This document proposes a privacy-friendly load scheduling infrastructure for smart grids. It includes domestic appliances, home gateways, schedulers, and a configurator. Appliances generate scheduling requests that gateways anonymize and route to schedulers using secret sharing techniques. Schedulers attribute starting times to requests while preserving privacy through secure multi-party computation. The approach provides anonymity for users and appliances while allowing efficient energy balancing compared to optimal solutions. Numerical tests over a year of data show the privacy-preserving approach introduces only modest extra delays.
How Robinhood Built a Real-Time Anomaly Detection System to Monitor and Mitig...InfluxData
Robinhood is democratizing the financial systems by offering commission-free investing and trading with the use of your phone or desktop. As exciting as that sounds to the outside world, internally, the team at Robinhood must understand the different risk vectors and build engineering solutions to mitigate these risks. In this talk, Allison will talk about how they build a real-time risk monitoring system with InfluxDB and Faust, an open-source Python stream processing library. She will review the architecture behind the system which will involve both the time series anomaly detection part (InfluxDB) and the real-time stream processing part (Faust/Kafka).
This University of Washington Bothell capstone project involved the design and implementation of a system where a user can capture 360° scans of an indoor environment in 3D using a MicroVision LiDAR sensor. The user can view the result in our custom-built website or their own point cloud viewer. Our industrial sponsor, MicroVision, had recently begun to market their new indoor LiDAR sensors and they wanted a system that they can use to show potential customers the capabilities of their new LiDAR. Our project included writing software to process, filter, stitch, and view the data. Our prototype processed the data from the sensor and displayed it on the website. A rotating platform was implemented to autonomously rotate the sensor 360° to capture data hands-free. A system to portably power the system was also designed. Our prototype is operated wirelessly through the ‘cloud’.
How Robinhood Built a Real-Time Anomaly Detection System to Monitor and Mitig...InfluxData
Robinhood is democratizing the financial systems by offering commission-free investing and trading with the use of your phone or desktop. As exciting as that sounds to the outside world, internally, the team at Robinhood must understand the different risk vectors and build engineering solutions to mitigate these risks. In this talk, Allison will talk about how they build a real-time risk monitoring system with InfluxDB and Faust, an open-source Python stream processing library. She will review the architecture behind the system which will involve both the time series anomaly detection part (InfluxDB) and the real-time stream processing part (Faust/Kafka).
This University of Washington Bothell capstone project involved the design and implementation of a system where a user can capture 360° scans of an indoor environment in 3D using a MicroVision LiDAR sensor. The user can view the result in our custom-built website or their own point cloud viewer. Our industrial sponsor, MicroVision, had recently begun to market their new indoor LiDAR sensors and they wanted a system that they can use to show potential customers the capabilities of their new LiDAR. Our project included writing software to process, filter, stitch, and view the data. Our prototype processed the data from the sensor and displayed it on the website. A rotating platform was implemented to autonomously rotate the sensor 360° to capture data hands-free. A system to portably power the system was also designed. Our prototype is operated wirelessly through the ‘cloud’.
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
Research Methodology Presentation - Research in Supply Chain Digital TwinsArwa Abougharib
Slide deck prepared for a post-graduate course ' ESM 600 - Research Methodology', introducing the research methodology and plan.
Program: Masters in Engineering Systems Management
Affiliation: American University of Sharjah, College of Engineering, Department of Industrial Engineering
Show and Tell - Data and Digitalisation, Digital Twins.pdfSIFOfgem
This is the third in a series of 'Show and Tell' webinars from the Ofgem Strategic Innovation Fund Discovery phase, covering the Digital Twin projects.
As the move towards a net zero energy system accelerates, network customers and consumers will require simplified and accessible digital products, processes and services that can improve their user experience. Data and digital initiatives are already beginning to show the potential to improve the efficiency of energy networks whilst making it easier for third parties to interact with and innovate for the energy system. Digitalisation of energy network activities will contribute to better coordination, planning and network optimisation.
You will hear from SIF projects which are investigating new digital products and services such as digital twins.
The Strategic Innovation Fund (SIF) is an Ofgem programme managed in partnership with Innovate UK, part of UKRI. The SIF aims to fund network innovation that will contribute to achieving Net Zero rapidly and at lowest cost to consumers, and help transform the UK into the ‘Silicon Valley’ of energy, making it the best place for high-potential businesses to grow and scale in the energy market.
For more information on the SIF visit: www.ofgem.gov.uk/sif
Or sign-up for our newsletter here: https://ukri.innovateuk.org/ofgem-sif-subscription-sign-up
smart grid is not a single concept but rather a combination of technologies and methods intended to modernize the existing grid in order to improve flexibility, availability, energy efficiency, and costs
An embedded system's input devices have quite limited capabilities. Since there won't be an input device or mouse, as there are in computer systems, interacting with the embedded system won't be simple. Input devices for user interaction are absent from numerous embedded systems used in process control. They receive input from transmitters or detectors that will generate electrical signals which are fed to other mechanisms.
The capabilities of the embedded systems' external devices are also extremely constrained. A few LEDs may be present in some embedded systems to show the modules' overall health or to signal alarms visually. Some important aspects may also be displayed on LCDs.Embedded systems are widely used in a variety of industries. Due to the wide range of applications for these systems, the embedded system market is one of the most dynamic.
Consumer devices, process automation, medical technology, wireless and data communication, the military, automotive, and aerospace, as well as household appliances are all examples of this.
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the "collaborative intelligent transport system") and how the security measures are evaluated with an specific architectural view.
CE1009_Implementation of Civil IoT Architecture.pdfChenkai Sun
Billions of interconnected Internet-of-Things (IoT) devices collect huge amounts of real-time data. However, this massive stream of data presents technical challenges for processing and analysis and the digital gap between urban and rural areas is also a critical consideration. A powerful platform is crucial to cost-effectively and efficiently process such massive collections of messages. This work introduces the civil IoT architecture in Taiwan including the dedicated B20 spectrum, backbone network facilities, and a scalable data platform. The proposed system operates in Taiwan for IoT applications with real cases. In the experiment, we demonstrate the performance of signal coverage, throughput, real-time query and visualization, and a monitoring mechanism. The results showed that the presented architecture is efficient and effective for dealing with IoT scenarios in a cost-effective approach.
Show and Tell - Data and Digitalisation, Gas Network Asset Monitoring and Ana...SIFOfgem
This is the fourth in a series of 'Show and Tell' webinars from the Ofgem Strategic Innovation Fund Round 1 Discovery phase, covering the gas network asset monitoring and analysis projects.
As the move towards a net zero energy system accelerates, network customers and consumers will require simplified and accessible digital products, processes and services that can improve their user experience. Data and digital initiatives are already beginning to show the potential to improve the efficiency of energy networks whilst making it easier for third parties to interact with and innovate for the energy system. Digitalisation of energy network activities will contribute to better coordination, planning and network optimisation.
You will hear from SIF projects which are investigating new digital products and services such as enhancing network fault data through artificial intelligence (AI) and machine learning.
The Strategic Innovation Fund (SIF) is an Ofgem programme managed in partnership with Innovate UK, part of UKRI. The SIF aims to fund network innovation that will contribute to achieving Net Zero rapidly and at lowest cost to consumers, and help transform the UK into the ‘Silicon Valley’ of energy, making it the best place for high-potential businesses to grow and scale in the energy market.
For more information on the SIF visit: www.ofgem.gov.uk/sif
Or sign-up for our newsletter here: https://ukri.innovateuk.org/ofgem-sif-subscription-sign-up
Smart Grid, Smart Metering and CybersecurityDavid Wallom
Presentation of Smart Metering and Energy with discussion around cybersecurity of these and other critical national infrastructure during Wolfson College event
Implementation ans analysis_of_quic_for_mqttPuneet Kumar
Transport and security protocols are essential to ensure reliable and secure communication between two parties. For IoT applications, these protocols must be lightweight, since IoT devices are usually resource constrained. Unfortunately, the existing transport and security protocols – namely TCP/TLS and UDP/DTLS – fall short in terms of connection overhead, latency, and connection migration when used in IoT applications. In this paper, after studying the root causes of these shortcomings, we show how utilizing QUIC in IoT scenarios results in a higher performance. Based on these observations, and given the popularity of MQTT as an IoT application layer protocol, we integrate MQTT with QUIC. By presenting the main APIs and functions developed, we explain how connection establishment and message exchange functionalities work. We evaluate the performance of MQTTw/QUIC versus MQTTw/TCP using wired, wireless, and long-distance testbeds. Our results show that MQTTw/QUIC reduces connection overhead in terms of the number of packets exchanged with the broker by up to 56%. In addition, by eliminating half-open connections, MQTTw/QUIC reduces processor and memory usage by up to 83% and 50%, respectively. Furthermore, by removing the head-of-line blocking problem, delivery latency is reduced by up to 55%. We also show that the throughput drops experienced by MQTTw/QUIC when a connection migration happens is considerably lower than that of MQTTw/TCP.
#http3 #QUIC #IoT #IoT_Application #Transport_in_IoT #TCP #
Dynamic Line Rating: Principles - Applications - BenefitsLeonardo ENERGY
Video recording at https://youtu.be/xzWoQkVVhFc
This webinar introduces the physics of Dynamic Line Rating (DLR), and calculation methods based on CIGRE and IEEE standards. Various approaches are discussed: direct measurement technologies (sensors) as well as weather model-based simulations. We describe applications implemented by grid operators for some years already. These illustrate how Dynamic Line Rating data have been integrated into grid operators’ tools and processes, in particular how forecasts are used. Furthermore, some analytics will be shared that demonstrate the benefits of Dynamic Line Rating for reducing OPEX and CAPEX. This includes examples on increasing cross-border trading, reducing investment on new line infrastructure and reducing congestions, which helps to make decisions on reinforcement and investment.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
More Related Content
Similar to Privacy-Friendly Appliance Load Scheduling in Smart Grids
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
Research Methodology Presentation - Research in Supply Chain Digital TwinsArwa Abougharib
Slide deck prepared for a post-graduate course ' ESM 600 - Research Methodology', introducing the research methodology and plan.
Program: Masters in Engineering Systems Management
Affiliation: American University of Sharjah, College of Engineering, Department of Industrial Engineering
Show and Tell - Data and Digitalisation, Digital Twins.pdfSIFOfgem
This is the third in a series of 'Show and Tell' webinars from the Ofgem Strategic Innovation Fund Discovery phase, covering the Digital Twin projects.
As the move towards a net zero energy system accelerates, network customers and consumers will require simplified and accessible digital products, processes and services that can improve their user experience. Data and digital initiatives are already beginning to show the potential to improve the efficiency of energy networks whilst making it easier for third parties to interact with and innovate for the energy system. Digitalisation of energy network activities will contribute to better coordination, planning and network optimisation.
You will hear from SIF projects which are investigating new digital products and services such as digital twins.
The Strategic Innovation Fund (SIF) is an Ofgem programme managed in partnership with Innovate UK, part of UKRI. The SIF aims to fund network innovation that will contribute to achieving Net Zero rapidly and at lowest cost to consumers, and help transform the UK into the ‘Silicon Valley’ of energy, making it the best place for high-potential businesses to grow and scale in the energy market.
For more information on the SIF visit: www.ofgem.gov.uk/sif
Or sign-up for our newsletter here: https://ukri.innovateuk.org/ofgem-sif-subscription-sign-up
smart grid is not a single concept but rather a combination of technologies and methods intended to modernize the existing grid in order to improve flexibility, availability, energy efficiency, and costs
An embedded system's input devices have quite limited capabilities. Since there won't be an input device or mouse, as there are in computer systems, interacting with the embedded system won't be simple. Input devices for user interaction are absent from numerous embedded systems used in process control. They receive input from transmitters or detectors that will generate electrical signals which are fed to other mechanisms.
The capabilities of the embedded systems' external devices are also extremely constrained. A few LEDs may be present in some embedded systems to show the modules' overall health or to signal alarms visually. Some important aspects may also be displayed on LCDs.Embedded systems are widely used in a variety of industries. Due to the wide range of applications for these systems, the embedded system market is one of the most dynamic.
Consumer devices, process automation, medical technology, wireless and data communication, the military, automotive, and aerospace, as well as household appliances are all examples of this.
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the "collaborative intelligent transport system") and how the security measures are evaluated with an specific architectural view.
CE1009_Implementation of Civil IoT Architecture.pdfChenkai Sun
Billions of interconnected Internet-of-Things (IoT) devices collect huge amounts of real-time data. However, this massive stream of data presents technical challenges for processing and analysis and the digital gap between urban and rural areas is also a critical consideration. A powerful platform is crucial to cost-effectively and efficiently process such massive collections of messages. This work introduces the civil IoT architecture in Taiwan including the dedicated B20 spectrum, backbone network facilities, and a scalable data platform. The proposed system operates in Taiwan for IoT applications with real cases. In the experiment, we demonstrate the performance of signal coverage, throughput, real-time query and visualization, and a monitoring mechanism. The results showed that the presented architecture is efficient and effective for dealing with IoT scenarios in a cost-effective approach.
Show and Tell - Data and Digitalisation, Gas Network Asset Monitoring and Ana...SIFOfgem
This is the fourth in a series of 'Show and Tell' webinars from the Ofgem Strategic Innovation Fund Round 1 Discovery phase, covering the gas network asset monitoring and analysis projects.
As the move towards a net zero energy system accelerates, network customers and consumers will require simplified and accessible digital products, processes and services that can improve their user experience. Data and digital initiatives are already beginning to show the potential to improve the efficiency of energy networks whilst making it easier for third parties to interact with and innovate for the energy system. Digitalisation of energy network activities will contribute to better coordination, planning and network optimisation.
You will hear from SIF projects which are investigating new digital products and services such as enhancing network fault data through artificial intelligence (AI) and machine learning.
The Strategic Innovation Fund (SIF) is an Ofgem programme managed in partnership with Innovate UK, part of UKRI. The SIF aims to fund network innovation that will contribute to achieving Net Zero rapidly and at lowest cost to consumers, and help transform the UK into the ‘Silicon Valley’ of energy, making it the best place for high-potential businesses to grow and scale in the energy market.
For more information on the SIF visit: www.ofgem.gov.uk/sif
Or sign-up for our newsletter here: https://ukri.innovateuk.org/ofgem-sif-subscription-sign-up
Smart Grid, Smart Metering and CybersecurityDavid Wallom
Presentation of Smart Metering and Energy with discussion around cybersecurity of these and other critical national infrastructure during Wolfson College event
Implementation ans analysis_of_quic_for_mqttPuneet Kumar
Transport and security protocols are essential to ensure reliable and secure communication between two parties. For IoT applications, these protocols must be lightweight, since IoT devices are usually resource constrained. Unfortunately, the existing transport and security protocols – namely TCP/TLS and UDP/DTLS – fall short in terms of connection overhead, latency, and connection migration when used in IoT applications. In this paper, after studying the root causes of these shortcomings, we show how utilizing QUIC in IoT scenarios results in a higher performance. Based on these observations, and given the popularity of MQTT as an IoT application layer protocol, we integrate MQTT with QUIC. By presenting the main APIs and functions developed, we explain how connection establishment and message exchange functionalities work. We evaluate the performance of MQTTw/QUIC versus MQTTw/TCP using wired, wireless, and long-distance testbeds. Our results show that MQTTw/QUIC reduces connection overhead in terms of the number of packets exchanged with the broker by up to 56%. In addition, by eliminating half-open connections, MQTTw/QUIC reduces processor and memory usage by up to 83% and 50%, respectively. Furthermore, by removing the head-of-line blocking problem, delivery latency is reduced by up to 55%. We also show that the throughput drops experienced by MQTTw/QUIC when a connection migration happens is considerably lower than that of MQTTw/TCP.
#http3 #QUIC #IoT #IoT_Application #Transport_in_IoT #TCP #
Dynamic Line Rating: Principles - Applications - BenefitsLeonardo ENERGY
Video recording at https://youtu.be/xzWoQkVVhFc
This webinar introduces the physics of Dynamic Line Rating (DLR), and calculation methods based on CIGRE and IEEE standards. Various approaches are discussed: direct measurement technologies (sensors) as well as weather model-based simulations. We describe applications implemented by grid operators for some years already. These illustrate how Dynamic Line Rating data have been integrated into grid operators’ tools and processes, in particular how forecasts are used. Furthermore, some analytics will be shared that demonstrate the benefits of Dynamic Line Rating for reducing OPEX and CAPEX. This includes examples on increasing cross-border trading, reducing investment on new line infrastructure and reducing congestions, which helps to make decisions on reinforcement and investment.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Privacy-Friendly Appliance Load Scheduling in Smart Grids
1. Privacy-Friendly Appliance Load Scheduling
in Smart Grids
Cristina Rottondi and Giacomo Verticale
Politecnico di Milano, Dipartimento di Elettronica, Informazione e Bioingegneria
2. Outline
2
Load Scheduling
Privacy Issues in the Smart Grid
The Privacy-Preserving Scheduling Infrastructure
Attacker model and security properties
Performance assessment
Conclusions
Cristina Rottondi
3. Energy Balancing Issues in Smart Grids
4
Distributed Renewable Energy Sources (RESes) are
variable over time
Massive introduction of RESes makes it more difficult
worsens to manage the balancing of energy production
and consumption
Different approaches to increase flexibility in energy
utilization, among which:
• Introduction of high capacity storage banks
• Consumption profile undirect shaping by means of time
variable tariffs
• Consumption profile direct shaping by means of
scheduling deferrable domestic appliances
Cristina Rottondi
4. Load Scheduling in Smart Grid
5
Assumptions
RESes inject at will
Consumption by deferrable, uninterruptible appliances
must be satisfied by available RESes
Households communicate service requests and the
centralized scheduler communicates the starting delay
Goal
scheduling of the starting times of deferrable domestic
appliances in a set of houses according to the
availability of RES
Cristina Rottondi
6. Privacy issues in load scheduling
7
User must communicate to the schedulers:
• The appliance time of use
– Discloses information about personal habits
• The appliance load profile
– Makes the system prone to Non-Intrusive Load
Monitoring attacks (NILM)
We describe a privacy-friendly scheduling architecture for
deferrable appliances within a neighborhood ensuring
• Anonymity of the users generating the scheduling requests
• Non-disclosure of the appliances’ energy consumption
patterns
Cristina Rottondi
7. The privacy-friendly load scheduling
infrastructure
8
Includes:
• Set A of domestic
deferrable
Appliances
• Set G of home
Gateways
• Set I of w
Schedulers
• Configurator
Cristina Rottondi
8. The privacy-friendly load scheduling
infrastructure
9
Includes:
• Set A of domestic
deferrable
Appliances
• Set G of home
Gateways
• Set I of w
Schedulers
• Configurator
Appliances: generate
the scheduling
requests
Cristina Rottondi
9. The privacy-friendly load scheduling
infrastructure
10
Includes:
• A set A of
domestic
deferrable
Appliances
• A set G of home
Gateways
• A set I of w
Schedulers
• A Configurator
Gateways: provide
communication and
encryption capabilities
Cristina Rottondi
10. The privacy-friendly load scheduling
infrastructure
11
Includes:
• Set A of domestic
deferrable
Appliances
• Set G of home
Gateways
• Set I of w
Schedulers
• Configurator
Schedulers: attribute
a starting time to
each service request
Cristina Rottondi
11. The privacy-friendly load scheduling
infrastructure
12
Includes:
• Set A of domestic
deferrable
Appliances
• Set G of home
Gateways
• Set I of w
Schedulers
• Configurator
Configurator:
provides to the nodes
the PKI parameters
Cristina Rottondi
12. Attacker model and security properties
13
Gateways and Schedulers are honest-but-curious:
• They execute the protocol correctly
• They try to infer the identities of the users initiating service
requests and the corresponding Appliance type
• They can create collusions
Security properties:
• Obliviousness: a collusion of any number of Gateways
obtains no information about the load pattern of non-local
Appliances
• t-blindness: a collusion of less than t Schedulers obtains
no information about the load pattern of the Appliances
• c-sender anonymity: a collusion of at most c Gateways
and any number of Schedulers cannot associate a request
to the identity of the user whose Appliance generated it
Cristina Rottondi
13. Background: Shamir Secret Sharing scheme
14
Shamir Secret Sharing scheme (SSS) allows to split a
secret among parties
The secret is split in w shares and can be recovered if at
least t ≤ w parties cooperate
Thanks to its homomorphic properties, some arithmetic
operations can be performed directly on the shares
Depending on the type of operation, intermediate
interactions among the parties might be required
• Addition can be performed locally (cheap)
• Comparison to constant requires multiple rounds
(expensive)
Cristina Rottondi
14. Basic principles – Anonymous routing of
scheduling requests
15
Appliance a sends to the local Gateway a vector V(t) of its
sampled load profile
The Gateway divides the vector in w vectors Si (1≤i ≤ w)
using SSS
Each vector is associated to a random tag r, encrypted
with the public key ki of Scheduler i and conveyed to it by
means of the anonymous routing protocol Crowds
• With probability p the Gateway
forwards its request to another
Gateway, otherwise to the
Scheduler
Cristina Rottondi
15. Basic principles – privacy preserving load
scheduling
16
The Schedulers know a vector T(t) of the energy supply
pattern for the scheduling horizon
The i-th Scheduler keeps a vector Pi of shares of the
cumulative energy usage of the scheduled appliances
Upon reception of a message, each Scheduler get Si,
attributes a starting time Γ to the service request,
computes Pi’=Pi+Si and collaboratively compare Pi’ to T,
operating directly on the shares
• If Pi’>T, the starting time Γ is
shifted and the procedure is
repeated, otherwise Pi is
updated with Pi’
Cristina Rottondi
16. Basic principles – anonymous
communication of starting times
17
Once Γ is defined, one of the Schedulers broadcasts to all
Gateways the pair Γ,r
If a Gateway recognizes r as the tag of a local Appliance,
it forwards Γ to the device
Cristina Rottondi
17. Complexity evaluation (I)
20
Number of incoming/outcoming messages per service request
Messages exchanged by the Gateways depend linearly on w
Messages exchanged by the Schedulers depend linearly on Γ
and on the number of samples of the vectors V and
superlinearly on w
• w is assumed to be low
• Γ cannot be controlled by the system designer
• The number of elements of V is the only tunable parameter
Cristina Rottondi
18. Complexity evaluation (II)
21
Lighweight protocol for the Gateways (usually resource
constrained devices)
Computationally demanding operations supported by the
Schedulers
Cristina Rottondi
19. Performance assessment: benckmark
22
We define an Integer Linear Programming formulation to
compute the optimal solution minimizing the sum of the
scheduling delays
Inputs:
• Load profile of each appliance, Va
• Time of arrival of the service request of each appliance
• Total amount of supplied energy, T
Outputs:
• Starting time of each appliance, Γa
Cristina Rottondi
20. Numerical results
23
ILP model and privacy-preserving protocol compared over:
• 365 24-h long scheduling periods (1 year)
• 100 service requests per day (SMART* dataset [1])
• dishwashers - peak consumption 1500 W
• washingmachines - peak consumption 750 W
• Energy supplier: windfarm – peak production 50 kW (kaggle
dataset [2])
The privacy-preserving approach introduces a limited extra
delay w.r.t. the optimal solution
[1] “Smart* data set for sustainability.” http://traces.cs.umass.edu/index.php/Smart/Smart
[2] “Global energy forecasting competition 2012 - wind forecasting” http://www.kaggle.com/c/GEF2012-windforecasting/data
Cristina Rottondi
21. Conclusions
24
We propose a privacy-preserving framework for the
scheduling of power consumption requests
Requests generated by smart Appliances are
anonymously conveyed to a set of Schedulers, which
confidentially process them
Numerical results show only modest gaps in the
scheduling delays with respect to the optimal solutions
obtained by means of an Integer Linear Programming
formulation
Cristina Rottondi