4.7 Article

Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes

Journal

IEEE COMMUNICATIONS MAGAZINE
Volume 59, Issue 3, Pages 24-29

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MCOM.001.2000263

Keywords

Meters; Privacy; Home appliances; Electric potential; Data privacy; Smart homes; Internet of Things; Natural gas; Next generation networking

Ask authors/readers for more resources

This article explores the privacy preservation problem for multiple high time granularity metered resources in smart grids, such as electricity, water, and natural gas. It emphasizes the need for reevaluating existing privacy countermeasures to address all metered resources and adopting a holistic privacy protection approach to prevent potential information leaks that could render privacy preserving countermeasures ineffective.
In smart electricity grids, high time granularity (HTG) power consumption data can be decomposed into individual appliance load signatures via nonintrusive appliance load monitoring techniques to expose appliance usage profiles. Various methods ranging from load shaping to noise addition and data aggregation have been proposed to mitigate this problem. However, with the growing scarcity of natural resources, utilities other than electricity (e.g., water and natural gas) have also begun to be subject to HTG metering, which creates privacy issues similar to that of electricity. Therefore, employing privacy protection countermeasures for only electricity usage is ineffective for appliances that utilize additional/other metered resources. As such, existing privacy countermeasures and metrics need to be reevaluated to address not only electricity, but also any other resource that is metered. Furthermore, a holistic privacy protection approach for all metered resources must be adopted as the information leak from any of the resources has the potential to render the privacy preserving countermeasures for all the other resources futile. This article introduces the privacy preservation problem for multiple HTG metered resources and explores potential solutions for its mitigation.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Efficient computation of wireless sensor network lifetime through deep neural networks

Muhammed Yilmaz, Ahmet Murat Ozbayoglu, Bulent Tavli

Summary: This study proposes a deep neural network-based model to determine the lifetime of wireless sensor networks near-optimally almost instantly, with an average accuracy exceeding 98.5%. Learning-based algorithms are able to produce near-optimal results more rapidly compared to mixed integer programming models.

WIRELESS NETWORKS (2021)

Article Economics

Menu Optimization for Multi-Profile Customer Systems on Large Scale Data

Jeyhun Karimov, Murat Ozbayoglu, Bulent Tavli, Erdogan Dogdu

Summary: The problem of ATM menu optimization is formulated as a Mixed Integer Programming (MIP) framework, with parameters derived from a comprehensive actual ATM menu usage database. Two heuristic approaches are proposed to reduce computational complexity, enabling customization for ergonomic factors and optimization of various menu design problems. Performance evaluations using real ATM data demonstrate the superior performance of the optimization solution.

COMPUTATIONAL ECONOMICS (2022)

Article Automation & Control Systems

A Holistic Analysis of Privacy-Aware Smart Grid Demand Response

Cihan Emre Kement, Hakan Gultekin, Bulent Tavli

Summary: This study introduces a privacy-aware stochastic multiobjective optimization framework that enables fair optimization of objectives and explores the relationship between consumers and utility companies. The results show that near-optimal privacy performance can be achieved with small compromises on other objectives.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2021)

Article Computer Science, Hardware & Architecture

A Coverage-Aware Distributed k-Connectivity Maintenance Algorithm for Arbitrarily Large k in Mobile Sensor Networks

Vahid Khalilpour Akram, Orhan Dagdeviren, Bulent Tavli

Summary: This study introduces a coverage-aware distributed k-connectivity maintenance algorithm that efficiently restores k-connectivity while maintaining coverage.

IEEE-ACM TRANSACTIONS ON NETWORKING (2022)

Article Computer Science, Interdisciplinary Applications

Bicriteria scheduling of a material handling robot in an m-machine cell to minimize the energy consumption of the robot and the cycle time

Hakan Gultekin, Sinan Gurel, Rabia Taspinar

Summary: This study focuses on optimizing the sequencing and speeds of a material handling robot in a flowshop production system, aiming to find Pareto efficient solutions through second order cone programming and a heuristic algorithm. The proposed approaches help decision-makers strike a balance between throughput and energy efficiency.

ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING (2021)

Article Computer Science, Information Systems

Reliability of linear WSNs: A complementary overview and analysis of impact of cascaded failures on network lifetime

Muhammed Fatih Carsancakli, Md Abdullah Al Imran, Huseyin Ugur Yildiz, Ali Kara, Bulent Tavli

Summary: After conducting a concise literature survey on LWSN reliability, a comprehensive optimization framework is proposed to model the operation of LWSN, which includes three transmission power and packet size assignment strategies. The study reveals that coordinated node failures have a more severe impact on NL compared to random node failures in strongly connected LWSNs, leading to a significant decrease in NL.

AD HOC NETWORKS (2022)

Article Computer Science, Information Systems

On the Tradeoff Between Network Lifetime and k-Connectivity-Based Reliability in UWSNs

Muhammed Cobanlar, Huseyin Ugur Yildiz, Vahid Khalilpour Akram, Orhan Dagdeviren, Bulent Tavli

Summary: In this study, an optimization framework is created to explore the tradeoff between network lifetime (NLT) and reliability based on k-connectivity in underwater wireless sensor networks (UWSNs).

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

Deep Learning-Based Autonomous UAV-BSs for NGWNs: Overview and a Novel Architecture

Ali Murat Demirtas, Mehmet Saygin Seyfioglu, Irem Bor-Yaliniz, Bulent Tavli, Halim Yanikomeroglu

Summary: To address the growing demand for connectivity in communications, it is necessary to adopt innovative solutions such as using unmanned aerial vehicles (UAVs) as mobile base stations. This article presents an overview of the UAV base station trajectory optimization problem for next generation wireless networks and demonstrates that a convolutional neural network (CNN) model can be trained to accurately infer the location of a UAV base station in real time. Performance evaluations show that the proposed approach, trained with given labels and mobile user locations, can approximate the results of the optimization algorithm with high fidelity and outperform reinforcement learning-based approaches in resource-constrained settings. Future research challenges and key issues are also discussed.

IEEE CONSUMER ELECTRONICS MAGAZINE (2023)

Article Energy & Fuels

Privacy protection via joint real and reactive load shaping in smart grids

Cihan Emre Kement, Marija Ilic, Hakan Gultekin, Cihan Tugrul Cicek, Bulent Tavli

Summary: This study addresses the importance of load shaping for protecting consumer privacy in smart grids and presents a multi-objective optimization framework to analyze the interplay between privacy maximization, user cost minimization, and user discomfort minimization. The results reveal that joint shaping of real and reactive power components can significantly improve privacy preservation performance.

SUSTAINABLE ENERGY GRIDS & NETWORKS (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Impact of Critical Node Failures on Lifetime of UWSNs with Incomplete Secure Connectivity

Burak Emre Un, Huseyin Ugur Yildiz, Bulent Tavli

Summary: The failure of critical nodes in underwater wireless sensor networks can significantly reduce network lifetimes and increase energy consumption overhead.

2021 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE BLACKSEACOM) (2021)

Article Computer Science, Interdisciplinary Applications

3-D Dynamic UAV Base Station Location Problem

Cihan Tugrul Cicek, Zuo-Jun Max Shen, Hakan Gultekin, Bulent Tavli

Summary: This study focuses on the dynamic covering location problem of an unmanned aerial vehicle base station (UAV-BS), which is crucial for applications in smart grid and disaster relief. Traditional planar covering location approaches are limited due to the vertical movement ability of UAV-BS and nonconvex covering functions in wireless communication. New formulations and algorithms are developed to maximize total coverage within a finite time horizon, with a particular emphasis on nonconvex mixed-integer nonlinear programming and Lagrangean decomposition algorithm (LDA). Additionally, a continuum approximation (CA) model is proposed as a promising approach in terms of computational time and solution accuracy, especially for large-scale problems.

INFORMS JOURNAL ON COMPUTING (2021)

No Data Available