Research Article
Application of Spritz Encryption in Smart Meters to Protect Consumer Data
Table 1
Comparison of various privacy enhancing techniques.
| Technique | Power loss introduced | Computational overhead introduced to grid | Communication overhead introduced | Trusted third party needed? | Can utility company access data? |
| Battery load hiding (BLH) | Yes | No | No | No | No | Solar PV convertor | Yes | No | No | No | No | Anonymization | No | Yes | Yes | Yes | No | Homomorphic encryption | No | Yes | Yes | Yes | No | End-to-end encryption | No | Yes | Yes | No | Yes |
|
|