Abstract
The literature does not present integral solutions to allow using the same credential to access the smart meter and smart house from an electric utility and vice-versa. The main reason being the technology gap in the communication between the Advanced Metering Infrastructure (AMI) and the Internet. The technology used in the Internet domain to communicate with Data Concentrators (DC) and the electric utility is more powerful than the technology used in the communication between smart meters and the DC, which is bandwidth limited and better suited to the Internet of Things (IoT) domain. Therefore, we are proposing the use of Identity Management (IdM) and a key-based scheme to enable the integration of IoT and the Internet using the same credentials, without creating a security bottleneck in the communication. An additional security mechanism is provided in the smart house context to isolate the house from direct accesses from the Internet, though allowing the utility to reconfigure the electric power consumption profile to avoid a potential blackout, for instance. Our proposal includes multi-sensor anti-tampering techniques to provide physical protection to a smart meter, in conjunction with a multilevel integrity mechanism to provide logical protection to its resource-constrained microcontroller, given the smart meter is a key component to mitigate electricity consumption fraud. The prototype has shown that our proposal is feasible for protecting the smart house, smart meter and the end-to-end communication between smart meter or house and the utility.
Similar content being viewed by others
References
Cai Z, Yu M, Steurer M, Li H, Dong Y (2016) A network model for the real-time communications of a smart grid prototype. J Netw Comput Appl 59:264–273
Gungor VC, Sahin D, Kocak T, Ergut S, Buccella C, Cecati C, Hancke GP (2013) A survey on smart grid potential applications and communication requirements. IEEE Trans Ind Inf 9(1):28–42
Shiobara T, Palensky P, Nishi H (2015) Effective metering data aggregation for smart grid communication infrastructure, IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society, Yokohama, pp. 2136–2141. https:/doi.org/10.1109/IECON.2015.7392417
Emmanuel M, Rayudu R (2016) Communication technologies for smart grid applications: a survey. J Netw Comput Appl 74:133–148
Ganzha M, Paprzycki M, Pawłowski W, Szmeja P, Wasielewska K (2016) Semantic interoperability in the internet of things: an overview from the INTER-IoT perspective. J Netw Comput Appl 81:111–124
OpenID Connect Core 1.0 Available at: http://openid.net/specs/openid-connect-core-1_0.html. Accessed March 2017
Infoworld. Millions of embedded devices use the same hard-coded SSH and TLS private keys. Available at: http://www.infoworld.com/article/3009667/security/millions-of-embedded-devices-use-the-same-hard-coded-ssh-and-tls-private-keys.html. Accessed March 2017
Hacker News Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys. Available at: http://thehackernews.com/2015/11/iot-device-crypto-keys.html. Accessed March 2017
ZDnet Smart meter hacking tool released. Available at: http://www.zdnet.com/article/smart-meter-hacking-tool-released/. Accessed March 2017
Patel SC, Sanyal P (2008) Securing SCADA systems. Inf Manag Comput Secur 16(4):398–414
Warmer C, Kok K, Karnouskos S, Weidlich A, Nestle D, Selzam P, Ringelstein j, Dimeas A, andDrenkard S (2009) Web services for integration of smart houses in the smart grid. Proc of Grid-Interop Conference, Denver, USA, pp. 1–5
Yan Y, Qian Y, Sharif H, Tipper D (2013) A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Commun Surv Tutorials 15(1):5–20
ZDnet Could lax smart meter security blackout the UK? Available at: http://www.zdnet.com/article/could-lax-smart-meter-security-blackout-the-uk/. Accessed March 2017
Tanimoto S, Kinno R, Iwashita M, Kobayashi T, Sato H, Kanai A (2016) Risk assessment of home gateway/smart meter in smart grid service. Proc Int Congr Adv Appl Informatics:1126–1131
Kołodziej J, Jaatun MG, Khan SU, Koeppen M (2013) Security-aware and data intensive low-cost mobile systems. Mob Networks Appl 18(5):591–593
Liu J, Xiao Y, Chen CLP (2012) Authentication and access control in the internet of things. 32nd International Conference on Distributed Computing Systems Workshops, Macau, pp. 588–592. https:/doi.org/10.1109/ICDCSW.2012.23
Chin WL, Lin YH, Chen HH (2016) A framework of machine-to-machine authentication in smart grid: a two-layer approach. IEEE Commun Mag 54(12):102–107
Saxena N, Choi BJ (2016) Integrated distributed authentication protocol for smart grid communications. IEEE Syst J:(99)1–12. https:/doi.org/10.1109/JSYST.2016.2574699
Mohammad N, Barua A, Arafat MA (2013) A smart prepaid energy metering system to control electricity theft.2013 International Conference on Power, Energy and Control (ICPEC), Sri Rangalatchum Dindigul, pp. 562–565. https:/doi.org/10.1109/ICPEC.2013.6527721
Tangsunantham N, Ngamchuen S, Nontaboot V, Thepphaeng S, Pirak C (2013) Experimental performance analysis of current bypass anti-tampering in smart energy meters. 2013 Australasian Telecommunication Networks and Applications Conference (ATNAC), Christchurch, pp. 124–129. https:/doi.org/10.1109/ATNAC.2013.6705368
Kadurek P, Blom J, Cobben JFG, Kling WL (2010) Theft detection and smart metering practices and expectations in the Netherlands. 2010 I.E. PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe), Gothenburg, pp. 1–6. https:/doi.org/10.1109/ISGTEUROPE.2010.5638852
Fraser T (2000) LOMAC: low water-mark integrity protection for COTS environments. Proceeding 2000IEEE Symposium on Security and Privacy. S&P 2000, Berkeley, CA, pp.230–245. https:/doi.org/10.1109/SECPRI.2000.848460
Brasser F, El Mahjoub B, Sadeghi A-R, Wachsmann C, Koeberl P (2015) TyTAN: tiny trust anchor for tiny devices. 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, pp. 1–6. https:/doi.org/10.1145/2744769.2744922
Al-Ali AR, AL-Rousan M (2004) Java-based home automation system. IEEE Trans Consum Electron 50(2):498–504
Golzar MG, Tajozzakerin H (2010) “A new intelligent remote control system for home automation and reduce energy consumption,” 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation, Kota Kinabalu, Malaysia, pp. 174–180. https:/doi.org/10.1109/AMS.2010.46
Korkmaz I, Metin SK, Gurek A, Gur C, Gurakin C, Akdeniz M (2015) A cloud based and android supported scalable home automation system. Comput Electr Eng 43:112–128
Chan H, Perrig A (2003) Security and privacy in sensor networks. Computer 36(10):103–105
The hacker News. Linux Worm targets Internet-enabled Home appliances to Mine Cryptocurrencies Available at: http://thehackernews.com/2014/03/linux-worm-targets-internet-enabled.html. Accessed March 2017
Zheng J, Gao DW, Lin L (2013) Smart meters in smart grid: an overview. 2013 I.E. GreenTechnologies Conference (GreenTech), Denver, CO, pp. 57–64. https:/doi.org/10.1109/GreenTech.2013.17
Ramírez DF, Céspedes S (2015) Routing in neighborhood area networks: a survey in the context of AMI communications. J Netw Comput Appl 55:68–80
Dark Reading. Smart meter hack shuts off the lights. Available at: http://www.darkreading.com/perimeter/smart-meter-hack-shuts-off-the-lights/d/d-id/1316242. Accessed March 2017
Weiss M, Helfenstein A, Mattern F, Staake T (2012) Leveraging smart meter data to recognize home appliances. 2012 I.E. International Conference on Pervasive Computing and Communications, Lugano, pp. 190–197. https:/doi.org/10.1109/PerCom.2012.6199866
Biba KKJ (1977) Integrity considerations for secure computer systems. Proc Symp on Comput Archit 5(7):66
Witkovski A, Santin A, Abreu V, Marynowski J (2015) An IdM and key-based authentication method for providing single sign-on in IoT. 2015 I.E. Global Communications Conference (GLOBECOM), San Diego, CA, pp. 1–6. https:/doi.org/10.1109/GLOCOM.2015.7417597
Drotos D μCSim: software simulator for microcontrollers, Available at: http://mazsola.iit.uni-miskolc.hu/~drdani/ embedded/ucsim/ Accessed March 2017
IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS) (2011) End-Use Applications, and Loads, in IEEE Std 2030–2011, pp.1-126. htpps:/doi.org/10.1109/IEEESTD.2011.6018239
Wolkerstorfer M, Schweighofer B, Wegleiter H, Statovci D, Schwaiger H, Lackner W (2016) Measurement and simulation framework for throughput evaluation of narrowband power line communication links in low-voltage grids. J Netw Comput Appl 59:285–300
ANSI X9 encryption collection. Available at: http://webstore.ansi.org/RecordDetail.aspx?sku=X9+Encryption+Collection. Accessed March 2017
Vaadin OpenID Integration. Available at: https://vaadin.com/directory#!addon/openid-integration. Accessed March 2017
Java API for RESTful Services. Available at: https://jax-rs-spec.java.net/. Accessed March 2017
Eclipse Foundation, “Californium.” Available at: https://www.eclipse.org/californium/. Accessed March 2017
The Contiki Operating System. Available at: http://contiki-os.org/. Accessed March 2017
Mohammadali A, Tadayon MH, Asadian M (2014) A new key management for AMI systems based on DLMS/COSEM standard. Telecommunications (IST), 2014 7th International Symposium on, Tehran, pp. 849–856. https:/doi.org/10.1109/ISTEL.2014.7000822
Ribeiro R, Santin A, Abreu V, Marynowski J, Viegas E (2016) Providing security and privacy in smart house through mobile cloud computing. Proc of IEEE Latin-American Conference on Communications:1–6
Niewiadomska-Szynkiewicz E, Sikora A, Kołodziej J (2013) Modeling mobility in cooperative ad hoc networks. Mob Networks Appl 18(5):610–621
Acknowledgements
This work was partially sponsored by the Brazilian National Council for Scientific and Technological Development (CNPq), grants 307346/2015-3 and 404963/2013-7. Vilmar Abreu Junior wishes to thanks to CNPq for scholarship granting, process 381612/2014-7. We wish to thank for the valuable contribution to the electric engineering Alison Lando, Ivan Chueiri, Voldi Zambenedetti and Marcio Hamerschmidt (Copel). Moreover, we thanks to our partners from industry, Siemens and Copel.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Abreu, V., Santin, A., Xavier, A. et al. A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT. Mobile Netw Appl 23, 967–981 (2018). https://doi.org/10.1007/s11036-017-0960-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-017-0960-4