171,391 research outputs found

    Smart Meter Privacy: A Utility-Privacy Framework

    Full text link
    End-user privacy in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far have been tied to specific technologies such as batteries or assumptions on data usage. Existing solutions have also not quantified the loss of benefit (utility) that results from any such privacy-preserving approach. Using tools from information theory, a new framework is presented that abstracts both the privacy and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem with minimal assumptions that is tractable. Specifically for a stationary Gaussian Markov model of the electricity load, it is shown that the optimal utility-and-privacy preserving solution requires filtering out frequency components that are low in power, and this approach appears to encompass most of the proposed privacy approaches.Comment: Accepted for publication and presentation at the IEEE SmartGridComm. 201

    Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints

    Full text link
    A smart meter (SM) periodically measures end-user electricity consumption and reports it to a utility provider (UP). Despite the advantages of SMs, their use leads to serious concerns about consumer privacy. In this paper, SM privacy is studied by considering the presence of an energy harvesting device (EHD) as a means of masking the user's input load. The user can satisfy part or all of his/her energy needs from the EHD, and hence, less information can be leaked to the UP via the SM. The EHD is typically equipped with a rechargeable energy storage device, i.e., a battery, whose instantaneous energy content limits the user's capability in covering his/her energy usage. Privacy is measured by the information leaked about the user's real energy consumption when the UP observes the energy requested from the grid, which the SM reads and reports to the UP. The minimum information leakage rate is characterized as a computable information theoretic single-letter expression when the EHD battery capacity is either infinite or zero. Numerical results are presented for a discrete binary input load to illustrate the potential privacy gains from the existence of a storage device.Comment: To be published in IEEE ICC201

    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

    Get PDF
    Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations
    • …
    corecore