Fast Fourier Transform and Nonlinear Circuits Based ... - Science Direct

22 downloads 652 Views 510KB Size Report
signatures-that is unique for every appliance can be used to declare the ... version of the smart meter data and securely transmitted over a suitable network. ... Monitoring (NILM), an autonomous self-learning algorithm decomposes the entire ...
Available online at www.sciencedirect.com

ScienceDirect Procedia Technology 21 (2015) 287 – 294

SMART GRID Technologies, August 6-8, 2015

Fast Fourier Transform and Nonlinear Circuits Based Approach for Smart Meter Data Security M Jocelyn Babua,*, V Sowmyaa, K.P Somana a

Centre for Excellence in Computational Engineering and Networking, Amrita Vishwa Vidyapeetham, Coimbatore Campus, Tamilnadu-641112, India

Abstract Smart meters take measurements at minute intervals of time. The energy disaggregation of smart meter data provides accurate information regarding the electricity consumption but also reveals detailed information pertaining to the customer. Load signatures-that is unique for every appliance can be used to declare the behavioral pattern of the customers such as their sleepwake cycles, usage period of various appliances, time during which the house is empty and by far, which particular channel is being viewed on the television. The smart meter data is transmitted to the utility company at regular intervals of time over the internet. Data that has such potential to access private information can be tampered with, by an undesirable third party during transmission. This is a vital privacy threat to the customer and has hyped the researches pertaining to smart meter data security in the recent times. To assure security, we introduce an algorithm that aims at encryption of data prior to transmission. The algorithm employs the FFT algorithm and various nonlinear systems to generate chaotic signals. The obtained chaotic signal is amalgamated with a transformed version of the smart meter data and securely transmitted over a suitable network. The proposed algorithm is tested on a real household’s power signal data. 2015The TheAuthors. Authors.Published Published Elsevier © 2015 byby Elsevier Ltd.Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of Amrita School of Engineering, Amrita Vishwa Vidyapeetham University. Peer-review under responsibility of Amrita School of Engineering, Amrita Vishwa Vidyapeetham University Keywords:Fast Fourier Transform; Chua circuit; Rossler attractor; Chen-Lee attractor; Hash code

1. Introduction Smart metering is a developing technology which has attracted several industries, research organizations and potential customers1. This technology emerged with the idea of altering and aiding the consumer regarding their

* Corresponding author. Tel.: +91 9790446474. E-mail address: [email protected]

2212-0173 © 2015 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of Amrita School of Engineering, Amrita Vishwa Vidyapeetham University doi:10.1016/j.protcy.2015.10.031

288

M. Jocelyn Babu et al. / Procedia Technology 21 (2015) 287 – 294

energy usage, plays a vital role in smart grid applications. The smart meter data measured at regular intervals in terms of voltage, current, active and reactive powers is transmitted over internet to the server at the utility company3.This leads to the customers concern on data authentication1,2. Smart-meter data are used in fault detection, efficient energy incentive design, control of HVAC components in residences and industries4. Non-Intrusive Load Monitoring (NILM), an autonomous self-learning algorithm decomposes the entire energy signal of resident/commercial/industry into energy signals of individual appliances5. The working principle of NILM algorithm is that the power states of the system determines the distinguishability among the devices. The first approach to infer the state of the appliances was built based on Finite State Machines(FSM) model. Recently, the probabilistic based model namely, Hidden Markov Model (HMM) replaces the FSM model 6. Smart meter technology provides significant improvement in consumer’s energy habits. Meanwhile, privacy issues are arisen due to the availability of consumer data as open source. The state and the rate of energy consumed by the household electrical appliances can be inferred from the smart meter data. For instance, using the smart meter data, one can predict the TV channel watched by the inhabitants. Due to the insecure availability of data, the smart meter technology has led to the unprecedented invasions of customer privacy. Hence, recent research is attracted towards security in smart meter data. Algorithms for data security can be categorized into any of the three types7 namely, anonymization, aggregation and obfuscation metering data1. Battery based load hiding (BHL)1 is an optimization problem which aims at minimum amount of data leakage with a feasible battery. The key factor of this algorithm is a constant metered load. This method uses controllable batteries that charge and discharge at strategic times to maintain an even energy household demand. In Load Based Load Hiding (LHL)1method, variable load is employed in order to neutralize the metering data. This method tends to increase the net metered data by introducing noise levels. Hidden Markov Model (HMM) can be used to analyze each individual load, its state of operation and behavior. Discrete Wavelet transforms 9 are used to create a higher degree of hierarchical resolution in smart meter data. The accuracy of the data is directly proportional to the number of levels of wavelet decomposition. This multi-resolution pattern enables the client to grant or deny access to various resolutions on a requirement basis13. The remainder of this paper is organized as follows: Section 2 discusses the methodologies taken and performed on the smart meter data in the process of data encryption. Section 3 describes the proposed method for securing smart meter data and Section 4 narrates the experimental analysis. The results are displayed in Section 5 and Section 6 concludes the paper. 2. Smart Meter Data Encryption 2.1. Need for Data Encryption The science of cryptography10 enables the transmission of information between two clients preventing others from reading it. Mathematical tools can be employed to encrypt data before transmission and decrypt data after reception11,12. In this paper, a method of encrypting data by computing its Fourier transformations and adding a chaotic signal to it is employed. Data can be confidently transferred over an insecure channel owing to the fact that any intrusion by a third party will not be effective because, in order to decrypt the data the knowledge regarding the chaotic algorithm and the initial values are essential. 2.2. Fast Fourier Transforms The Fast Fourier Transform (FFT)14is a fast algorithm for DFT computation. Fordiscrete and periodic signals, discrete Fourier transform (DFT) is employed instead of a continuous Fourier transform. If a n is thought of as a signal with n=0...N-1 and a n =a n+jN for all n and j, then the DFT, that is also known as the spectrum of signal a n , is given by: ܰെͳ

where WN =e

-j

2π N

‫ ݇ܣ‬ൌ for k=0...N-1

෍ ܹ݇݊ ܰ ܽ݊ ݊ൌͲ

M. Jocelyn Babu et al. / Procedia Technology 21 (2015) 287 – 294

WNk is defined as the Nth roots of unity because in the case of complex arithmetic (WNk ) N =1 for all values of k .For a sequence a n , its discrete Fourier transform is A k , both being a sequence of N complex numbers. The inverse DFT ܰെͳ is given by: ͳ ܽ݊ ൌ ෍ ܹܰെ݇݊ ‫݇ܣ‬ ܰ The FFT algorithm requires that the number data points must be a power of 2. Usually, to ensure this criteria, padding is done. In contrast to the Discrete Cosine Transform (DCT), the DFT coefficients have the advantage that its magnitude is spatially invariant, taking into consideration that the signal is periodic 15. The FFT is computed to obscure the spikes in the time domain because in the frequency domain, the signal spans a wide range of frequencies. Hence any prominent spike in the power signal is masked. The FFT can be computed using a Raspberry pi, which is also used to process the smart meter data. Raspberry piGraphical Processing Unit can be efficiently exploited 16to enable high-speed FFT computation.Raspberry pi comes with an in-built mathematica platform that can also be used to ease the computation.

2.3. Chaotic systems Chaotic systems, were thought of as systems that could neither be controlled nor predicted. Recently, the studies to analyze and understand chaos has facilitated the realization of the chaotic theory in certain applications. Every chaotic system displays a significant property of being highly dependent on initial conditions. This feature is exploited in this paper in order to improve security of data transmission. The initial values are capable of large changes in the chaotic system and hence the knowledge of these values are essential to reproduce the chaotic system. The information regarding the initial value is restricted between the sender and receiver alone and called as a secret key value. The key is transferred from the sender-end to the receiver-end using the private-public keying system. 2.3.1 Chua Circuit A simple electronic circuit known as the Chua circuit exhibits classic chaos theory behavior. Chua attractor, the attractor for the Chua circuit displays interesting structures, different from attractors such as Lorenzs[17] and Rosslers18. Chaotic behavior of the circuit suggests that the circuit is roughly a non-periodic oscillator, i.e., the waveform is oscillating in nature and never repeats, in contradiction to the case of an ordinary electronic oscillator[19][20].

Fig. 1: Crosss Version of Chuas Circuit

The circuit introduced in [21], gained popularity owing to its ease in construction and the standard electronic components that are used such as resistors, inductors, capacitors, diodes and op-amps. The circuit must agree to the

289

290

M. Jocelyn Babu et al. / Procedia Technology 21 (2015) 287 – 294

following criteria in order to exhibit chaotic behavior. It must comprise of more one or more non-linear elements, three or more energy storage elements and one or more locally active resistors. Chua’s circuit is the simplest electronic circuit (as shown in Fig.1) meeting these demands, wherein the two capacitors (C1 and C2) and the inductor (L1) are the energy storage elements. Michael Cross introduced the version of the Chua circuit shown in Fig.1. The non-linear negative resistance is provided by the right-hand side of the circuit, whereas the left hand side is as an R-L-C oscillator, which would produce damped oscillations in the absence of the right hand side. The three variables that differ with time are considered to derive three deferential equations for the Chua circuit system, i.e., voltages across the capacitors (C1 and C2) and the current through the inductor (L1). The equations are obtained using Kirchhoff’s laws and then transformed to obtain the following equations for the circuit[21]:

where a=R1/R , b=1-R1/R2, c=(C1*R12 )/Ls=C1/C2, dZ/dt=(1/3)XY-cZ, P=r/R1 let F(X) be the normalized current-voltage characteristics for the right-hand side of the circuit. F(X) = -X X d1 -[1+ b( X -1)]*sign(X) 1< X d 10 [10( X -10) - (9b +1)]*sign(X) X > 10 In this paper, the generation of the chaotic attractor(presented in Fig.6.) uses the same parameter values as shown in the circuit diagram (Fig.1.). 2.3.2

Rossler System

The Rossler system is a system of three non-linear ordinary differential equations and its attractor is known as Rossler attractor. The differential equations define a continuous time real system that displays Chaotic behavior22. Rossler realized a simple non-linear vector field exhibiting chaotic behavior, whose attractor can be expressed as follows: ݀ܺ (4) ൌ െܺ െ ܻ ݀‫ݐ‬ ܻ݀ (5) ൌ ܺ ൅ ܻܽ ݀‫ݐ‬ ܼ݀ ൌ ܾ ൅ ܼሺܺ െ ܿሻ (6) ݀‫ݐ‬ By setting the values of a, b and c, to a=b=0.2 and c=5.7 the system exhibits a chaotic behavior. The Rossler system offers a relatively simple set of differential equations that has only one, second order nonlinearity term, given in equation (6). Owing to its simplicity, this system has found applications in studying the effectiveness of chaos control strategies23. 2.3.3

Chen-Lee System

The Chen-Lee system24-a continuous time domain system in three dimension space-is another system that displays the characteristic behavior of the chaos theory. This system results in a two-scroll chaotic attractor. The following set of non-linear differential equations defines the Chen-Lee system:

291

M. Jocelyn Babu et al. / Procedia Technology 21 (2015) 287 – 294

݀ܺ

ൌ െܻܼ ൅ ܽܺ ݀‫ݐ‬ ܻ݀ ൌ ܼܺ െ ܾܻ ݀‫ݐ‬ ܼ݀ ൌ ሺͳΤ͵ሻܻܺ െ ܼܿ ݀‫ݐ‬

(7) (8) (9)

For the three system parameter values a=5, b=10 and c=3.8 the system results in a chaotic attractor are as shown in Fig.12.The fourth-order Runge-Kutta algorithm is used to solve the differential equations.

Fig. 2: Block diagram of the proposed algorithm

3. Proposed Algorithm A household’s power signal data is realized and subjected to the FFT algorithm, as shown in Fig.2. FFT computation generates a magnitude plot, as well as a phase plot. Any of the above mentioned chaotic systems are used to generate a three dimensional chaotic attractor. Two out of the three vectors are considered from the generated attractor (consider X and Y), it is scaled to a suitable factor and added to the magnitude and phase values respectively. The chaos added data is subjected to a hashing algorithm and the resultant hash code, is secured employing a private key (known to the sender as well as the receiver) assigned using a public keying system. The encrypted data is appended with this hash code and transmitted over a suitable network interface. At the receiver, a hash code is generated using a hashing algorithm on the received data and compared with the hash code received. The generated and received hash codes are compared to check for any discrepancies during transmission. The receiver ,knowing the secret key value and the type of attractor used to generate chaos, reproduces the chaotic system. This chaotic signal is subtracted from the received signal and its Inverse Fast Fourier Transform yields the original power signal. 4. Experimental Analysis 4.1. Data set In this paper, the evaluations are based on the Reference Energy Disaggregation Dataset (REDD) 25. The dataset comprises of an entire home electricity consumption for several houses taken over a time period of several months.

292

M. Jocelyn Babu et al. / Procedia Technology 21 (2015) 287 – 294

The electricity signal collected is an AC waveform recorded at a high frequency of 15 kHz. 4.2. Algorithm Implementation 1.

2.

3.

4.

5.

Fine-grained power signal of a real household is procured and its N-point FFT is computed. This can be viewed as a magnitude plot and a phase plot. These magnitude values and phase values are considered separately in the successive steps. A chaotic attractor is generated using the Chaotic systems mentioned in Section 2.3. In the case of the attractor generatedfrom the Chua circuit (Section 2.3.1.), the initial state values (or the secret key values) are taken to be (Xo , Yo , Zo )=(0.1, 0.14, 0.25) and the parametric values are derived from the circuit diagram (Fig.1.). To generate the Rossler and Chen-Lee attractor, the initial values are set to (Xo , Yo , Zo )=(0.15, 0.2, 0.35) and (Xo , Yo , Zo )=(15, 10, 13) . The Chua circuit attractor is generated using equations1-3. The attractor values are scaled in the range of a 500 to 200 in order to match the amplitude range of the signal. From the chaotic attractor, one among the three scaled vectors (say X) is considered and added to the magnitude values of the power signal. Similarly, another scaled vector is added to the phase values of the power signal. These two signals are subjected to a hashing algorithm where the signals are appended with a generated hash code. Finally, these two signals appended with hash codes are transmitted over the internet and received by the end-user.The hash codes are verified for signal-tampering by a third party. The end-user decrypts the received signal to result in the original two signals by generating the chaotic attractor having prior knowledge of the secret initial values. The resultant phase and magnitude vectors are combined and subjected to Inverse Fast Fourier Transform (IFFT) to yield the original signal.

5. Results The data used is a real power signal data of a household which is shown in Fig.3. The signal is subjected to the FFT algorithm in order to compute DFT coefficients quickly. The transformation gives the magnitude and phase values, that are separated and introduced to various chaotic systems. The chaotic motion of the attractors generated from the Chua, Rossler and Chen-Lee systems are studied and presented in figures: Fig.4.,Fig.5. and Fig.6.The magnitude and phase values are added to the different attractors and yields into two completely obfuscated signals. These two signals, even if procured by an external party, would be futile without the algorithm and the initial key values that generates the chaotic signal.

 Fig. 3: Household power signal



293

M. Jocelyn Babu et al. / Procedia Technology 21 (2015) 287 – 294



Fig. 4: Chaotic motion of the system from Chua circuit









Fig. 5 Chaotic motion of the system from Rossler system





 Fig. 6 Chaotic motion of the system from Chen-Lee system



 

294

M. Jocelyn Babu et al. / Procedia Technology 21 (2015) 287 – 294

6. Conclusion Smart meters acquires data at high precise time intervals and transmit this data over a wireless channel like the internet to the utility company and also to those who can access the data. Smart meter data offers so much information about the household and its inhabitants that insecure transmission of this data has dwarfed the growth of this technology. An algorithm to ensure secure transmission of data is introduced in this paper. The power signal is subjected to the FFT algorithm and chaos generated using a non-linear circuit is added to the transformed signal. A hash code is generated and secure data transmission is established. Chaos generated from three systems and has succeeded in obfuscating the smart meter data. This study implies that any system that exhibits chaotic behaviour can be used to generate a chaotic attractor. The key value being the initial value of the attractor, the decryption of the transmitted data with the knowledge of the algorithm alone, proves to be impractical. Acknowledgements We are grateful to Mr. Harikumar K for his guidance during the course of the paper. We express our gratitude to the faculty and staff of the Centre for excellence in Computational Engineering and Networking for their timely help and support. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26]

Christoph Prokop, Dominik Egarter and Wilfried Elmenreich. Load hiding of households power demand. 2014. Wilfried Elmenreich, Christoph Klemenjak and Dominik Egarter. Yomo the arduino-based smart metering board. 2014 Josef Ressel and Dominik Engel. Wavelet-based load profile representation for smart meter privacy. 2012. Ehsan Elhamifar and Shankar Sastry. Energy disaggregation via learning powerlets and sparse coding. 2013. G.W.Hart. Nonintrusive appliance load monitoring. Proceedings of the IEEE. 1992. D. Bruckner T. Zia and A. Zaidi. A hidden markov model based procedure for identifying household electric loads. IEEE- Industrial Electronics Society (IECON). 2011. Skopik. Security is not enough! On privacy challenges in smart grids. International Journal on Smart Grid and Clean Energy. 2012. G. Kalogridis and C. Efthymiou. Smart grid privacy via anonymization of smart metering data. Proceeding of IEEE International Conference on- Smart Grid Communications (SmartGridComm). 2011. Dominik Engel. Conditional access smart meter privacy,based on multi resolution wavelet analysis. 2011. Richard J. Spillman. Classical and contemporary cryptology. 2004. Susan Landau. Find me a hash. Notices of the American Mathematical Society. 2006. M. Bellare H. Krawczyk and R. Canetti. Keyed-hashing for message authentication and internet engineering task force. 2014. K.I. Ramachandran K.P. Soman. Insight into wavelets from theory to practice. Second ed., PHI, 2006. Paul Heckbert. Fourier Transforms and the Fast Fourier Transform (FFT) Algorithm. 1995 Revised 27 Jan. 1998. Todd Mateer. Fast Fourier Transform Algorithms with Applications. Presented to the Graduate School of Clemson University. August 2008. S. Sabarinath, R. Shyam, C. Aneesh, R. Gandhiraj, K. P. Soman. Accelerated FFT Computation for GNU Radio Using GPU of Raspberry Pi. Computational Intelligence in Data Mining-Volune2, vol. 32 Springer India. 2015 Lorenz E. N. Deterministic nonperiodic flow. Journal of Atmospheric Science. 1963. Takashi. A Chaotic Attractor from Chua’s Circuit. IEEE Transactions on Circuits and Systems(IEEE). 1984. Madan, Rabinder N. Chua’s circuit: a paradigm for chaos. River Edge, N.J.: World Scientific Publishing Company. 1993. Chua Leon O., Matsumoto T., Komuro M. The Double Scroll. IEEE Transactions on Circuits and Systems(IEEE). 1985. Mehran, Yasaman Zandi. Fuzzy OGY Chaos Control Approach and Its Application in ChuaCircuit. 5th International Conference onBioinformatics and Biomedical Engineering. 2011. L. O. Chua Dynamic nonlinear networks: state of the art IEEE Transactions on Circuits and Systems(IEEE). 1980. E Rossler. An Equation for continuous chaos. Institut fur physikalishce und theoretische Chemie der Universitat Tubingen, Germany. 1976. Meihong Xua, Yuan Weib and Junjie Weia. Bifurcation analysis of Rossler system with multiple delayed feedback.Beijing. Chen HK and Lee CI. Anti-control of chaos in rigid body motion. Chaos, Solitons & Fractals. 2004. Matthew J. Johnson and J. Zico Kolter. A public data set for energy disaggregation research, Data Mining Applications in Sustainability. 2011.

Suggest Documents