Security aspects in Smart Meters: Analysis and Prevention (2312.08101v1)
Abstract: Smart meters are of the basic elements in the so-called Smart Grid. These devices, connected to the Internet, keep bidirectional communication with other devices in the Smart Grid structure to allow remote readings and maintenance. As any other device connected to a network, smart meters become vulnerable to attacks with different purposes, like stealing data or altering readings. Nowadays, it is becoming more and more popular to buy and plug-and-play smart meters, additionally to those installed by the energy providers, to directly monitor the energy consumption at home. This option inherently entails security risks that are under the responsibility of householders. In this paper, we focus on an open solution based on Smartpi 2.0 devices with two purposes. On the one hand, we propose a network configuration and different data flows to exchange data (energy readings) in the home. These flows are designed to support collaborative among the devices in order to prevent external attacks and attempts of corrupting the data. On the other hand, we check the vulnerability by performing two kind of attacks (denial of service and stealing and changing data by using a malware). We conclude that, as expected, these devices are vulnerable to these attacks, but we provide mechanisms to detect both of them and to solve, by applying cooperation techniques
- D. B. Avancini, J. J. Rodrigues, S. G. Martins, R. A. Rabêlo, J. Al-Muhtadi, and P. Solic, “Energy meters evolution in smart grids: A review,” Journal of cleaner production, vol. 217, pp. 702–715, 2019.
- Y. Wang, Q. Chen, T. Hong, and C. Kang, “Review of smart meter data analytics: Applications, methodologies, and challenges,” IEEE Transactions on Smart Grid, vol. 10, no. 3, pp. 3125–3148, 2018.
- A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, “Private memoirs of a smart meter,” in Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building, pp. 61–66, 2010.
- Y. Wang, Q. Chen, D. Gan, J. Yang, D. S. Kirschen, and C. Kang, “Deep learning-based socio-demographic information identification from smart meter data,” IEEE Transactions on Smart Grid, vol. 10, no. 3, pp. 2593–2602, 2018.
- M. R. Asghar, G. Dán, D. Miorandi, and I. Chlamtac, “Smart meter data privacy: A survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2820–2835, 2017.
- C. Efthymiou and G. Kalogridis, “Smart grid privacy via anonymization of smart metering data,” in 2010 first IEEE international conference on smart grid communications, pp. 238–243, IEEE, 2010.
- E. McKenna, I. Richardson, and M. Thomson, “Smart meter data: Balancing consumer privacy concerns with legitimate applications,” Energy Policy, vol. 41, pp. 807–814, 2012.
- L. Marinos, “Smart grid threat landscape and good practice guide,” White Paper, European Network and Information Security Agency (ENISA), 2013.
- E. Union, “Eu 2019/553 of 3 2019 on cybersecurity in the energy sector,” 2019. [Online]. Available: https://eur-lex.europa.eu/legal-content/EN/TXT/ PDF/?uri=CELEX:32019H0553&from=ES.
- H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, “Smart-grid security issues,” IEEE Security & Privacy, vol. 8, no. 1, pp. 81–85, 2010.
- T. Humphreys, “State-of-the-art information security management systems with iso/iec 27001: 2005,” ISO Management Systems, vol. 6, no. 1, 2006.
- Z. Xiao, Y. Xiao, and D. H.-C. Du, “Non-repudiation in neighborhood area networks for smart grid,” IEEE Communications Magazine, vol. 51, no. 1, pp. 18–26, 2013.
- R. Moen and C. Norman, “Evolution of the pdca cycle,” 2006.
- V. V. Fomin, H. Vries, and Y. Barlette, “Iso/iec 27001 information systems security management standard: exploring the reasons for low adoption,” in Euromot 2008 conference, nice, france, 2008.
- M. M. Hasan and H. T. Mouftah, “Encryption as a service for smart grid advanced metering infrastructure,” in 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 216–221, IEEE, 2015.
- J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based iot: Challenges,” IEEE Communications Magazine, vol. 55, no. 1, pp. 26–33, 2017.
- Z. Wan, G. Wang, Y. Yang, and S. Shi, “Skm: Scalable key management for advanced metering infrastructure in smart grids,” IEEE Transactions on Industrial Electronics, vol. 61, no. 12, pp. 7055–7066, 2014.
- G. A. and C. M., “Key management systems for smart grid advanced metering infrastructure: A survey,” IEEE Communications Surveys Tutorials, vol. 21, pp. 2831–2848, 2019.
- M. Benmalek, Y. Challal, A. Derhab, and A. Bouabdallah, “Versami: Versatile and scalable key management for smart grid ami systems,” Computer Networks, vol. 132, pp. 161–179, 2018.
- H. Nicanfar, P. Jokar, K. Beznosov, and V. C. Leung, “Efficient authentication and key management mechanisms for smart grid communications,” IEEE systems journal, vol. 8, no. 2, pp. 629–640, 2013.
- G. S., K. K., B. G., G. F., A. S.H., and J. D.N.K., “Lisa: A lightweight and secure authentication mechanism for smart metering infrastructure,” in 2019 IEEE Global Communications Conference (GLOBECOM), 2019.
- G. S., K. K., K. G., R. J.J.P.C, and G. M., “Secure and lightweight authentication scheme for smart metering infrastructure in smart grid,” IEEE Transactions on Industrial Informatics, vol. 16, no. 5, pp. 3548–3557, 2020.
- P. Kumar, A. Gurtov, M. Sain, A. Martin, and P. H. Ha, “Lightweight authentication and key agreement for smart metering in smart energy networks,” IEEE Transactions on Smart Grid, vol. 10, no. 4, pp. 4349–4359, 2018.
- K. Mahmood, S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, and A. K. Sangaiah, “An elliptic curve cryptography based lightweight authentication scheme for smart grid communication,” Future Generation Computer Systems, vol. 81, pp. 557–565, 2018.
- A. Mohammadali, M. S. Haghighi, M. H. Tadayon, and A. Mohammadi-Nodooshan, “A novel identity-based key establishment method for advanced metering infrastructure in smart grid,” IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 2834–2842, 2016.
- M. Delavar, S. Mirzakuchaki, M. H. Ameri, and J. Mohajeri, “Puf-based solutions for secure communications in advanced metering infrastructure (ami),” International Journal of Communication Systems, vol. 30, no. 9, p. e3195, 2017.
- S. Khasawneh and M. Kadoch, “Hybrid cryptography algorithm with precomputation for advanced metering infrastructure networks,” Mobile Networks and Applications, vol. 23, no. 4, pp. 982–993, 2018.
- J. Daemen and V. Rijmen, The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.
- V. Odelu, A. K. Das, M. Wazid, and M. Conti, “Provably secure authenticated key agreement scheme for smart grid,” IEEE Transactions on Smart Grid, vol. 9, no. 3, pp. 1900–1910, 2016.
- V. Odelu, A. K. Das, and A. Goswami, “A secure biometrics-based multi-server authentication protocol using smart cards,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1953–1966, 2015.
- D. Abbasinezhad-Mood and M. Nikooghadam, “An ultra-lightweight and secure scheme for communications of smart meters and neighborhood gateways by utilization of an arm cortex-m microcontroller,” IEEE Transactions on Smart Grid, vol. 9, no. 6, pp. 6194–6205, 2017.
- J. Ni, K. Zhang, X. Lin, and X. S. Shen, “Balancing security and efficiency for smart metering against misbehaving collectors,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 1225–1236, 2017.
- J. Ni, K. Zhang, K. Alharbi, X. Lin, N. Zhang, and X. S. Shen, “Differentially private smart metering with fault tolerance and range-based filtering,” IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2483–2493, 2017.
- A. Hansen, J. Staggs, and S. Shenoi, “Security analysis of an advanced metering infrastructure,” International Journal of Critical Infrastructure Protection, vol. 18, pp. 3–19, 2017.
- S. Zhou and M. A. Brown, “Smart meter deployment in europe: A comparative case study on the impacts of national policy schemes,” Journal of Cleaner Production, vol. 144, pp. 22–32, 2017.
- E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani, “Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges,” IEEE Wireless Communications, vol. 23, no. 5, pp. 10–16, 2016.
- Enerserve, “Smartpi manual.” https://www.enerserve.eu/en/service/smartpi/manual.html.
- I. E. Technology, “Node-red guide.” https://nodered.org/docs/.
- M. Lekić and G. Gardašević, “Iot sensor integration to node-red platform,” in 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH), pp. 1–5, IEEE, 2018.
- R. P. Díaz-Redondo, A. Fernández-Vilas, and A. Estévez Caldas, “Monitoring electricity consumption based on time series analysis,” in 16th International Conference on Intelligent Environments, Workshop on Research on Smart Grids and Related Applications, 2020.
- J. Deng and P. Jirutitijaroen, “Short-term load forecasting using time series analysis: A case study for singapore,” in 2010 IEEE Conference on Cybernetics and Intelligent Systems, IEEE, 2010.
- S. Seabold and J. Perktold, “Statsmodels: Econometric and statistical modeling with python,” in Proceedings of the 9th Python in Science Conference, vol. 57, p. 61, Scipy, 2010.
- S. M. Pincus, “Approximate entropy as a measure of system complexity.,” Proceedings of the National Academy of Sciences, vol. 88, no. 6, pp. 2297–2301, 1991.
- Z. Y. Wu, Y. He, and Q. Li, “Comparing deep learning with statistical control methods for anomaly detection,” in WDSA/CCWI Joint Conference Proceedings, vol. 1, 2018.
- B. Rosner, “Percentage points for a generalized esd many-outlier procedure,” Technometrics, vol. 25, no. 2, pp. 165–172, 1983.
- S. Salvador and P. Chan, “Toward accurate dynamic time warping in linear time and space,” Intelligent Data Analysis, vol. 11, no. 5, pp. 561–580, 2007.
- P. Senin, “Dynamic time warping algorithm review,” Information and Computer Science Department University of Hawaii at Manoa Honolulu, USA, vol. 855, no. 1-23, p. 40, 2008.
- F. Castro-Jul, R. P. Díaz-Redondo, A. Fernández-Vilas, S. Chabridon, and D. Conan, “Fog architectures and sensor location certification in distributed event-based systems,” Sensors, vol. 19, no. 1, p. 104, 2019.
- R. P. D. Redondo and A. F. Vilas, “Smart grids monitoring: A fog-computing strategy to detect anomalies,” in 2018 IEEE 59th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON), pp. 1–5, IEEE, 2018.
- N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset,” Future Generation Computer Systems, vol. 100, pp. 779–796, 2019.
- S. Iyer, “Cyber security for smart grid, cryptography, and privacy,” International Journal of Digital Multimedia Broadcasting, vol. 2011, 2011.