Preface |
|
xi | |
Acknowledgments |
|
xvii | |
About the Authors |
|
xix | |
|
Chapter 1 The Smart Grid and Privacy |
|
|
1 | (10) |
|
|
1 | (1) |
|
Changes from Traditional Energy Delivery |
|
|
1 | (1) |
|
|
2 | (1) |
|
Business Model Transformations |
|
|
3 | (1) |
|
|
4 | (1) |
|
The Need for Privacy Policies |
|
|
5 | (1) |
|
Privacy Laws, Regulations, and Standards |
|
|
5 | (2) |
|
Privacy-Enhancing Technologies |
|
|
7 | (1) |
|
|
8 | (3) |
|
|
8 | (1) |
|
|
9 | (2) |
|
Chapter 2 What Is the Smart Grid? |
|
|
11 | (32) |
|
Market and Regulatory Overview |
|
|
11 | (25) |
|
Traditional Electricity Business Sector |
|
|
11 | (1) |
|
The Electricity Open Market |
|
|
12 | (1) |
|
Classifications of Utilities |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Electricity Technology Overview |
|
|
16 | (1) |
|
Electricity Supply Chain Vulnerabilities |
|
|
17 | (1) |
|
|
18 | (1) |
|
Market Changes in the Smart Grid |
|
|
19 | (2) |
|
|
21 | (1) |
|
Other Relevant Market Changes |
|
|
21 | (2) |
|
|
23 | (2) |
|
Automated Demand Response and the OpenADR Initiative |
|
|
25 | (1) |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (2) |
|
Data Volumes within the Smart Grid |
|
|
32 | (1) |
|
Data Owners, Data Custodians, and Data Managers |
|
|
33 | (2) |
|
|
35 | (1) |
|
Smart Grid Privacy Risk Examples |
|
|
36 | (3) |
|
|
39 | (1) |
|
Smart Grid, Smart Infrastructure |
|
|
39 | (2) |
|
Key Points for Smart Grid Technologies |
|
|
41 | (2) |
|
Chapter 3 What Is Privacy? |
|
|
43 | (12) |
|
|
43 | (1) |
|
|
44 | (1) |
|
What's the Difference between Security and Privacy? |
|
|
45 | (2) |
|
|
47 | (2) |
|
Smart Data Privacy Implications |
|
|
49 | (2) |
|
Data Communications Privacy Concerns |
|
|
51 | (4) |
|
Chapter 4 Smart Meter Data and Privacy |
|
|
55 | (20) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
58 | (2) |
|
|
60 | (1) |
|
Smart Meter Communications Capabilities |
|
|
61 | (2) |
|
Smart Meter Data Read Frequency |
|
|
63 | (1) |
|
Smart Meter Data Granularity |
|
|
63 | (3) |
|
Energy Savings Initiatives |
|
|
66 | (1) |
|
|
66 | (3) |
|
|
69 | (2) |
|
|
71 | (2) |
|
|
73 | (2) |
|
Chapter 5 The Connected Home |
|
|
75 | (22) |
|
|
75 | (3) |
|
|
78 | (1) |
|
Home Energy Management Systems |
|
|
79 | (1) |
|
|
80 | (1) |
|
HEMS Communications with the Smart Grid |
|
|
81 | (3) |
|
HANs Do Not Need Smart Meters |
|
|
84 | (1) |
|
HANs as Communications Gateway Devices |
|
|
84 | (1) |
|
Privacy Risks within Rentals and Other Leased Spaces |
|
|
85 | (2) |
|
Employee Privacy Risks within Commercial Buildings and Industrial Sites |
|
|
87 | (1) |
|
Disaggregation Technologies |
|
|
88 | (2) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
Connecting Home Appliances |
|
|
91 | (2) |
|
|
93 | (4) |
|
Chapter 6 Electric Vehicles, Charging Stations, and Privacy |
|
|
97 | (14) |
|
|
99 | (5) |
|
|
104 | (2) |
|
Utility-Supplied Network Charging |
|
|
106 | (1) |
|
Other Privacy Implications with EVs |
|
|
106 | (2) |
|
|
108 | (3) |
|
Chapter 7 Mitigating Privacy Risks |
|
|
111 | (34) |
|
Basic Risk Mitigation Strategies |
|
|
111 | (1) |
|
|
112 | (1) |
|
Energy Usage Data Privacy Risks |
|
|
112 | (8) |
|
Energy Production Data Privacy Risks |
|
|
120 | (1) |
|
|
121 | (1) |
|
Privacy Risk Mitigation Methods |
|
|
122 | (23) |
|
Chapter 8 How to Take Charge of Your Privacy |
|
|
145 | (20) |
|
Roles and Responsibilities |
|
|
145 | (4) |
|
Privacy Possibilities and Responsibilities for the Data Subject |
|
|
149 | (3) |
|
Data Subject Privacy Use Case Example |
|
|
152 | (1) |
|
Information Security Controls to Support Privacy Protection |
|
|
152 | (6) |
|
Privacy Responsibilities for the Data Controller/Data Custodian and the Data Processor/Data Manager |
|
|
158 | (1) |
|
Other Helpful Privacy and Information Security Resources |
|
|
158 | (7) |
|
Chapter 9 Transactive Energy |
|
|
165 | (18) |
|
|
166 | (2) |
|
|
168 | (1) |
|
|
169 | (2) |
|
|
171 | (7) |
|
|
178 | (1) |
|
|
179 | (4) |
|
Chapter 10 Addressing Common Privacy Claims |
|
|
183 | (6) |
|
Chapter 11 Beyond the Smart Grid: The Monetization of Data |
|
|
189 | (8) |
|
|
190 | (7) |
Appendix A Smart Grid Categories and Associated Privacy Risks |
|
197 | (6) |
Appendix B Example of One State's Actions for Smart Grid Privacy |
|
203 | (4) |
Index |
|
207 | |