Smart grid is the intelligence of the power grid. It is predicted to provide more stable and reliable power for power users . The smart grid is the result of the transformation of the existing energy grid. Both customers and public utility companies have monitoring and control functions, and the ability to predict energy use . With the development of science and technology as well as the deepening of related research, smart meters have become a key part between power supply enterprises and users, making them more closely linked and promoting the development of smart grid . The European Union plans to replace at least 80$\% $ of its meters with smart meters by 2020 . With the rapid development of smart meters, we should not only provide us with a convenient way of life, but also consider another issue, the privacy of users  . The smart meter data contains more private information of users. Once the attacker has mastered it, will cause the user’s privacy to be leaked, thereby increasing the user’s loss , which puts higher requirements on the security and accuracy of smart grid communications. However, without considering several security requirements, namely authentication, integrity, non-repudiation, access control, and privacy, it is not possible to deploy a smart grid widely . Attackers modify the data in the electricity meter through network attacks or master the behavior patterns of the users by tracking measurement data, so transmitting secure and complete data with user privacy through the network is a certain challenge  .
Chim  implements user identity authentication by generating a signature using a hash information verification code, but this method cannot protect the user’s identity privacy. Jeanno  uses a blind signature privacy preservation scheme to implement identity authentication while protecting user identity privacy However, this requires multiple verifications before signing, which increases computational overhead. Yu  used a ring signature privacy preservation scheme to achieve identity authentication and identity privacy preservation while avoiding a large number of signing credentials, but it was unable to prevent collusion between the key distribution center and the power company, requiring a lot of computation and communication overhead. Guan  guaranteed the anonymity and authenticity of the device by issuing certificates, authenticated the device, and effectively protected the user’s identity and privacy. Carcia  uses a homomorphic encryption scheme, which enhances the privacy preservation strength, but also increases the computational overhead. Saxena  realized the effective authentication of the user’s identity through a secure mutual authentication and authorization scheme, but did not consider the identity privacy of the user. Acs  adopted a privacy preservation scheme to achieve data aggregation and privacy preservation. The existing privacy preservation schemes have the problems of large computational cost and communication overhead, and the user’s identity privacy cannot be effectively protected.
Therefore, we proposed a smart meter privacy preservation scheme based on identity authentication. The introduction of third-party certification agencies, trusted certification authority and local certification authority issued pseudonyms and pseudonym certificates to ensure the anonymity of smart meters and achieve for the protection of user identity privacy. The masking technology with the Advanced Encryption Standard algorithm  is used for data aggregation.
We have summarized the contributions of our article as follows:
・ We have improved the system model. In this model, we adopt a third-party certification authority to authenticate the smart meter.
・ The certification authority has realized the anonymity of smart meters by issuing a pseudonym certificate, which effectively protects the identity privacy of users.
・ The masking technology with the Advanced Encryption Standard algorithm is used for data aggregation. The results show that our scheme reduces the computational cost and the communication overhead.
2. Related Basis
2.1. Zero-Knowledge Proof
Zero-knowledge proof is that the prover can convince the verifier that a certain conclusion is correct without providing the verifier with any useful information. Let A be the entity that has certain information and wants to confirm this fact. Let V be the confirming entity. A protocol proves to V that A does hold certain information, but V cannot guess what the information is. In addition to knowing that A can confirm Except for one fact, no other knowledge can be obtained, saying that A achieved zero-knowledge proof .
2.2. Maintaining the Integrity of the Specifications
, are addition cyclic groups whose order is q, is a multiplication cyclic group whose order is q, g is a generator, which constitutes a bilinear map . This assumption claims that given , , computing is computationally hard .
3. System Model and Attack Model
3.1. System Model
The description of these five components is as follows
1) Smart meter (SM): Smart meters are an important part of the smart grid. It increases the connection between users and power companies. Smart meters have added intelligent functions to traditional meters, and have also become a key part of the smart grid.
2) Aggregator (AG): The aggregator is an important part of the intermediate connection. The power data is collected from the smart meter end, and then the data is transmitted to the next level through the data aggregation technology. It is an important media component of a smart meter and control center.
3) Control Center (CC): The control center is equivalent to the brain, it will store the data collected by the smart meter in the future, and also process the data. It also has a role to provide guidance for the power supply process of power companies for the optimization of smart grid scheduling. The user’s power is used for billing. Second, the user’s power consumption data is analyzed to adjust the power accordingly.
4) Trusted Certificate Authority (TCA): The trusted certificate authority is an independent key and certificate management authority that generates various parameters and keys for the system.
5) Local Certificate Authorities (LCA): The trusted certificate authority is a management agency. Its main role is to issue certificates to other entities in the system and generate corresponding parameters. It is an independent third-party management agency.
As shown in Figure 1.
Figure 1. System model.
3.2. Attack Model
In our proposed privacy protection scheme, the attack model is an honest and curious model. We assume that the opponent is easy to attack the smart meter, and the sensitive power data can be obtained by the opponent through a legitimate device identity. The adversary conducts further tracking to obtain the user’s true identity, so that the user’s privacy is leaked. The aggregator and control center are honest but curious. They are trying to obtain sensitive data information. The communication channel between the aggregator and the data center may not be completely encrypted, and the adversary can eavesdrop to obtain valuable information. In addition, during the transmission process, the adversary may launch an active attack to destroy data integrity.
4. Scheme Description
Our scheme introduces a third-party certification authority; it issues pseudonym certificates to achieve smart meter identity privacy. The masking technology with the Advanced Encryption Standard algorithm is used for data aggregation.
4.1. System Initialization
When the SM receives a request from the CC to collect user power usage information, the initialization system process is completed by the LCA and TCA by generating the corresponding parameters , calculates the public key , the private key is d, and sends it to the SM. The TCA randomly selects two large prime numbers and , calculates the public key , and sends it to the LCA. The private key is and sends it to the AG. After the relevant parameters are given, two prime numbers are selected by the TCA. These two numbers are random. , , calculates , it is the public key. Sends it to the SM, and sends the private key to the CC, it is . Three one-way hash functions are defined by the TCA. , , .
1) SM registration
SM need to request a pseudonym to protect privacy. SM registration selects a number which is random, calculates , then calculates the signature.
the certificate information is calculated according to the signature
and finally the smart meter sends a data request packet to the LCA.
The LCA receives the request message, which is sent by the SM, the LCA checks through the public key e to verify . If
The LCA selects a random number , calculates , and then sends an encrypted response packet to the smart meter, and calculates the pseudonym of the smart meter, store and update the pseudonym, and then send the pseudonym to the TCA.
The SM decrypts with the private key after receiving the response packet. If the P recovered is right, the SM calculates with a random number , satisfies , The request packet is sent to the TCA, its role is to obtain a pseudonym certificate, which is used for secure communication.
After the certificate request is received, the received message is decrypted by TCA, the pseudonym of the smart meter is verified, and the validity of the timestamp is verified. A random number is selected by TCA , calculates , and generates a pseudonym certificate . Finally, the TCA stores and updates the pseudonym certificate, and sends the response packet to the SM.
The SM uses the private key for decryption. If the recovered is correct, its pseudonym certificate can be calculated.
2) AG registration
The AG selects a random number , calculates , and then calculates the signature
Calculate this certificate information, it is calculated based on the signature
Finally, a data request message is sent, which is sent by the SM to the LCA.
The LCA receives the request message, which is sent by the SM, the LCA checks through the public key to verify . If
then verify the identity of the AG. Then calculate , satisfies , calculate the new aggregator pseudonym.
and the LCA reports to the TCA send a pseudonym certificate request.
After the request packet is received, it is decrypted by the TCA and a number is selected, which is random , satisfies , calculates a pseudonym certificate
store and update, and send the response packet to the AG.
3) Data aggregation
The SM chooses based on its pseudonym, adds a masked random number to the collected electricity consumption data, encrypts the plaintext data (B) with the electricity consumption information of the user by using Advanced Encryption Standard algorithm to obtain the encrypted ciphertext data (C). , the SM calculates the message , and then sends the data packet to the AG.
The decryption process is . AG gets total power usage data with CC shared key.
Encrypted data process:
The CC gets the total electricity consumption data.
5. Performance Analysis
5.1. Security Analysis
In this section, we will analyze the proposed privacy protection scheme, analyze the security, and analyze the privacy protection. We will focus on analyzing how this solution achieves the anonymity of SM and the reasons why the identity of legitimate SM cannot be used fraudulently. In addition, through integrity checks, in our proposed privacy protection scheme, we can not only resist passive attacks but also active attacks. On this basis, we not only guarantee the anonymity of SM, but also its unforgeability.
1) When the LCA receives a registration request, the request is sent by the new local device, is a message with zero knowledge signature, and the smart meter uses its own private key d generates signature . The message is then used to generate certificate information . After receiving the request, the LCA uses its public key e to verify the true identity of the SM, without knowing the zero-knowledge-based certification protocol Specific signature . Even if the opponent holds the private key d, it is difficult to find , so that , so the LCA can verify the identity of the device, and the signature will not be leaked, nor forged.
2) The LCA sends a response packet to the SM. This response data packet is encrypted. It is encrypted by the SM using the public key. This data packet can only be correctly obtained by the SM, and the verification can only be performed by the SM. changed and generates its pseudonym . In addition, the parameter exchange used to generate pseudonyms is performed under the assumption of Diffie Hellman: given , , it is difficult to calculate , Even if the P, Q obtained, the pseudonym will not be calculated correctly by the opponent, so as to guarantee SM’s pseudonym and make it unforgeable.
3) When a pseudonym certificate is generated, the TCA does not need to know the actual identity of the SM, and determines whether the user is legitimate by verifying the pseudonym. The process of generating a pseudonym certificate is similar to the pseudonym generation process, both of which are based on Diffie Hellman assumption. Therefore, the counterfeit certificate of the SM cannot be stolen and forged by the adversary.
4) SM can change the pseudonym, as well as the pseudonym certificate, which makes it difficult for adversaries to track it. In this way, the identity of the SM can be protected, and the opponent cannot know. In addition, because the generation of pseudonyms is related to multiple entities, the process of generating pseudonym certificates is the same. Our privacy protection scheme can reduce privacy leakage and protect the identity privacy of users, compared with a single pseudonym solution. During transmission, the integrity of the data is done by each entity verifying the message. One-way hash function , is a random mapping. If the opponent modifies the data during the transmission of the data, it can also be detected, and the data receiver can verify the message for detection.
Figure 2. Comparison of computational cost.
Figure 3. Comparison of communication overhead.
5.2. Computational Cost and Communication Overhead
Our experiments were performed on the matlab platform. 128-bit Advanced Encryption Standard is used, and the number of encryption rounds is 10. Figure 2 illustrates the relationship between the computational cost and the number of SMs. Figure 3 illustrates the relationship between the communication overhead and the number of SMs. The scheme 2 proposed in this paper is compared with the scheme 1 in the literature . The results show that the scheme has less computational cost and communication overhead than the literature .
 Ferrag, M.A., Maglaras, L.A., Janicke, H., et al. (2018) A Systematic Review of Data Protection and Privacy Preservation Schemes for Smart Grid Communications. Sustainable Cities and Society, S2210670717308399.
 Chim, T., Yiu, S., Hui, L. and Li, V. (2011) PASS: Privacy-Preserving Authentication Scheme for Smart Grid Network. 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).