A Hybrid Cryptography Scheme for NILM Data Security
Using fine-grained data analysis, non-invasive load monitoring (NILM) can reveal the detail of electricity customers’ habits, which is helpful in the improvement of refined management and better user experience. However, the possibility of electricity customers’ privacy leak is also gradually increa...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-07-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/7/1128 |
id |
doaj-93f8e7151f16408f82a491b11a11454d |
---|---|
record_format |
Article |
spelling |
doaj-93f8e7151f16408f82a491b11a11454d2020-11-25T03:42:14ZengMDPI AGElectronics2079-92922020-07-0191128112810.3390/electronics9071128A Hybrid Cryptography Scheme for NILM Data SecurityRuijue Feng0Zhidong Wang1Zhifeng Li2Haixia Ma3Ruiyuan Chen4Zhengbin Pu5Ziqiu Chen6Xianyu Zeng7School of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaResearch Center of Smart Energy Technology, School of Electric Power, South China University of Technology, Guangzhou 510640, ChinaSchool of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaSchool of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaCollege of Engineering, South China Agriculture University, Guangzhou 510642, ChinaResearch Center of Smart Energy Technology, School of Electric Power, South China University of Technology, Guangzhou 510640, ChinaSchool of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaSchool of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaUsing fine-grained data analysis, non-invasive load monitoring (NILM) can reveal the detail of electricity customers’ habits, which is helpful in the improvement of refined management and better user experience. However, the possibility of electricity customers’ privacy leak is also gradually increasing, and the security of NILM data has become a priority problem to be solved. To protect the privacy disclosure of NILM data, this paper analyzes the NILM privacy leak problems and ways in which information leak occurs faced by NILM data. On the basis of the comprehensive survey of cryptographic algorithms to choose the most appropriate data security method for NILM, a hybrid cryptography scheme was proposed to protect the data security. In the scheme, symmetric algorithm AES (Advanced Encryption Standard) was used to encrypt data for high efficiency, and asymmetric algorithm RSA (<i>Rivest-Shamir-Adleman)</i> was used to encrypt AES key for identity authentication. The classical algorithm HMAC-SHA1 (Hash Message Authentication Codes-Secure Hash Algorithm 1) was further developed to guarantee the integrity of data. By transplanting the algorithm into STM32 MCU (STMicroelectronics 32 bit Micro Controller Unit) for performance test and using Visual studio 2017 + QT tools to develop the test interface, one optimal operation mode was selected for the scheme. At the same time, the effectiveness of the scheme was verified, and the scheme computing cost depended on the efficiency of encryption and decryption, or signature and verification of the RSA algorithm.https://www.mdpi.com/2079-9292/9/7/1128NILMprivacycryptographyhybrid cipher algorithm |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ruijue Feng Zhidong Wang Zhifeng Li Haixia Ma Ruiyuan Chen Zhengbin Pu Ziqiu Chen Xianyu Zeng |
spellingShingle |
Ruijue Feng Zhidong Wang Zhifeng Li Haixia Ma Ruiyuan Chen Zhengbin Pu Ziqiu Chen Xianyu Zeng A Hybrid Cryptography Scheme for NILM Data Security Electronics NILM privacy cryptography hybrid cipher algorithm |
author_facet |
Ruijue Feng Zhidong Wang Zhifeng Li Haixia Ma Ruiyuan Chen Zhengbin Pu Ziqiu Chen Xianyu Zeng |
author_sort |
Ruijue Feng |
title |
A Hybrid Cryptography Scheme for NILM Data Security |
title_short |
A Hybrid Cryptography Scheme for NILM Data Security |
title_full |
A Hybrid Cryptography Scheme for NILM Data Security |
title_fullStr |
A Hybrid Cryptography Scheme for NILM Data Security |
title_full_unstemmed |
A Hybrid Cryptography Scheme for NILM Data Security |
title_sort |
hybrid cryptography scheme for nilm data security |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2020-07-01 |
description |
Using fine-grained data analysis, non-invasive load monitoring (NILM) can reveal the detail of electricity customers’ habits, which is helpful in the improvement of refined management and better user experience. However, the possibility of electricity customers’ privacy leak is also gradually increasing, and the security of NILM data has become a priority problem to be solved. To protect the privacy disclosure of NILM data, this paper analyzes the NILM privacy leak problems and ways in which information leak occurs faced by NILM data. On the basis of the comprehensive survey of cryptographic algorithms to choose the most appropriate data security method for NILM, a hybrid cryptography scheme was proposed to protect the data security. In the scheme, symmetric algorithm AES (Advanced Encryption Standard) was used to encrypt data for high efficiency, and asymmetric algorithm RSA (<i>Rivest-Shamir-Adleman)</i> was used to encrypt AES key for identity authentication. The classical algorithm HMAC-SHA1 (Hash Message Authentication Codes-Secure Hash Algorithm 1) was further developed to guarantee the integrity of data. By transplanting the algorithm into STM32 MCU (STMicroelectronics 32 bit Micro Controller Unit) for performance test and using Visual studio 2017 + QT tools to develop the test interface, one optimal operation mode was selected for the scheme. At the same time, the effectiveness of the scheme was verified, and the scheme computing cost depended on the efficiency of encryption and decryption, or signature and verification of the RSA algorithm. |
topic |
NILM privacy cryptography hybrid cipher algorithm |
url |
https://www.mdpi.com/2079-9292/9/7/1128 |
work_keys_str_mv |
AT ruijuefeng ahybridcryptographyschemefornilmdatasecurity AT zhidongwang ahybridcryptographyschemefornilmdatasecurity AT zhifengli ahybridcryptographyschemefornilmdatasecurity AT haixiama ahybridcryptographyschemefornilmdatasecurity AT ruiyuanchen ahybridcryptographyschemefornilmdatasecurity AT zhengbinpu ahybridcryptographyschemefornilmdatasecurity AT ziqiuchen ahybridcryptographyschemefornilmdatasecurity AT xianyuzeng ahybridcryptographyschemefornilmdatasecurity AT ruijuefeng hybridcryptographyschemefornilmdatasecurity AT zhidongwang hybridcryptographyschemefornilmdatasecurity AT zhifengli hybridcryptographyschemefornilmdatasecurity AT haixiama hybridcryptographyschemefornilmdatasecurity AT ruiyuanchen hybridcryptographyschemefornilmdatasecurity AT zhengbinpu hybridcryptographyschemefornilmdatasecurity AT ziqiuchen hybridcryptographyschemefornilmdatasecurity AT xianyuzeng hybridcryptographyschemefornilmdatasecurity |
_version_ |
1724526314383212544 |