Next Article in Journal
A Cryptographic System Based upon the Principles of Gene Expression
Next Article in Special Issue
Special Issue on Cryptographic Protocols
Previous Article in Journal
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment
Previous Article in Special Issue
Synchronization in Quantum Key Distribution Systems
Article Menu

Export Article

Open AccessArticle
Cryptography 2017, 1(3), 20; https://doi.org/10.3390/cryptography1030020

Performance Analysis of Secure and Private Billing Protocols for Smart Metering

Computer Science Department, Southampton University, University Road, Southampton SO17 1BJ, UK
*
Authors to whom correspondence should be addressed.
Received: 3 October 2017 / Revised: 10 November 2017 / Accepted: 13 November 2017 / Published: 17 November 2017
(This article belongs to the Special Issue Cryptographic Protocols)
Full-Text   |   PDF [649 KB, uploaded 21 November 2017]   |  

Abstract

Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware. These protocols protect the privacy of customers by never transmitting the fine-grained utility readings outside of the customer’s home network. One protocol favors complexity on the trusted smart meter hardware while the other uses homomorphic commitments to offload computation to a third device. Both protocols are designed to operate on top of existing cryptographic secure channel protocols in place on smart meters. Proof of concept software implementations of these protocols have been written and their suitability for real world application to low-performance smart meter hardware is discussed. These protocols may also have application to other privacy conscious aggregation systems, such as electronic voting. View Full-Text
Keywords: smart meters; security; bit commitment scheme; hardware; authentication; cryptography; protocol smart meters; security; bit commitment scheme; hardware; authentication; cryptography; protocol
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Eccles, T.; Halak, B. Performance Analysis of Secure and Private Billing Protocols for Smart Metering. Cryptography 2017, 1, 20.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top