ICANN '01 Proceedings of the International Conference on Artificial Neural Networks
Detecting Patterns of Appliances from Total Load Data Using a Dynamic Programming Approach
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Collaborative Recommender Systems for Building Automation
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Inferring Personal Information from Demand-Response Systems
IEEE Security and Privacy
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Private memoirs of a smart meter
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
Multi-vendor penetration testing in the advanced metering infrastructure
Proceedings of the 26th Annual Computer Security Applications Conference
Nonintrusive Load-Shed Verification
IEEE Pervasive Computing
Plug-in privacy for smart metering billing
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
I have a DREAM!: differentially private smart metering
IH'11 Proceedings of the 13th international conference on Information hiding
Protecting against physical resource monitoring
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Protecting consumer privacy from electric load monitoring
Proceedings of the 18th ACM conference on Computer and communications security
Detecting stress during real-world driving tasks using physiological sensors
IEEE Transactions on Intelligent Transportation Systems
Scaling distributed energy storage for grid peak reduction
Proceedings of the fourth international conference on Future energy systems
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Smart electric meters pose a substantial threat to the privacy of individuals in their own homes. Combined with non-intrusive load monitors, smart meter data can reveal precise home appliance usage information. An emerging solution to behavior leakage in smart meter measurement data is the use of battery-based load hiding. In this approach, a battery is used to store and supply power to home devices at strategic times to hide appliance loads from smart meters. A few such battery control algorithms have already been studied in the literature, but none have been evaluated from an adversarial point of view. In this paper, we first consider two well known battery privacy algorithms, Best Effort (BE) and Non-Intrusive Load Leveling (NILL), and demonstrate attacks that recover precise load change information, which can be used to recover appliance behavior information, under both algorithms. We then introduce a stepping approach to battery privacy algorithms that fundamentally differs from previous approaches by maximizing the error between the load demanded by a home and the external load seen by a smart meter. By design, precise load change recovery attacks are impossible. We also propose mutual-information based measurements to evaluate the privacy of different algorithms. We implement and evaluate four novel algorithms using the stepping approach, and show that under the mutual-information metrics they outperform BE and NILL.