Protected bidding against compromised information injection in IoT-based smart grid

The smart grid is regarded as one of the important application field of the Internet of Things (IoT) composed of embedded sensors, which sense and control the behavior of the energy world. IoT is attractive for features of grid catastrophe prevention and decrease of grid transmission line and reliab...

Full description

Saved in:
Bibliographic Details
Main Authors: Bhuiyan, Md Zakirul Alam, Zaman, M., Wang, Guojun, Wang, Tian, Rahman, Md. Arafatur, Tao, Hai
Format: Conference or Workshop Item
Language:English
Published: Springer, Cham 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/24973/1/Protected%20bidding%20against%20compromised%20information%20injection%20in%20IoT.pdf
http://umpir.ump.edu.my/id/eprint/24973/
https://doi.org/10.1007/978-3-030-05928-6_8
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The smart grid is regarded as one of the important application field of the Internet of Things (IoT) composed of embedded sensors, which sense and control the behavior of the energy world. IoT is attractive for features of grid catastrophe prevention and decrease of grid transmission line and reliable load fluctuation control. Automated Demand Response (ADR) in smart grids maintain demand-supply stability and in regulating customer side electric energy charges. An important goal of IoT-based demand-response using IoT is to enable a type of DR approach called automatic demand bidding (ADR-DB). However, compromised information board can be injected into during the DR process that influences the data privacy and security in the ADR-DB bidding process, while protecting privacy oriented consumer data is in the bidding process is must. In this work, we present a bidding approach that is secure and private for incentive-based ADR system. We use cryptography method instead of using any trusted third-party for the security and privacy. We show that proposed ADR bidding are computationally practical through simulations performed in three simulation environments.