Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 5816765, 17 pages
Research Article

A Secure and Scalable Data Communication Scheme in Smart Grids

1Key Laboratory of Dependable Service Computing in Cyber Physical Society, Chongqing University, Ministry of Education, Chongqing, China
2School of Software Engineering, Chongqing University, Chongqing, China
3Department of Electrical Engineering & Computer Science, The Catholic University of America, Washington, DC, USA
4Department of Computer Science, Texas Christian University, Fort Worth, TX, USA
5School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China
6Department of Computer Science, The George Washington University, Washington DC, USA
7Department Electrical and Computer Engineering, University of British Columbia, Vancouver, BC, Canada
8Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China

Correspondence should be addressed to Chunqiang Hu; moc.liamg@4930qch and Qingyu Xiong; nc.ude.uqc@30gnoix

Received 5 August 2017; Accepted 13 November 2017; Published 19 March 2018

Academic Editor: Chaokun Wang

Copyright © 2018 Chunqiang Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS) matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.