Team for Research in
Ubiquitous Secure Technology

Privacy and Security in Demand Response Energy Systems
Erin Jones

Citation
Erin Jones. "Privacy and Security in Demand Response Energy Systems". Talk or presentation, 21, March, 2006.

Abstract
In the wake of the California energy crisis of 2000-2001, the California Energy Commission and California Public Utilities Commission began to develop demand response energy programs that might reduce peak energy demand. With demand response, residential customers will be subject to energy rates that vary over the day, rising during times of peak demand.

To enable this vision, utilities plan widespread deployment of advanced energy meters that will measure energy usage every 15 minutes - 1 hour and send this information to the utility, often wirelessly. Longer term plans include a switch to time-varying dynamic tariffs, demand response, and in-home sensor networks that can monitor and control energy usage.

This project has focused on privacy and security issues that may evolve along with demand response technologies and infrastructures. Having completed interviews with energy industry practitioners about current and future plans, interviews with law enforcement to understand how energy records may be used, and by studying the current legal and regulatory framework for privacy in energy systems, wireless transmissions and in the home, we discuss how a demand response network could be constructed to optimally protect privacy and security.

Electronic downloads

Citation formats  
  • HTML
    Erin Jones. <a
    href="http://www.truststc.org/pubs/36.html"
    ><i>Privacy and Security in Demand Response Energy
    Systems</i></a>, Talk or presentation,  21,
    March, 2006.
  • Plain text
    Erin Jones. "Privacy and Security in Demand Response
    Energy Systems". Talk or presentation,  21, March, 2006.
  • BibTeX
    @presentation{Jones06_PrivacySecurityInDemandResponseEnergySystems,
        author = {Erin Jones},
        title = {Privacy and Security in Demand Response Energy
                  Systems},
        day = {21},
        month = {March},
        year = {2006},
        abstract = {In the wake of the California energy crisis of
                  2000-2001, the California Energy Commission and
                  California Public Utilities Commission began to
                  develop demand response energy programs that might
                  reduce peak energy demand. With demand response,
                  residential customers will be subject to energy
                  rates that vary over the day, rising during times
                  of peak demand. <p>To enable this vision,
                  utilities plan widespread deployment of advanced
                  energy meters that will measure energy usage every
                  15 minutes - 1 hour and send this information to
                  the utility, often wirelessly. Longer term plans
                  include a switch to time-varying dynamic tariffs,
                  demand response, and in-home sensor networks that
                  can monitor and control energy usage. <p>This
                  project has focused on privacy and security issues
                  that may evolve along with demand response
                  technologies and infrastructures. Having completed
                  interviews with energy industry practitioners
                  about current and future plans, interviews with
                  law enforcement to understand how energy records
                  may be used, and by studying the current legal and
                  regulatory framework for privacy in energy
                  systems, wireless transmissions and in the home,
                  we discuss how a demand response network could be
                  constructed to optimally protect privacy and
                  security. },
        URL = {http://www.truststc.org/pubs/36.html}
    }
    

Posted by Christopher Brooks on 24 Mar 2006.
Groups: trustseminar
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.