Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2934328.2934347acmotherconferencesArticle/Chapter ViewAbstractPublication Pagese-energyConference Proceedingsconference-collections
research-article
Public Access

Shepherd: sharing energy for privacy preserving in hybrid AC-DC microgrids

Published: 21 June 2016 Publication History

Abstract

Renewable energy becomes increasingly popular due to its zero carbon dioxide emissions and increasing energy demand. To better utilize renewable energy, hybrid Alternative Current (AC)-Direct Current (DC) microgrids have been proposed because the most common renewable energy that can be harvested in residential homes is solar energy, which provides DC power. However, a major issue in a hybrid AC-DC microgrid is privacy leakage because power consumption information of each home can be exposed through the power lines or compromised neighbors in the microgrid. Power consumption data then can be used to reveal precise information about appliances' activities with non-intrusive load monitoring algorithms. To mitigate leakage of human behaviors in homes, battery-based load hiding (BLH) is widely studied. In this approach, a battery is used to store and supply energy to appliances to hide the actual power consumption. However, BLH requires to deploy large and expensive batteries at each home. In this paper, instead of using batteries, we propose to leverage the unique features of hybrid AC-DC microgrids to hide power consumption information. Specifically, we design Shepherd, a privacy protection framework to hide power consumption information from different types of power consumption detection techniques. To minimize energy transmission among neighboring homes, we provide an optimal offline solution and an efficient heuristic online solution. We conducted extensive system evaluations with 40 homes. Results indicate that our proposed approach can i) significantly reduce the detection ratio from 33% to 13% compared to BLH, and ii) effectively hide consumption information even with 25% compromised neighbors.

References

[1]
State of California Executive Order S-21-09. http://gov.ca.gov/executive-order/13269, 2009.
[2]
Database of State Incentives for Renewables and Efficiency. http://www.dsireusa.org, 2010.
[3]
Residential Energy Consumption Survey (RECS). http://www.eia.gov/consumption/residential, 2013.
[4]
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin. Private memoirs of a smart meter. In BuildSys, 2010.
[5]
S. Barker, S. Kalra, D. Irwin, and P. Shenoy. Empirical characterization and modeling of electrical loads in smart homes. In IGCC, 2013.
[6]
S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University, 2004.
[7]
S. Clark, H. Mustafa, B. Ransford, J. Sorber, K. Fu, and W. Xu. Current events: Identifying webpages by tapping the electrical outlet. Lecture Notes in Computer Science, 8134: 700--717, 2013.
[8]
K. Garbesi. Catalog of dc appliances and power systems. 2012.
[9]
G. Hart. Residential energy monitoring and computerized surveillance via utility power flows. IEEE Technology and Society Magazine, 8(2): 12--16, 1989.
[10]
Z. Huang, T. Zhu, Y. Gu, D. Irwin, A. Mishra, and P. Shenoy. Minimizing electricity costs by sharing energy in sustainable microgrids. In BuildSys, 2014.
[11]
M. Lisovich, D. Mulligan, and S. Wicker. Inferring personal information from demand-response systems. IEEE Security Privacy, 8(1): 11--20, 2010.
[12]
I. Rouf, H. Mustafa, M. Xu, W. Xu, R. Miller, and M. Gruteser. Neighborhood watch: Security and privacy analysis of automatic meter reading systems. In CCS, 2012.
[13]
S. McLaughlin, P. McDaniel, and W. Aiello. Protecting consumer privacy from electric load monitoring. In CCS, 2011.
[14]
S. N. Patel, T. Robertson, J. A. Kientz, M. S. Reynolds, and G. D. Abowd. At the flick of a switch: Detecting and classifying unique electrical events on the residential power line. In Ubicomp, 2007.
[15]
T. Carpenter, S. Singla, P. Azimzadeh, and S. Keshav. The impact of electricity pricing schemes on storage adoption in ontario. In e-Energy, 2012.
[16]
W. Yang, N. Li, Y. Qi, W. Qardaji, S. McLaughlin, and P. McDaniel. Minimizing private data disclosures in the smart grid. In CCS, 2012.
[17]
T. Zhu, Z. Huang, A. Sharma, J. Su, D. Irwin, A. Mishra, D. Menasche, and P. Shenoy. Sharing renewable energy in smart microgrids. In ICCPS, 2013.

Cited By

View all
  • (2025)Enhanced AC/DC optimal power flow via nested distributed optimization for AC/VSC-MTDC hybrid power systemsInternational Journal of Electrical Power & Energy Systems10.1016/j.ijepes.2024.110365164(110365)Online publication date: Mar-2025
  • (2024)Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic DevicesIEEE Transactions on Consumer Electronics10.1109/TCE.2023.334765170:1(4605-4616)Online publication date: Feb-2024
  • (2022)A Secured Protocol for IoT Devices in Tactical NetworksMILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM55135.2022.10017581(43-48)Online publication date: 28-Nov-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
e-Energy '16: Proceedings of the Seventh International Conference on Future Energy Systems
June 2016
266 pages
ISBN:9781450343930
DOI:10.1145/2934328
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 June 2016

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

e-Energy'16

Acceptance Rates

Overall Acceptance Rate 160 of 446 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)63
  • Downloads (Last 6 weeks)14
Reflects downloads up to 11 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Enhanced AC/DC optimal power flow via nested distributed optimization for AC/VSC-MTDC hybrid power systemsInternational Journal of Electrical Power & Energy Systems10.1016/j.ijepes.2024.110365164(110365)Online publication date: Mar-2025
  • (2024)Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic DevicesIEEE Transactions on Consumer Electronics10.1109/TCE.2023.334765170:1(4605-4616)Online publication date: Feb-2024
  • (2022)A Secured Protocol for IoT Devices in Tactical NetworksMILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM55135.2022.10017581(43-48)Online publication date: 28-Nov-2022
  • (2021)AutoShare: Virtual community solar and storage for energy sharingEnergy Informatics10.1186/s42162-021-00144-w4:1Online publication date: 12-Jul-2021
  • (2021)OutletSpyProceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3448300.3468291(181-191)Online publication date: 28-Jun-2021
  • (2021)Appliance Level Energy Characterization of Residential Electricity Demand: Prospects, Challenges and RecommendationsIEEE Access10.1109/ACCESS.2021.31231969(148676-148697)Online publication date: 2021
  • (2020)MORED: A Moroccan Buildings’ Electricity Consumption DatasetEnergies10.3390/en1324673713:24(6737)Online publication date: 21-Dec-2020
  • (2020)NON-INTRUSIVE LOAD MONITORING: IMPLEMENTATION EFFECTS AND DISTRIBUTION PROSPECTSStrategic decisions and risk management10.17747/2618-947X-2019-4-306-31910:4(306-319)Online publication date: 28-Mar-2020
  • (2020)Countering cross-technology jamming attackProceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3395351.3399367(99-110)Online publication date: 8-Jul-2020
  • (2019)Scalable User-Substation Assignment with Big Data from Power GridsIEEE Transactions on Big Data10.1109/TBDATA.2017.27661535:2(209-222)Online publication date: 1-Jun-2019
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media