Abstract
As a typical and promising application of the Internet of things, smart grid will play an increasingly important role in the future power system. However, security and privacy issues in smart grids need to be addressed. If the user’s electricity consumption is transmitted in plaintext, the data may be used by some illegal users. At the same time, malicious users may send false data such that the control center makes a wrong power resource scheduling. In addition, efficiency issues should be taken into account in Internet of things applications. To overcome these challenges, an efficient and privacy-preserving certificateless data aggregation scheme is proposed for Internet of things–enabled smart grids. The confidentiality and integrity of data can be guaranteed, and the identity of users can be hidden in our scheme. In particular, if some users have malicious behaviors, they will be tracked. The proposed scheme can resist replay attacks, modification attacks, and impersonation attacks. In the process of collecting data, computation of encryption and signature generation do not need expensive bilinear pairings. Furthermore, batch verification is used to improve efficiency of verification. It is demonstrated that the security, privacy, and efficiency issues in smart grid are addressed based on security and performance analysis.
Introduction
Internet of things (IoT) enables distant objects to exchange information through the Internet,1,2 which makes IoT play an important role in e-health monitoring, environment monitoring, smart grid, and so on. As the key solution of next generation power system, smart grids provide two-way data exchange, 3 which makes smart grids report users’ power consumption in real time and have control center (CC) quickly make a reasonable power resource scheduling. 4 However, smart grids can greatly improve the utilization of resources and avoid some accidents caused by power resource scheduling.
Each user will install a smart meter (SM), which periodically reports electricity consumption to gateways. In practical applications, efficiency has to be considered, which involves user experience. For example, in the electronic payment scenario of blockchains, Zhang et al.5,6 proposed two blockchain-based fair payment protocols called BPay and BCPay for outsourcing services in cloud computing. The protocol BPay 5 is compatible with the Bitcoin blockchain based on an iterative all-or-nothing checking-proof protocol and a top-down checking method. However, the performance remains to be improved. At the cost of losing the compatibility with the Bitcoin blockchain, the protocol BCPay 6 realizes robust fair payment based on a one round all-or-nothing checking-proof protocol and hence is very efficient in terms of the computation cost and the number of transactions. In addition, it is reasonable to think that the computing power of SMs and gateways is limited. Fortunately, aggregation technology can be used in smart grids, which can greatly reduce the computational load of gateways. However, it is also a very challenging problem to reduce the calculation of SMs.
Users’ electricity consumption involves the user’s personal privacy. 7 For example, if an adversary knows that a user’s electricity consumption has been zero for a long time, he may engage in criminal activities by revealing lifestyle habits of a user. 8 Therefore, users’ electricity consumption and user’s identity should be protected. If the user’s identity is disguised during transmission, the user’s privacy will be further improved. Meanwhile, malicious users should be able to be tracked if they transmit malicious data. Besides, users may modify data to avoid payment. Adversaries may modify data to have the CC make a wrong power resource scheduling. Therefore, in practical applications, the confidentiality and integrity of electricity data are essential. 9 Generally speaking, the encryption mechanism and authentication mechanism are suitable for solving the confidentiality and integrity of data.
To overcome the aforementioned challenges, an efficient and privacy-preserving certificateless data aggregation scheme is presented for IoT-enabled smart grids. The scheme has the following advantages:
The proposed scheme can simultaneously guarantee the confidentiality and integrity of data and the privacy of user identity.
When some users have malicious behaviors, they will be tracked. In addition, the scheme can resist replay attacks, modification attacks, and impersonation attacks.
In the process of collecting data, the computation of encryption and signature generation do not need expensive bilinear pairings. Furthermore, batch verification is used to improve efficiency of verification. The proposed scheme is secure under the random oracle model, and the scheme is efficient because it does not involve bilinear pairings.
Related works
Efficiency and security have always been the concern of academia and industry. Lightweight signature schemes10,11 and efficient encryption schemes12,13 have always been the focus of research. Zhang et al. 10 presented a certificateless signature scheme for data crowdsensing in cloud-assisted industrial IoT. The scheme only needs public channels and is proven secure in the standard model. Karati et al. 11 proposed a new pairing-based certificateless signature scheme without map-to-point function and random oracle model. A framework for constructing efficient code-based encryption schemes was proposed in Aguilar-Melchor et al., 12 which do not hide any structure in their public matrix. Preprocessing technology is applied in Zhang et al., 13 which improves the efficiency of ciphertext generation.
In order to tackle the security issue in smart grids, the key management scheme, 14 key distribution scheme, 15 and authentication scheme 16 have been introduced. However, these schemes do not protect the privacy of users’ electricity consumption. In order to protect the privacy of users’ electricity consumption, users’ electricity consumption can be encrypted in the process of transmission. In order to improve efficiency, data aggregation technology17–19 has been used in smart grids. The encrypted data are aggregated by the gateway and then transmitted to the CC. However, in the stage of power collection, SMs need a lot of calculation, which is because there are many linear pairings that need to be computed. In data aggregation, some homomorphic encryption schemes20,21 are proposed. Gateway can aggregate ciphertext without decrypting ciphertext.
The organization of this article
This article is organized through the following structure: the preliminary of the article is first introduced; then, the model of the scheme is defined; after that, the concrete scheme and security proof as well as analysis are given; next, the performance analysis of the scheme is presented; and finally, the summary of the article is arrived.
Preliminary
The elliptic curve cryptosystem (ECC), elliptic curve discrete logarithm problem (ECDLP), and computational Diffie–Hellman problem (CDHP) assumptions are introduced in this section. ECC is widely used in cryptographic algorithms because of its low computational and communication costs.
Suppose that a prime number
Let 0 be an infinite point, such that it satisfies equation
If
If
Scalar multiplication on elliptic curves
Definition 1
ECDLP is defined as follows: two random points
Definition 2
CDHP is defined as follows: two random points
System model
In this section, the system architecture, security model, and design goal are introduced as follows.
System architecture
Our scheme involves four entities as Figure 1 whose roles are as follows:
Key generation center (KGC): the KGC generates the partial secret key for each SM and gateway (GW). In addition, KGC is credible.
CC: the CC has powerful computing power, and can verify and decrypt the data from GWs. Then, some analysis and decisions can be made by analyzing data. In addition, CC can generate the pseudoidentity for SM and GW. In addition, CC is credible.
GW: the GW validates the data sent by SMs and aggregates data from SMs, then signs the aggregated data and sends the aggregated data and its signature to CC.
SM: every user is equipped with an SM. SM is used to collect users’ electricity consumption, encrypt and sign it, and periodically reports them to GW. Each user in the system installs an SM, so the users and SMs are the same.

System architecture.
Security model
In our security model, KGC and CC are trusted because the system is initialized by them. GW is honest but curious, which follows protocols honestly and is curious about the data privacy of SM. Suppose that the time of participants in the system is synchronous.
There is an adversary
Design goal
In order to prevent the adversary from destroying the integrity and confidentiality of data and some wrong operations. The following security requirements should be met:
Confidentiality and integrity of data: in order to ensure the confidentiality and integrity of any data, no adversaries can know the user’s electricity consumption. In order to ensure the integrity of the data, accepted data should be validated.
Identity privacy preservation: user’s identity should be confidential and receivers cannot judge the owner of the data by analyzing the received data.
Traceability and unlinkability: although the user’s identity is hidden, CC can trace the user’s real identity under certain conditions.
Resistance to attacks: the proposed scheme should be able to resist replay attacks, modification attacks, and impersonation attacks.
Proposed scheme
Overview
Our scheme consists of the following algorithms: System initialization, Pseudoidentity generation, Partial secret key generation, Secret key generation, Individual encryption and signing, Data aggregation, and Data decryption. KGC and CC initialize the system by calling System initialization algorithm. Then, the system parameters are published and the main secret keys are kept by themselves. Next, SM interacts with CC to obtain the pseudoidentity in the process of Pseudoidentity generation algorithm. After that, SM sends the pseudoidentity to KGC to obtain the partial secret key in the process of Partial secret key generation algorithm. Finally, the user generates the secret key on the client side by executing Secret key generation algorithm. In Individual encryption and signing phase, when SM collects data, the data are encrypted and the ciphertext is signed. Next, the ciphertext and signature are sent to GW. In Data aggregation phase, after GW receives the data from SMs, it first verifies data. Then, legitimate data are accepted and aggregated. After the aggregated data are signed, the aggregated data and signature will be sent to CC. In Data decryption phase, CC verifies the received data and decrypts it if data are legal.
System initialization
System initialization is executed by KGC and CC through the following steps:
Given a security parameter
KGC picks up a point
CC picks up a point
KGC selects three anti-collision hash functions:
Pseudoidentity generation
When CC receives
Through the above steps,
Partial secret key generation
Through the above steps,
Secret key generation
After receiving
After receiving
Individual encryption and signing
After collecting data
Individual encryption: after collecting data
Data signature:
Sending data:
Data aggregation
After receiving the data
Single verification: after receiving data
Batch verification: to improve the efficiency of verification,
Aggregating individual data: after the validity check,
Signature of aggregated data:
Sending aggregated data:
Data decryption
After receiving the data
Single verification: after receiving data
Batch verification: to improve the efficiency of verification, CC can execute the batch verification by the equation
Data decryption: if
Security proof
The security proof of the scheme is given in this section. In our scheme, the confidentiality of data is guaranteed by the ElGamal encryption mechanism. Data integrity is guaranteed by signature mechanism. As long as the signature cannot be forged, our scheme will be secure. So, here we only prove that the signature is unforgeable, and the details can be referred to the scheme. 22 The unforgeability of the scheme is proved as follows.
Theorem 1
In the random oracle model, the certificateless signature scheme is unforgeable under the ECDLP assumption.
Lemma 1
Under the random oracle model, a polynomial time adversary
Proof
Suppose an adversary
Setup:
Partial-Secret-Key query: when
Create-User query: suppose that the adversary
When
When
Secret-Key query: suppose that the adversary
When
When
Sign query: when the signature on the message
According to the Forking Lemma,
23
As a result, the ECDLP assumption can be broken by
Security analysis
In the section, the security analysis of the scheme is given as follows:
Confidentiality and integrity of data: in the last section, the signature’s unforgeability on ciphertext has been proved, which guarantees the integrity of the ciphertext. The confidentiality of ciphertext is guaranteed by the ElGamal encryption mechanism.
Identity privacy preservation: in the proposed scheme, the pseudonym mechanism is used, and the receivers cannot judge the owner of the data by the received data.
Traceability and unlinkability: CC can trace the real identity of GW according to the pseudoidentity
Resistance to attacks: our scheme can resist replay attacks, modification attacks, and impersonation attacks. Because the timestamp is included in the message
Performance analysis
In the section, we compare our scheme with data aggregation schemes24,25 in terms of computational efficiency. It is reasonable to believe that CC and KGC have powerful computing power and storage capability, SM has limited computation power, and GW has stronger computing power than SM. Therefore, only the individual encryption and signing phase and the data aggregation phase are compared. For convenience, the time of some operations is marked in Table 1.
Definition of notation.
ECC: elliptic curve cryptosystem.
The comparisons on the individual encryption and signing phase and the data aggregation phase between our scheme and schemes secure privacy-preserving data aggregation (SPPDA) 24 and efficient and privacy-preserving data aggregation (EPPDA) 25 are shown in Table 2.
Comparison of computational costs in the individual operation phase and the data aggregation phase.
SPPDA: secure privacy-preserving data aggregation; EPPDA: efficient and privacy-preserving data aggregation.
In order to be more intuitive and accurate, performance evaluation is implemented on a unified platform, where the security parameter of elliptic curve is 256 bits and the prime number of the small scalar multiplication on the elliptic curve is 80 bits. As can be shown from Figures 2 and 3, our scheme outperforms aggregation schemes24,25 in the individual encryption and signing phase and the data aggregation phase. That is because there are no linear pairing and exponential operations involved in our scheme. Based on the above analysis, it can seen that the presented scheme is efficient. Therefore, our scheme has great application prospects in resource-constrained smart grid terminals.

Comparison of computational costs in the individual encryption and signing phase.

Comparison of computational costs in the data aggregation phase.
Conclusion
As the key solution of next generation power system, smart grid can bring great convenience to our life. However, in the deployment of smart grid, security and efficiency issues have to face challenges. In this article, an efficient and privacy-preserving certificateless data aggregation scheme is presented for IoT-enabled smart grids to tackle the security, privacy, and efficiency problems in smart grids. Security proof and analysis show that the presented scheme achieves the design goals. At the same time, the performance analysis shows that the performance of the scheme is excellent.
In the next work, we are going to improve the communication cost of the system. Smaller computation and lower communication costs will be more conducive to the deployment of smart grids.
Footnotes
Handling Editor: Ximeng Liu
Declaration of conflicting interests
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work is supported by Science and Technology Achievements Promotion Project in Shaanxi Province (No. 2018CG-007).
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
