Abstract
Introduction
Internet of things (IoT) enables distant objects to exchange information through the Internet,1,2 which makes IoT play an important role in e-health monitoring, environment monitoring, smart grid, and so on. As the key solution of next generation power system, smart grids provide two-way data exchange, 3 which makes smart grids report users’ power consumption in real time and have control center (CC) quickly make a reasonable power resource scheduling. 4 However, smart grids can greatly improve the utilization of resources and avoid some accidents caused by power resource scheduling.
Each user will install a smart meter (SM), which periodically reports electricity consumption to gateways. In practical applications, efficiency has to be considered, which involves user experience. For example, in the electronic payment scenario of blockchains, Zhang et al.5,6 proposed two blockchain-based fair payment protocols called BPay and BCPay for outsourcing services in cloud computing. The protocol BPay 5 is compatible with the Bitcoin blockchain based on an iterative all-or-nothing checking-proof protocol and a top-down checking method. However, the performance remains to be improved. At the cost of losing the compatibility with the Bitcoin blockchain, the protocol BCPay 6 realizes robust fair payment based on a one round all-or-nothing checking-proof protocol and hence is very efficient in terms of the computation cost and the number of transactions. In addition, it is reasonable to think that the computing power of SMs and gateways is limited. Fortunately, aggregation technology can be used in smart grids, which can greatly reduce the computational load of gateways. However, it is also a very challenging problem to reduce the calculation of SMs.
Users’ electricity consumption involves the user’s personal privacy. 7 For example, if an adversary knows that a user’s electricity consumption has been zero for a long time, he may engage in criminal activities by revealing lifestyle habits of a user. 8 Therefore, users’ electricity consumption and user’s identity should be protected. If the user’s identity is disguised during transmission, the user’s privacy will be further improved. Meanwhile, malicious users should be able to be tracked if they transmit malicious data. Besides, users may modify data to avoid payment. Adversaries may modify data to have the CC make a wrong power resource scheduling. Therefore, in practical applications, the confidentiality and integrity of electricity data are essential. 9 Generally speaking, the encryption mechanism and authentication mechanism are suitable for solving the confidentiality and integrity of data.
To overcome the aforementioned challenges, an efficient and privacy-preserving certificateless data aggregation scheme is presented for IoT-enabled smart grids. The scheme has the following advantages:
The proposed scheme can simultaneously guarantee the confidentiality and integrity of data and the privacy of user identity.
When some users have malicious behaviors, they will be tracked. In addition, the scheme can resist replay attacks, modification attacks, and impersonation attacks.
In the process of collecting data, the computation of encryption and signature generation do not need expensive bilinear pairings. Furthermore, batch verification is used to improve efficiency of verification. The proposed scheme is secure under the random oracle model, and the scheme is efficient because it does not involve bilinear pairings.
Related works
Efficiency and security have always been the concern of academia and industry. Lightweight signature schemes10,11 and efficient encryption schemes12,13 have always been the focus of research. Zhang et al. 10 presented a certificateless signature scheme for data crowdsensing in cloud-assisted industrial IoT. The scheme only needs public channels and is proven secure in the standard model. Karati et al. 11 proposed a new pairing-based certificateless signature scheme without map-to-point function and random oracle model. A framework for constructing efficient code-based encryption schemes was proposed in Aguilar-Melchor et al., 12 which do not hide any structure in their public matrix. Preprocessing technology is applied in Zhang et al., 13 which improves the efficiency of ciphertext generation.
In order to tackle the security issue in smart grids, the key management scheme, 14 key distribution scheme, 15 and authentication scheme 16 have been introduced. However, these schemes do not protect the privacy of users’ electricity consumption. In order to protect the privacy of users’ electricity consumption, users’ electricity consumption can be encrypted in the process of transmission. In order to improve efficiency, data aggregation technology17–19 has been used in smart grids. The encrypted data are aggregated by the gateway and then transmitted to the CC. However, in the stage of power collection, SMs need a lot of calculation, which is because there are many linear pairings that need to be computed. In data aggregation, some homomorphic encryption schemes20,21 are proposed. Gateway can aggregate ciphertext without decrypting ciphertext.
The organization of this article
This article is organized through the following structure: the preliminary of the article is first introduced; then, the model of the scheme is defined; after that, the concrete scheme and security proof as well as analysis are given; next, the performance analysis of the scheme is presented; and finally, the summary of the article is arrived.
Preliminary
The elliptic curve cryptosystem (ECC), elliptic curve discrete logarithm problem (ECDLP), and computational Diffie–Hellman problem (CDHP) assumptions are introduced in this section. ECC is widely used in cryptographic algorithms because of its low computational and communication costs.
Suppose that a prime number
Let 0 be an infinite point, such that it satisfies equation
If
If
Scalar multiplication on elliptic curves
Definition 1
ECDLP is defined as follows: two random points
Definition 2
CDHP is defined as follows: two random points
System model
In this section, the system architecture, security model, and design goal are introduced as follows.
System architecture
Our scheme involves four entities as Figure 1 whose roles are as follows:
Key generation center (KGC): the KGC generates the partial secret key for each SM and gateway (GW). In addition, KGC is credible.
CC: the CC has powerful computing power, and can verify and decrypt the data from GWs. Then, some analysis and decisions can be made by analyzing data. In addition, CC can generate the pseudoidentity for SM and GW. In addition, CC is credible.
GW: the GW validates the data sent by SMs and aggregates data from SMs, then signs the aggregated data and sends the aggregated data and its signature to CC.
SM: every user is equipped with an SM. SM is used to collect users’ electricity consumption, encrypt and sign it, and periodically reports them to GW. Each user in the system installs an SM, so the users and SMs are the same.

System architecture.
Security model
In our security model, KGC and CC are trusted because the system is initialized by them. GW is honest but curious, which follows protocols honestly and is curious about the data privacy of SM. Suppose that the time of participants in the system is synchronous.
There is an adversary
Design goal
In order to prevent the adversary from destroying the integrity and confidentiality of data and some wrong operations. The following security requirements should be met:
Confidentiality and integrity of data: in order to ensure the confidentiality and integrity of any data, no adversaries can know the user’s electricity consumption. In order to ensure the integrity of the data, accepted data should be validated.
Identity privacy preservation: user’s identity should be confidential and receivers cannot judge the owner of the data by analyzing the received data.
Traceability and unlinkability: although the user’s identity is hidden, CC can trace the user’s real identity under certain conditions.
Resistance to attacks: the proposed scheme should be able to resist replay attacks, modification attacks, and impersonation attacks.
Proposed scheme
Overview
Our scheme consists of the following algorithms:
System initialization
System initialization is executed by KGC and CC through the following steps:
Given a security parameter
KGC picks up a point
CC picks up a point
KGC selects three anti-collision hash functions:
Pseudoidentity generation
When CC receives
Through the above steps,
Partial secret key generation
Through the above steps,
Secret key generation
After receiving
After receiving
Individual encryption and signing
After collecting data
Individual encryption: after collecting data
Data signature:
Sending data:
Data aggregation
After receiving the data
Single verification: after receiving data
Batch verification: to improve the efficiency of verification,
Aggregating individual data: after the validity check,
Signature of aggregated data:
Sending aggregated data:
Data decryption
After receiving the data
Single verification: after receiving data
Batch verification: to improve the efficiency of verification, CC can execute the batch verification by the equation
Data decryption: if
Security proof
The security proof of the scheme is given in this section. In our scheme, the confidentiality of data is guaranteed by the ElGamal encryption mechanism. Data integrity is guaranteed by signature mechanism. As long as the signature cannot be forged, our scheme will be secure. So, here we only prove that the signature is unforgeable, and the details can be referred to the scheme. 22 The unforgeability of the scheme is proved as follows.
Theorem 1
In the random oracle model, the certificateless signature scheme is unforgeable under the ECDLP assumption.
Lemma 1
Under the random oracle model, a polynomial time adversary
Proof
Suppose an adversary
Setup:
Partial-Secret-Key query: when
Create-User query: suppose that the adversary
When
When
Secret-Key query: suppose that the adversary
When
When
Sign query: when the signature on the message
According to the Forking Lemma,
23
As a result, the ECDLP assumption can be broken by
Security analysis
In the section, the security analysis of the scheme is given as follows:
Confidentiality and integrity of data: in the last section, the signature’s unforgeability on ciphertext has been proved, which guarantees the integrity of the ciphertext. The confidentiality of ciphertext is guaranteed by the ElGamal encryption mechanism.
Identity privacy preservation: in the proposed scheme, the pseudonym mechanism is used, and the receivers cannot judge the owner of the data by the received data.
Traceability and unlinkability: CC can trace the real identity of GW according to the pseudoidentity
Resistance to attacks: our scheme can resist replay attacks, modification attacks, and impersonation attacks. Because the timestamp is included in the message
Performance analysis
In the section, we compare our scheme with data aggregation schemes24,25 in terms of computational efficiency. It is reasonable to believe that CC and KGC have powerful computing power and storage capability, SM has limited computation power, and GW has stronger computing power than SM. Therefore, only the individual encryption and signing phase and the data aggregation phase are compared. For convenience, the time of some operations is marked in Table 1.
Definition of notation.
ECC: elliptic curve cryptosystem.
The comparisons on the individual encryption and signing phase and the data aggregation phase between our scheme and schemes secure privacy-preserving data aggregation (SPPDA) 24 and efficient and privacy-preserving data aggregation (EPPDA) 25 are shown in Table 2.
Comparison of computational costs in the individual operation phase and the data aggregation phase.
SPPDA: secure privacy-preserving data aggregation; EPPDA: efficient and privacy-preserving data aggregation.
In order to be more intuitive and accurate, performance evaluation is implemented on a unified platform, where the security parameter of elliptic curve is 256 bits and the prime number of the small scalar multiplication on the elliptic curve is 80 bits. As can be shown from Figures 2 and 3, our scheme outperforms aggregation schemes24,25 in the individual encryption and signing phase and the data aggregation phase. That is because there are no linear pairing and exponential operations involved in our scheme. Based on the above analysis, it can seen that the presented scheme is efficient. Therefore, our scheme has great application prospects in resource-constrained smart grid terminals.

Comparison of computational costs in the individual encryption and signing phase.

Comparison of computational costs in the data aggregation phase.
Conclusion
As the key solution of next generation power system, smart grid can bring great convenience to our life. However, in the deployment of smart grid, security and efficiency issues have to face challenges. In this article, an efficient and privacy-preserving certificateless data aggregation scheme is presented for IoT-enabled smart grids to tackle the security, privacy, and efficiency problems in smart grids. Security proof and analysis show that the presented scheme achieves the design goals. At the same time, the performance analysis shows that the performance of the scheme is excellent.
In the next work, we are going to improve the communication cost of the system. Smaller computation and lower communication costs will be more conducive to the deployment of smart grids.
