, 1344–1371. [Google Scholar] [CrossRef]
  57. Buchmann, E.; Böhm, K.; Burghardt, T.; Kessler, S. Re-identification of Smart Meter Data. Pers. Ubiquitous Comput. 2013, 17, 653–662. [Google Scholar] [CrossRef]
  58. Shiobara, T.; Palensky, P.; Nishi, H. Effective Metering Data Aggregation for Smart Grid Communication Infrastructure. In Proceedings of the 41st Annual Conference of the IEEE Industrial Electronics Society (IECON 2015), Yokohama, Japan, 9–12 November 2015; pp. 2136–2140. [Google Scholar] [CrossRef]
  59. Gong, Y.; Cai, Y.; Guo, Y.; Fang, Y. A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid. IEEE Trans. Smart Grid 2016, 7, 1304–1313. [Google Scholar] [CrossRef]
  60. Tudor, V.; Almgren, M.; Papatriantafilou, M. The Influence of Dataset Characteristics on Privacy Preserving Methods in the Advanced Metering Infrastructure. Comput. Secur. 2018, 76, 178–196. [Google Scholar] [CrossRef]
  61. Metke, A.R.; Ekl, R.L. Security Technology for Smart Grid Networks. IEEE Trans. Smart Grid 2010, 1, 99–107. [Google Scholar] [CrossRef]
  62. Iyer, S. Cyber Security for Smart Grid, Cryptography, and Privacy. Int. J. Digit. Multimed. Broadcast. 2011, 2011, 372020. [Google Scholar] [CrossRef] [Green Version]
  63. Yadav, S.A.; Kumar, S.R.; Sharma, S.; Singh, A. A Review of Possibilities and Solutions of Cyber Attacks in Smart Grids. In Proceedings of the 1st International Conference on Innovation and Challenges in Cyber Security (ICICCS 2016), Noida, India, 3–5 February 2016; pp. 60–63. [Google Scholar]
  64. Abidin, A.; Aly, A.; Cleemput, S.; Mustafa, M.A. Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid. arXiv 2018, arXiv:1801.08354. [Google Scholar]
  65. Shapsough, S.; Qatan, F.; Aburukba, R.; Aloul, F.; al Ali, A.R. Smart Grid Cyber Security: Challenges and Solutions. In Proceedings of the International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), Offenburg, Germany, 20–23 October 2015; pp. 170–175. [Google Scholar]
  66. Richardson, C.; Race, N.; Smith, P. A Privacy Preserving Approach to Energy Theft Detection in Smart Grids. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 3 October 2016; pp. 1–4. [Google Scholar]
  67. He, D.; Kumar, N.; Zeadally, S.; Vinel, A.; Yang, L.T. Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries. IEEE Trans. Smart Grid 2017, 8, 2411–2419. [Google Scholar] [CrossRef]
  68. Iwamura, K.; Tokita, K. Fast Secure Computation Based on a Secret Sharing Scheme for n < 2k − 1. In Proceedings of the 4th International Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, FL, USA, 24–25 February 2018; pp. 1–5. [Google Scholar]
  69. Abood, O.G.; Elsadd, M.A.; Guirguis, S.K. Investigation of Cryptography Algorithms Used for Security and Privacy Protection in Smart Grid. In Proceedings of the 2017 Nineteenth International Middle East Power Systems Conference (MEPCON), Cairo, Egypt, 19–21 December 2017; pp. 644–649. [Google Scholar]
  70. Barletta, A.; Callegari, C.; Giordano, S.; Pagano, M.; Procissi, G. Privacy Preserving Smart Grid Communications by Verifiable Secret Key Sharing. In Proceedings of the 2015 Intl. Conference on Computing and Network Communications (CoCoNet’15), Trivandrum, India, 16–19 December 2015; pp. 199–204. [Google Scholar]
  71. Mihaylov, M.; Jurado, S.; Avellana, N.; van Moffaert, K.; de Abril, I.M.; Nowé, A. NRGcoin: Virtual Currency for Trading of Renewable Energy in Smart Grids. In Proceedings of the 11th International Conference on the European Energy Market (EEM14), Krakow, Poland, 28–30 May 2014; pp. 1–5. [Google Scholar] [CrossRef]
  72. Hu, C.; Liao, X.; Cheng, X. Verifiable Multi-Secret Sharing Based on LFSR Sequences. Theor. Comput. Sci. 2012, 445, 52–62. [Google Scholar] [CrossRef] [Green Version]
  73. George, M.; Alfke, P. Linear Feedback Shift Registers in Virtex Devices; Xilinx XAPP210 (v1.3); Xilinx Inc.: San Jose, CA, USA, 2007; pp. 1–5. [Google Scholar]
  74. Paar, C.; Pelzl, J. Understanding Cryptography. A Textbook for Students and Practitioners; Springer: Berlin/Heidelberg, Germany, 2010. [Google Scholar] [CrossRef]
  75. Hao, J.; Piechocki, R.J.; Kaleshi, D.; Chin, W.H.; Fan, Z. Optimal Malicious Attack Construction and Robust Detection in Smart Grid Cyber Security Analysis. In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, 3–6 November 2015. [Google Scholar] [CrossRef]
  76. Rahman, M.S.; Basu, A.; Kiyomoto, S.; Bhuiyan, M.Z.A. Privacy-Friendly Secure Bidding for Smart Grid Demand-Response. Inf. Sci. 2017, 379, 229–240. [Google Scholar] [CrossRef]
  77. Duan, J.; Chow, M.-Y. A Resilient Consensus-Based Distributed Energy Management Algorithm against Data Integrity Attacks. IEEE Trans. Smart Grid 2018. [Google Scholar] [CrossRef]
  78. Hung, Y.; Michailidis, G. Modeling and Optimization of Time-Of-Use Electricity Pricing Systems. IEEE Trans. Smart Grid 2018. [Google Scholar] [CrossRef]
Figure 1. Overall sequence of steps in the proposed framework, with the slot zero and the stages of bids submission, bids disclosure, and bids verification: Note that, only in the slot zero and in the bids submission stage, the ciphertext is obtained via AES. The nodes designed to act as confirmation agents in a given time slot are depicted on the right side of the figure.
Figure 1. Overall sequence of steps in the proposed framework, with the slot zero and the stages of bids submission, bids disclosure, and bids verification: Note that, only in the slot zero and in the bids submission stage, the ciphertext is obtained via AES. The nodes designed to act as confirmation agents in a given time slot are depicted on the right side of the figure.
Sensors 20 01337 g001
Figure 2. Bits of a bid string in terms of the bid content: The length of 32 bits comprises in this order t 1 , t 2 , p 1 , i , p 2 , i , and q i .
Figure 2. Bits of a bid string in terms of the bid content: The length of 32 bits comprises in this order t 1 , t 2 , p 1 , i , p 2 , i , and q i .
Sensors 20 01337 g002
Figure 3. When the price of the purchaser equals or surpasses the price of the seller, P b P s , (a) an average price P a is calculated in the state-of-the-art approaches of [35,36] and taxes are applied over the surpluses ( P b P a ) and ( P a P s ) . (b) The proposed protocol, where the prices yield the welfares f i and g j , which are complementary with regards to the welfare of the utility U r = P b P s , such that f i + g j + U r = P u P l .
Figure 3. When the price of the purchaser equals or surpasses the price of the seller, P b P s , (a) an average price P a is calculated in the state-of-the-art approaches of [35,36] and taxes are applied over the surpluses ( P b P a ) and ( P a P s ) . (b) The proposed protocol, where the prices yield the welfares f i and g j , which are complementary with regards to the welfare of the utility U r = P b P s , such that f i + g j + U r = P u P l .
Sensors 20 01337 g003
Figure 4. Sequence of stages in the proposed framework from the standpoint of a spy: Due to the sequence of stages, the spy can neither infer how many orders are posed nor of which type they are.
Figure 4. Sequence of stages in the proposed framework from the standpoint of a spy: Due to the sequence of stages, the spy can neither infer how many orders are posed nor of which type they are.
Sensors 20 01337 g004
Table 1. Commercial treatment of energy and the respective approaches in the literature.
Table 1. Commercial treatment of energy and the respective approaches in the literature.
CriterionCooperative GamesCompetitive Games
How energy is predominantly seenas a public goodas a commodity
Main goalssocial fairness, market controldecentralization, market efficiency
Main references[17,18,22,23,24,25,26,27,28,29,30,31,32,33][3,4,19,20,21,34,35,36,37,38,39,40,41,42]
Table 2. Comparison between the proposed framework and the state-of-the-art approaches in terms of privacy.
Table 2. Comparison between the proposed framework and the state-of-the-art approaches in terms of privacy.
Reference[1][67][76][77][11]Proposed
Privacy enhancement methodDLP-based public
key + secure
hash algorithm
DLP-based public
key (Boneh-
Goh-Nissim)
DLP-based public
key (ElGamal)
NoneAnonymous
Addresses +
cryptographic
signature
AES keys +
XOR matrix of
fixed length
Cost of cryptographyHighHighHighNoneMediumLow
Disclosure of SM address111101
Dismissal of secure
communication channel
110011
ID de-anonymization proof001001
Absence of need for
connection between
each pair of nodes
011101
Impossibility of interested
parties identification
000001
Table 3. Comparison with the state-of-the-art approaches in terms of pricing systems.
Table 3. Comparison with the state-of-the-art approaches in terms of pricing systems.
Reference[53][33][41][78][18][22][20][23][24][3][16][34]Proposed
Dismissal of consumption
profile assumptions
0000010011111
Possibility of
storage elements inclusion
0101010100111
Pricing freedom0000000001011
Inclusion of a TTP1110110111101
Competitive market0011101001011

Share and Cite

MDPI and ACS Style

Junior, J.M.; da Costa, J.P.C.L.; Garcez, C.C.R.; de Oliveira Albuquerque, R.; Arancibia, A.; Weichenberger, L.; de Mendonça, F.L.L.; Galdo, G.d.; de Sousa Jr., R.T. Data Security and Trading Framework for Smart Grids in Neighborhood Area Networks. Sensors 2020, 20, 1337. https://doi.org/10.3390/s20051337

AMA Style

Junior JM, da Costa JPCL, Garcez CCR, de Oliveira Albuquerque R, Arancibia A, Weichenberger L, de Mendonça FLL, Galdo Gd, de Sousa Jr. RT. Data Security and Trading Framework for Smart Grids in Neighborhood Area Networks. Sensors. 2020; 20(5):1337. https://doi.org/10.3390/s20051337

Chicago/Turabian Style

Junior, Jayme Milanezi, João Paulo C. L. da Costa, Caio C. R. Garcez, Robson de Oliveira Albuquerque, Arnaldo Arancibia, Lothar Weichenberger, Fábio Lucio Lopes de Mendonça, Giovanni del Galdo, and Rafael T. de Sousa Jr. 2020. "Data Security and Trading Framework for Smart Grids in Neighborhood Area Networks" Sensors 20, no. 5: 1337. https://doi.org/10.3390/s20051337

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop