Analysis of the Security Anomalies in the Smart Metering Infrastructure and Its Impact on Energy Profiling and Measurement

Pallab Ganguly, Sumit Poddar, Sourav Dutta, Mita Nasipuri

2016

Abstract

Security of the smart metering infrastructure, which is a part of the smart grid initiative, intended at transitioning the legacy power grid system into a robust, reliable, adaptable and intelligent energy utility, is an imminent problem that needs to be addressed quickly. Moreover, the increasingly intensifying integration of smart metering infrastructure with other ecosystem applications and the underlying communication technology is forcing both the consumer and the utility provider to meticulously look into the security and privacy issues of the smart grid. To achieve this, improvements on the existing architecture that uses smart meters interacting with smart grid is needed. This architecture would help in consolidation and aggregation of the energy usage and generation as intelligent communicators instead of focusing them as isolated passive units in the energy grid. The study presented in the paper analyses the various existing smart metering infrastructure, threats and vulnerabilities that has the potential to disrupt the operation and deployment of automation systems in smart grids. Furthermore, an elaborate study and subsequent analysis have been made on a live consumer meter setup in a non-invasive manner, which shows the various security loopholes and deficiencies of a large deployment of unattended smart meters. The study identifies the potential gaps and suggests possible measures for a cost effective and robust solution to cater for present as well as future needs.

References

  1. Peter Palensky “Demand Side Management: Demand Response, Intelligent Energy Systems, and Smart Loads” Delft University of Technology, IEEE Transactions on Industrial Informatics, September, 2011.
  2. Carpenter M. Hacking AMI. (2008). [Online]. Available: http://inguardians.com/pubs/090202-SANS SCADAHackingAMI.pdf.
  3. Lawson N. Reverse-engineering a smart meter. (2010). [Online].Available: http://rdist.root.org/2010/02/15/reverse-engineering-a smart-meter.
  4. Mike Davis- Senior Security Consultant at Black Hat USA 2009, “Smart Grid Device Security Adventures in a new medium”.
  5. Khalifa, T.; Naik, K.; Nayak, A, "A Survey of Communication Protocols for Automatic Meter Reading Applications,” Communications Volume: 13, Issue: 2 , 2011.
  6. Feuerhahn, S.; Zillgith, M.; Wittwer, C.; Wietfeld, C, "Comparison of the Communication Protocols DLMS/COSEM, SML and IEC 61850 for Smart Metering Applications," Smart Grid Communications (SmartGridComm), IEEE International Conference, 2011.
  7. Ye Yan, Hu R. Q, Das S. K, Sharif H,” An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid. ”Network, IEEE Volume: 27, Issue: 4, Publication Year: 2013, Page(s): 64 - 71.
  8. Ye Yan, Yi Qian, Hamid Sharif, and David Tipper, “A Survey on Cyber Security for Smart Grid Communications,” IEEE Communications Surveys and Tutorials, Vol.14, Issue 4, pp.998-1010, 4th Quarter 2012.
  9. Ye Yan, Yi Qian, Hamid Sharif, and David Tipper, “A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges,” IEEE Communications Surveys and Tutorials, Vol.15, Issue 1, pp.5-20, 1st Quarter 2013.
  10. Mehra, T, Dehalwar, V, Kolhe, M, “Data Communication Security of Advanced Metering Infrastructure in Smart Grid,” 2013 5th IEEE International Conference on Computational Intelligence and Communication Networks.
  11. Florian Skopik, Zhengdong Ma, Thomas Bleier, Helmut Gruneis, "A Survey on Threats and Vulnerabilities in Smart Metering Infrastructure," International Journal of Smart Grid and Clean Energy, August 13.
  12. Rajiv. K. Bhatia, Varsha Bodade, "Smart Grid Security and Privacy: Challenges, literature Survey and Issues," International Journal of Advanced Research in Computer Science and Software Engineering, volume 4, Issue 1, January 2014.
  13. Yonghe Guo, Chee-Wooi Ten, Shiyan Hu, Wayne Weaver, “Modeling Distributed Denial of Service Attack in Advanced Metering Infrastructure," IEEE PES Innovative Smart Grid Technologies, Washington, DC; December 2015.
  14. Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., and Cepeda, R. Privacy for smart meters: Towards undetectable appliance load signatures. 2010 First IEEE International Conference on Smart Grid Communications (2010), 232-237.
  15. Khurana H, Hadley M, Lu N, and Frincke D,” Smart-Grid Security Issues.”, IEEE Security & Privacy, 2010; 8(1)81-85.
  16. F. Aloul, A. R. Al-Ali, R. Al-Dalky, M. Al-Mardini and W. El-Hajj, " Smart Grid Security: Threats, Vulnerabilities and Solutions," International Journal of Smart Grid and Clean Energy (IJSGCE), 1-6, September 2012.
  17. J. Liu, Y. Xiao, S. Li, W. Liang, and C. L. P. Chen, “Cyber Security and Privacy Issues in Smart Grids,78 IEEE Communication Survey and Tutorials, pp. 981- 997, Vol. 14, No. 4, 2012.
  18. Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, Patrick Drew McDaniel, “Multi-vendor penetration testing in the advanced metering infrastructure.”ACSAC 2010: 107- 116.
  19. Marek Jawurek, Felix C. Freiling, “Privacy Threat Analysis of Smart Metering,” informatik 2011.
  20. Salman Yussof, Mohd. Ezanee Rusli, Yunus Yusoff, Roslan Ismail, Azimah Abdul Ghapar, “Financial Impacts of Smart Meter Security and Privacy Breach,” 2014 IEEE International Conference on Information Technology and Multimedia (ICIMU), November 18 - 20, 2014, Putrajaya, Malaysia.
  21. Elias Leake “Privacy and the New Energy Infrastructure”, Fall 2008, Center for Energy and Environmental Security, CEES Working Paper No.09-001.
  22. S Finster and I Baumgart, “Privacy-aware smart metering: A survey", IEEE Communication Surveys and Tutorials, 2015.
  23. The Smart Grid Interoperability Panel - Cyber Security Working Group, Guidelines for smart grid cyber security, NISTIR 7628 (2010) 1-597.
Download


Paper Citation


in Harvard Style

Ganguly P., Poddar S., Dutta S. and Nasipuri M. (2016). Analysis of the Security Anomalies in the Smart Metering Infrastructure and Its Impact on Energy Profiling and Measurement . In Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems - Volume 1: SMARTGREENS, ISBN 978-989-758-184-7, pages 302-308. DOI: 10.5220/0005792303020308


in Bibtex Style

@conference{smartgreens16,
author={Pallab Ganguly and Sumit Poddar and Sourav Dutta and Mita Nasipuri},
title={Analysis of the Security Anomalies in the Smart Metering Infrastructure and Its Impact on Energy Profiling and Measurement},
booktitle={Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems - Volume 1: SMARTGREENS,},
year={2016},
pages={302-308},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005792303020308},
isbn={978-989-758-184-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Smart Cities and Green ICT Systems - Volume 1: SMARTGREENS,
TI - Analysis of the Security Anomalies in the Smart Metering Infrastructure and Its Impact on Energy Profiling and Measurement
SN - 978-989-758-184-7
AU - Ganguly P.
AU - Poddar S.
AU - Dutta S.
AU - Nasipuri M.
PY - 2016
SP - 302
EP - 308
DO - 10.5220/0005792303020308