Analysis of Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems

From ancient time, electric grid system developed as one way direction in which users get the electricity from generators to far end. However, it is not the consumer centric as its one way process and consumer have no way to communicate to the server. Thus, with the development of digital revolution, the grid converted to smart grid and meter converted to smart meter. In smart grid, the protocol follows the bidirectional way of communication with support of consumers in the system. Recently in 2016, Jo et al. proposed the scheme for smart grid system using privacy preserving model and claimed to be efficient and secure. However, in this paper we have analyzed the scheme of Jo et al. and proved that the scheme is vulnerable to Replay attack and afterwards shows the change in protocol to withstand against this attack.


I. INTRODUCTION (HEADING 1)
From beginning of the revolution in technology, the prime requirement for fulfillment and success of it depends on the several required parameters.One of the prime parameter is electricity due to which the evolution of technology is possible and up till now furnishing in extreme speed.With evolution of technology, indeed need of converting energy in smart energy, grid to smart grid, meter to smart meter is become prime requirements.In Fig 1, we have given the traditional power grid system.This system is broadly divided into three phases i.e. power generation, transmission grid and distribution grid.In power generation phase, the power will be generated through various resources like conventional and nonconventional i.e. solar plane, coal plant, nuclear plant, oil plant etc.The power generated from earlier phase will be transmitted through various medium which range from meters to hundreds of kilometers in reality.Finally, the power reached to the end users i.e. residential users, commercial users, industrial users etc.This traditional model is used for several years.However, in this scenario, the end users have no control of asking demand and supply to the specific needs.
This problem lead to the concept of smart grid network in which several data control unit (DCU) is deployed which in turn contains smart meters.All these smart meters are initially gets registered with the trusted authorities as to provide the authentication.This phenomenon is pictorially depicted in In this line, many researchers have proposed as well analyzed the smart meters using techniques like data mining, privacy preserving, machine learning, security etc. Readers can find the more details on this in [3][4][5][6][7][8][9][10][11][12][13][14][15][16].Recently Jo et al. in [1], proposed the effective privacy preserving based scheme for smart grid and claimed to be secure too.However, in this paper we proved that the scheme is yet vulnerable to replay attack due to misuse of timestamp as given by the authors.
Organization of paper: in section 2, we have given the view of Jo et al scheme.In section 3, we have analyzed the scheme of Jo et al and proposed the changes in protocol to avoid the replay attack.In section 4, we have concluded with future scope in the smart grid.Finally, references are at the end.

CONCLUSION AND FUTURE WORK
In this paper, we have explained the utilization of smart grid, smart meter as well as smart infrastructure to deploy the smart energy.We have taken the recent paper to analyzed and prove that it's susceptible to replay attack and afterwards give the update which can remove this problem.In future work, one can device the scheme having better performance as well as more secure as to its predecessors.

Fig 4 .
The overall diagram of smart meter is depicted in Fig 3.The overall diagram of micro grid is depicted in Fig 2.

Figure 5
Figure 5 Protocol by Jo et al [1]

Figure 6Proposed Approach
Figure 6Proposed Approach