A Hybrid Cryptography Scheme for NILM Data Security

Using fine-grained data analysis, non-invasive load monitoring (NILM) can reveal the detail of electricity customers’ habits, which is helpful in the improvement of refined management and better user experience. However, the possibility of electricity customers’ privacy leak is also gradually increa...

Full description

Bibliographic Details
Main Authors: Ruijue Feng, Zhidong Wang, Zhifeng Li, Haixia Ma, Ruiyuan Chen, Zhengbin Pu, Ziqiu Chen, Xianyu Zeng
Format: Article
Language:English
Published: MDPI AG 2020-07-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/9/7/1128
id doaj-93f8e7151f16408f82a491b11a11454d
record_format Article
spelling doaj-93f8e7151f16408f82a491b11a11454d2020-11-25T03:42:14ZengMDPI AGElectronics2079-92922020-07-0191128112810.3390/electronics9071128A Hybrid Cryptography Scheme for NILM Data SecurityRuijue Feng0Zhidong Wang1Zhifeng Li2Haixia Ma3Ruiyuan Chen4Zhengbin Pu5Ziqiu Chen6Xianyu Zeng7School of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaResearch Center of Smart Energy Technology, School of Electric Power, South China University of Technology, Guangzhou 510640, ChinaSchool of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaSchool of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaCollege of Engineering, South China Agriculture University, Guangzhou 510642, ChinaResearch Center of Smart Energy Technology, School of Electric Power, South China University of Technology, Guangzhou 510640, ChinaSchool of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaSchool of Electrical Engineering, Guangzhou College of South China University of Technology, Guangzhou 510800, ChinaUsing fine-grained data analysis, non-invasive load monitoring (NILM) can reveal the detail of electricity customers’ habits, which is helpful in the improvement of refined management and better user experience. However, the possibility of electricity customers’ privacy leak is also gradually increasing, and the security of NILM data has become a priority problem to be solved. To protect the privacy disclosure of NILM data, this paper analyzes the NILM privacy leak problems and ways in which information leak occurs faced by NILM data. On the basis of the comprehensive survey of cryptographic algorithms to choose the most appropriate data security method for NILM, a hybrid cryptography scheme was proposed to protect the data security. In the scheme, symmetric algorithm AES (Advanced Encryption Standard) was used to encrypt data for high efficiency, and asymmetric algorithm RSA (<i>Rivest-Shamir-Adleman)</i> was used to encrypt AES key for identity authentication. The classical algorithm HMAC-SHA1 (Hash Message Authentication Codes-Secure Hash Algorithm 1) was further developed to guarantee the integrity of data. By transplanting the algorithm into STM32 MCU (STMicroelectronics 32 bit Micro Controller Unit) for performance test and using Visual studio 2017 + QT tools to develop the test interface, one optimal operation mode was selected for the scheme. At the same time, the effectiveness of the scheme was verified, and the scheme computing cost depended on the efficiency of encryption and decryption, or signature and verification of the RSA algorithm.https://www.mdpi.com/2079-9292/9/7/1128NILMprivacycryptographyhybrid cipher algorithm
collection DOAJ
language English
format Article
sources DOAJ
author Ruijue Feng
Zhidong Wang
Zhifeng Li
Haixia Ma
Ruiyuan Chen
Zhengbin Pu
Ziqiu Chen
Xianyu Zeng
spellingShingle Ruijue Feng
Zhidong Wang
Zhifeng Li
Haixia Ma
Ruiyuan Chen
Zhengbin Pu
Ziqiu Chen
Xianyu Zeng
A Hybrid Cryptography Scheme for NILM Data Security
Electronics
NILM
privacy
cryptography
hybrid cipher algorithm
author_facet Ruijue Feng
Zhidong Wang
Zhifeng Li
Haixia Ma
Ruiyuan Chen
Zhengbin Pu
Ziqiu Chen
Xianyu Zeng
author_sort Ruijue Feng
title A Hybrid Cryptography Scheme for NILM Data Security
title_short A Hybrid Cryptography Scheme for NILM Data Security
title_full A Hybrid Cryptography Scheme for NILM Data Security
title_fullStr A Hybrid Cryptography Scheme for NILM Data Security
title_full_unstemmed A Hybrid Cryptography Scheme for NILM Data Security
title_sort hybrid cryptography scheme for nilm data security
publisher MDPI AG
series Electronics
issn 2079-9292
publishDate 2020-07-01
description Using fine-grained data analysis, non-invasive load monitoring (NILM) can reveal the detail of electricity customers’ habits, which is helpful in the improvement of refined management and better user experience. However, the possibility of electricity customers’ privacy leak is also gradually increasing, and the security of NILM data has become a priority problem to be solved. To protect the privacy disclosure of NILM data, this paper analyzes the NILM privacy leak problems and ways in which information leak occurs faced by NILM data. On the basis of the comprehensive survey of cryptographic algorithms to choose the most appropriate data security method for NILM, a hybrid cryptography scheme was proposed to protect the data security. In the scheme, symmetric algorithm AES (Advanced Encryption Standard) was used to encrypt data for high efficiency, and asymmetric algorithm RSA (<i>Rivest-Shamir-Adleman)</i> was used to encrypt AES key for identity authentication. The classical algorithm HMAC-SHA1 (Hash Message Authentication Codes-Secure Hash Algorithm 1) was further developed to guarantee the integrity of data. By transplanting the algorithm into STM32 MCU (STMicroelectronics 32 bit Micro Controller Unit) for performance test and using Visual studio 2017 + QT tools to develop the test interface, one optimal operation mode was selected for the scheme. At the same time, the effectiveness of the scheme was verified, and the scheme computing cost depended on the efficiency of encryption and decryption, or signature and verification of the RSA algorithm.
topic NILM
privacy
cryptography
hybrid cipher algorithm
url https://www.mdpi.com/2079-9292/9/7/1128
work_keys_str_mv AT ruijuefeng ahybridcryptographyschemefornilmdatasecurity
AT zhidongwang ahybridcryptographyschemefornilmdatasecurity
AT zhifengli ahybridcryptographyschemefornilmdatasecurity
AT haixiama ahybridcryptographyschemefornilmdatasecurity
AT ruiyuanchen ahybridcryptographyschemefornilmdatasecurity
AT zhengbinpu ahybridcryptographyschemefornilmdatasecurity
AT ziqiuchen ahybridcryptographyschemefornilmdatasecurity
AT xianyuzeng ahybridcryptographyschemefornilmdatasecurity
AT ruijuefeng hybridcryptographyschemefornilmdatasecurity
AT zhidongwang hybridcryptographyschemefornilmdatasecurity
AT zhifengli hybridcryptographyschemefornilmdatasecurity
AT haixiama hybridcryptographyschemefornilmdatasecurity
AT ruiyuanchen hybridcryptographyschemefornilmdatasecurity
AT zhengbinpu hybridcryptographyschemefornilmdatasecurity
AT ziqiuchen hybridcryptographyschemefornilmdatasecurity
AT xianyuzeng hybridcryptographyschemefornilmdatasecurity
_version_ 1724526314383212544