[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A framework for intrusion detection system in advanced metering infrastructure

Published: 01 January 2014 Publication History

Abstract

Advanced metering infrastructure AMI is one of the key elements in smart grid, which facilitates the communication of metering data to a substation in one direction and control messages in the reverse direction. Using wireless technologies and communication devices e.g., smart meters, which are located in the physically insecure places, makes the AMI vulnerable to cyber attacks. In order to ensure the reliability and security of AMI, attack prevention techniques and intrusion detection systems IDSs should be in place to protect the AMI communications from malicious attacks and security breaches, respectively. In this paper, we discuss the security requirements and vulnerabilities of AMI and review the existing threat prevention and detection solutions. We propose an IDS for neighborhood area network NAN in AMI, taking into account the NAN-specific requirements. Copyright © 2012 John Wiley & Sons, Ltd.

References

[1]
Berthier R, Sanders WH. Specification-based intrusion detection for advanced metering infrastructures. IEEE 17th Pacific Rim International Symposium on Dependable Computing PRDC, 2011; pp.184-193.
[2]
Parks RC. Advanced metering infrastructure security considerations, 2007.
[3]
Cleveland FM. Cyber security issues for advanced metering infrastructure AMI. IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, 2008; pp.1-5.
[4]
Rahimi F, Ipakchi A. Demand response as a market resource under the smart grid paradigm. IEEE Transactions on Smart Grid Jun 2010; Volume 1 Issue 1: pp.82-88.
[5]
Li F, Qiao W, Sun H, et al. Smart transmission grid: vision and framework. IEEE Transactions on Smart Grid Sep 2010; Volume 1 Issue 2: pp.168-177.
[6]
Wang W, Xu Y, Khanna M. A survey on the communication architectures in smart grid. Computer Networks 2011; Volume 55 Issue 15: pp.3604-3629.
[7]
Fadlullah ZM, Fouda MM, Kato N, Takeuchi A, Iwasaki N, Nozaki Y. Toward intelligent machine-to-machine communications in smart grid. IEEE Communications Magazine Apr 2011; Volume 49 Issue 4: pp.60-65.
[8]
Sauter T, Lobashov M. End-to-end communication architecture for smart grids. IEEE Transactions on Industrial Electronics Apr 2011; Volume 58 Issue 4: pp.1218-1228.
[9]
Introduction to NISTIR 7628 guidelines for smart grid cyber security, Sep 2010.
[10]
Report to NIST on smart grid interoperability standards roadmap EPRI, Jun 2009.
[11]
Bennett C, Highfill D. Networking AMI smart meters. IEEE Conference on Energy, 2008; pp.1-8.
[12]
Wang X, Yi P. Security framework for wireless communications in smart distribution grid. IEEE Transactions on Smart Grid Dec 2011; Volume 2 Issue 4: pp.809-818.
[13]
Parikh PP, Kanabar MG, Sidhu TS. Opportunities and challenges of wireless communication technologies for smart grid applications. IEEE Power and Energy Society General Meeting, 2010; pp.1-7.
[14]
Berthier R, Sanders WH, Khurana H. Intrusion detection for advanced metering infrastructures: requirements and architectural directions. First IEEE International Conference on Smart Grid Communications SmartGridComm, 2010; pp.350-355.
[15]
McLaughlin S, Podkuiko D, Miadzvezhanka S, Delozier A, McDaniel P. Multi-vendor penetration testing in the advanced metering infrastructure. Proceedings of the 26th Annual Computer Security Applications Conference, 2010; pp.107-116.
[16]
McDaniel P, McLaughlin S. Security and privacy challenges in the smart grid. IEEE Security Privacy Jun 2009; Volume 7 Issue 3: pp.75-77.
[17]
Yan Y, Qian Y, Sharif H. A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid. IEEE Wireless Communications and Networking Conference WCNC, 2011; pp.909-914.
[18]
Lu Z, Lu X, Wang W, Wang C. Review and evaluation of security threats on the communication networks in the smart grid. Military Communication Conference, MILCOM, 2010; pp.1830-1835.
[19]
LeMay M, Gunter C. Cumulative attestation kernels for embedded systems. In Computer Security, ESORICS. Springer: Berlin, Heidelberg, 2009; pp.655-670.
[20]
Schuba CL, Krsul IV, Kuhn MG, Spafford EH, Sundaram A, Zamboni D. Analysis of a denial of service attack on tcp. IEEE Symposium on Security and Privacy, Proceedings, 1997; pp.208-223.
[21]
Yaar A, Perrig A, Song D. Pi: a path identification mechanism to defend against DDoS attacks. Symposium on Security and Privacy, Proceedings, 2003; pp.93-107.
[22]
Metke AR, Ekl RL. Security technology for smart grid networks. IEEE Transactions on Smart Grid Jun 2010; Volume 1 Issue 1: pp.99-107.
[23]
So HK, Kwok SHM, Lam EY, Lui K. Zero-configuration identity-based signcryption scheme for smart grid. First IEEE International Conference on Smart Grid Communications SmartGridComm, 2010; pp.321-326.
[24]
Efthymiou C, Kalogridis G. Smart grid privacy via anonymization of smart metering data. First IEEE International Conference on Smart Grid Communications SmartGridComm, 2010; pp.238-243.
[25]
Aravinthan V, Namboodiri V, Sunku S, Jewell W. Wireless AMI application and security for controlled home area networks. IEEE Power and Energy Society General Meeting, 2011; pp.1-8.
[26]
Bartoli A, Hernandez-Soriano J, Dohler M, Kountouris A, Barthel D. Secure lossless aggregation for smart grid m2m networks. First IEEE International Conference on Smart Grid Communications SmartGridComm, 2010; pp.333-338.
[27]
Thonet G, Allard-Jacquin P, Colle P. ZigBee-WiFi coexistence. Technical Report, Schnider Electric, Apr 2008.
[28]
Bishop M. Introduction to Computer Security. Addison-Wesley: Boston, MA, 2004.
[29]
Jokar P, Nicanfar H, Leung V. Specification-based intrusion detection for home area networks in smart grids. IEEE International Conference on Smart Grid Communications SmartGridComm, 2011; pp.208-213.
[30]
Kush N, Foo E, Ahmed E, Ahmed I, Clark A. Gap analysis of intrusion detection in smart grids. In 2nd International Cyber Resilience Conference, Valli C ed. Secau-Security Research Centre, 2011; pp.38-46.
[31]
Roosta T, Nilsson DK, Lindqvist U, Valdes A. An intrusion detection system for wireless process control systems. 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS, 2008; pp.866-872.
[32]
Iyer G, Agrawal P, Monnerie E, Cardozo RS. Performance analysis of wireless mesh routing protocols for smart utility networks. IEEE International Conference on Smart Grid Communications SmartGridComm, 2011; pp.114-119.
[33]
Kulkarni P, Gormus S, Fan Z, Motz B. A self-organising mesh networking solution based on enhanced RPL for smart metering communications. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks WoWMoM, 2011; pp.1-6.
[34]
Aimajali A, Viswanathan A, Neuman C. Analyzing resiliency of the smart grid communication architectures under cyber attack. 5th Workshop on Cyber Security Experimentation and Test, 2012.
[35]
Bennett C, Wicker SB. Decreased time delay and security enhancement recommendations for AMI smart meter networks. Innovative Smart Grid Technologies ISGT, 2010; pp.1-6.
[36]
Jung J, Lim K, Kim J, Ko Y, Kim Y, Lee S. Improving IEEE 802.11s wireless mesh networks for reliable routing in the smart grid infrastructure. IEEE International Conference on Communications Workshops ICC, 2011; pp.1-5.
[37]
Task force IETF routing over low power IE, lossy networks ROLL working group. Routing over low power and lossy networks RPL. Technical Report, Dec 2010.
[38]
Wang D, Tao Z, Zhang J, Abouzeid AA. RPL based routing for advanced metering infrastructure in smart grid. IEEE International Conference on Communications Workshops ICC, 2010; pp.1-6.
[39]
Iwao T, Yamada K, Yura M, et al. Dynamic data forwarding in wireless mesh networks. First IEEE International Conference on Smart Grid Communications SmartGridComm, 2010; pp.385-390.
[40]
Beigi-Mohammadi N, Khazaei H, Misic J, Misic VB. On intrusion detection in a neighborhood area network in the smart grid. Journal of Information Technology and Applications JITA Jun 2012; Volume 2 Issue 1: pp.7-13.
[41]
Blum J, Neiswender A, Eskandarian A. Denial of service attacks on inter-vehicle communication networks. International IEEE Conference on Intelligent Transportation Systems, ITSC, 2008; pp.797-802.
[42]
Lopez J, Roman R, Alcaraz C. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of Security Analysis and Design V, vol. 5705. Springer: Berlin, Heidelberg, 2009; pp.289-338.
[43]
Fadlullah Z, Fouda M, Kato N, Shen X, Nozaki Y. An early warning system against malicious activities for smart grid communications. IEEE Network Oct 2011; Volume 25 Issue 5: pp.50-55.

Cited By

View all
  • (2022)A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy SystemsProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3543820(1-10)Online publication date: 23-Aug-2022
  • (2020)Detecting DDoS Attacks Using Polyscale Analysis and Deep LearningInternational Journal of Cognitive Informatics and Natural Intelligence10.4018/IJCINI.202001010214:1(17-34)Online publication date: 1-Oct-2020
  • (2020)Advanced metering infrastructuresProceedings of the 15th International Conference on Availability, Reliability and Security10.1145/3407023.3409312(1-8)Online publication date: 25-Aug-2020
  • Show More Cited By
  1. A framework for intrusion detection system in advanced metering infrastructure

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Security and Communication Networks
      Security and Communication Networks  Volume 7, Issue 1
      January 2014
      244 pages
      ISSN:1939-0114
      EISSN:1939-0122
      Issue’s Table of Contents

      Publisher

      John Wiley & Sons, Inc.

      United States

      Publication History

      Published: 01 January 2014

      Author Tags

      1. AMI
      2. intrusion detection system
      3. neighborhood area network
      4. security
      5. smart grid

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy SystemsProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3543820(1-10)Online publication date: 23-Aug-2022
      • (2020)Detecting DDoS Attacks Using Polyscale Analysis and Deep LearningInternational Journal of Cognitive Informatics and Natural Intelligence10.4018/IJCINI.202001010214:1(17-34)Online publication date: 1-Oct-2020
      • (2020)Advanced metering infrastructuresProceedings of the 15th International Conference on Availability, Reliability and Security10.1145/3407023.3409312(1-8)Online publication date: 25-Aug-2020
      • (2018)A survey of intrusion detection systems in smart gridInternational Journal of Sensor Networks10.1504/IJSNET.2017.08341023:3(170-186)Online publication date: 27-Dec-2018
      • (2015)HIBaSSSecurity and Communication Networks10.1002/sec.12178:16(2901-2908)Online publication date: 10-Nov-2015

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media