publication . Preprint . Conference object . 2018

Review of Cyber-Physical Attacks and Counter Defense Mechanisms for Advanced Metering Infrastructure in Smart Grid

Longfei Wei; Luis Puche Rondon; Amir Moghadasi; Arif I. Sarwat;
Open Access English
  • Published: 18 May 2018
Abstract
The Advanced Metering Infrastructure (AMI) is a vital element in the current development of the smart grid. AMI technologies provide electric utilities with an effective way of continuous monitoring and remote control of smart grid components. However, owing to its increasing scale and cyber-physical nature, the AMI has been faced with security threats in both cyber and physical domains. This paper provides a comprehensive review of the crucial cyber-physical attacks and counter defense mechanisms in the AMI. First, two attack surfaces are surveyed in the AMI including the communication network and smart meters. The potential cyber-physical attacks are then revi...
Persistent Identifiers
Subjects
free text keywords: Computer Science - Cryptography and Security, Telecommunications network, Smart grid, Continuous monitoring, Computer science, Computer security, computer.software_genre, computer, Cyber-physical system, Attack surface, Remote control, law.invention, law, Metering mode, Attack model
Related Organizations
31 references, page 1 of 3

[1] L. Wei, A. Sarwat, W. Saad, and S. Biswas, “Stochastic games for power grid protection against coordinated cyber-physical attacks,” IEEE Trans. on Smart Grid, vol. PP, no. 99, pp. 1-1, 2017.

[2] I. Parvez, A. Sundararajan, and A. Sarwat, “Frequency band for han and nan communication in smart grid,” in IEEE Symposium on Computational Intelligence Applications in Smart Grid (CIASG), Orlando, Dec. 2014. [OpenAIRE]

[3] A. Anzalchi and A. Sarwat, “A survey on security assessment of metering infrastructure in smart grid systems,” in IEEE Southeast Conference, Fort Lauderdale, 2015. [OpenAIRE]

[4] I. Parvez, A. I. Sarwat, L. Wei, and A. Sundararajan, “Securing metering infrastructure of smart grid: A machine learning and localization based key management approach,” Energies, vol. 9, no. 9, 2016. [OpenAIRE]

[5] P.-Y. Chen, S. M. Cheng, and K.-C. Chen, “Smart attacks in smart grid communication networks,” IEEE Commun. Mag., vol. 50, no. 8, pp. 24- 29, 2012.

[6] S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber attack-resilient control for smart grid,” in 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), Jan 2012, pp. 1-3.

[7] S. Baker, N. Filipiak, and K. Timlin, “In the dark: Crucial industries confront cyber attacks,” 2014.

[8] E. Naone, “Hacking the smart grid,” 2010.

[9] P. Yi, T. Zhu, Q. Zhang, Y. Wu, and J. Li, “A denial of service attack in advanced metering infrastructure network,” in 2014 IEEE International Conference on Communications (ICC), June 2014, pp. 1029-1034.

[10] P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security Privacy, vol. 7, no. 3, pp. 75-77, May 2009.

[11] F. M. Cleveland, “Cyber security issues for advanced metering infrasttructure (ami),” in 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, July 2008, pp. 1-5.

[12] S. Amin, G. A. Schwartz, A. A. Cardenas, and S. S. Sastry, “Gametheoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure,” IEEE Control Systems, vol. 35, no. 1, pp. 66-81, Feb 2015.

[13] R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. S. Shen, “Energytheft detection issues for advanced metering infrastructure in smart grid,” Tsinghua Science and Technology, vol. 19, no. 2, pp. 105-120, April 2014.

[14] S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, and S. Zonouz, “A multi-sensor energy theft detection framework for advanced metering infrastructures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1319-1330, July 2013.

[15] E. de Buda, “System for accurately detecting electricity theft,” Patent US 20 100 007 336 A1, January, 2010.

31 references, page 1 of 3
Abstract
The Advanced Metering Infrastructure (AMI) is a vital element in the current development of the smart grid. AMI technologies provide electric utilities with an effective way of continuous monitoring and remote control of smart grid components. However, owing to its increasing scale and cyber-physical nature, the AMI has been faced with security threats in both cyber and physical domains. This paper provides a comprehensive review of the crucial cyber-physical attacks and counter defense mechanisms in the AMI. First, two attack surfaces are surveyed in the AMI including the communication network and smart meters. The potential cyber-physical attacks are then revi...
Persistent Identifiers
Subjects
free text keywords: Computer Science - Cryptography and Security, Telecommunications network, Smart grid, Continuous monitoring, Computer science, Computer security, computer.software_genre, computer, Cyber-physical system, Attack surface, Remote control, law.invention, law, Metering mode, Attack model
Related Organizations
31 references, page 1 of 3

[1] L. Wei, A. Sarwat, W. Saad, and S. Biswas, “Stochastic games for power grid protection against coordinated cyber-physical attacks,” IEEE Trans. on Smart Grid, vol. PP, no. 99, pp. 1-1, 2017.

[2] I. Parvez, A. Sundararajan, and A. Sarwat, “Frequency band for han and nan communication in smart grid,” in IEEE Symposium on Computational Intelligence Applications in Smart Grid (CIASG), Orlando, Dec. 2014. [OpenAIRE]

[3] A. Anzalchi and A. Sarwat, “A survey on security assessment of metering infrastructure in smart grid systems,” in IEEE Southeast Conference, Fort Lauderdale, 2015. [OpenAIRE]

[4] I. Parvez, A. I. Sarwat, L. Wei, and A. Sundararajan, “Securing metering infrastructure of smart grid: A machine learning and localization based key management approach,” Energies, vol. 9, no. 9, 2016. [OpenAIRE]

[5] P.-Y. Chen, S. M. Cheng, and K.-C. Chen, “Smart attacks in smart grid communication networks,” IEEE Commun. Mag., vol. 50, no. 8, pp. 24- 29, 2012.

[6] S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber attack-resilient control for smart grid,” in 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), Jan 2012, pp. 1-3.

[7] S. Baker, N. Filipiak, and K. Timlin, “In the dark: Crucial industries confront cyber attacks,” 2014.

[8] E. Naone, “Hacking the smart grid,” 2010.

[9] P. Yi, T. Zhu, Q. Zhang, Y. Wu, and J. Li, “A denial of service attack in advanced metering infrastructure network,” in 2014 IEEE International Conference on Communications (ICC), June 2014, pp. 1029-1034.

[10] P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security Privacy, vol. 7, no. 3, pp. 75-77, May 2009.

[11] F. M. Cleveland, “Cyber security issues for advanced metering infrasttructure (ami),” in 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, July 2008, pp. 1-5.

[12] S. Amin, G. A. Schwartz, A. A. Cardenas, and S. S. Sastry, “Gametheoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure,” IEEE Control Systems, vol. 35, no. 1, pp. 66-81, Feb 2015.

[13] R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. S. Shen, “Energytheft detection issues for advanced metering infrastructure in smart grid,” Tsinghua Science and Technology, vol. 19, no. 2, pp. 105-120, April 2014.

[14] S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, and S. Zonouz, “A multi-sensor energy theft detection framework for advanced metering infrastructures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1319-1330, July 2013.

[15] E. de Buda, “System for accurately detecting electricity theft,” Patent US 20 100 007 336 A1, January, 2010.

31 references, page 1 of 3
Any information missing or wrong?Report an Issue