2,121 research outputs found

    Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation

    Get PDF
    Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth utilization of AMI. However, the concentrator poses a great risk of being tampered with, leading to erroneous bills and possible consumer disputes. In this paper, we propose an end-to-end integrity protocol using elliptic curve based chameleon hashing to provide data integrity and authenticity. The concentrator generates and sends a chameleon hash value of the aggregated readings to the Meter Data Management System (MDMS) for verification, while the smart meter with the trapdoor key computes and sends a commitment value to the MDMS so that the resulting chameleon hash value calculated by the MDMS is equivalent to the previous hash value sent by the concentrator. By comparing the two hash values, the MDMS can validate the integrity and authenticity of the data sent by the concentrator. Compared with the discrete logarithm implementation, the ECC implementation reduces the computational cost of MDMS, concentrator and smart meter by approximately 36.8%, 80%, and 99% respectively. We also demonstrate the security soundness of our protocol through informal security analysis

    Evaluation of Cybersecurity Threats on Smart Metering System

    Get PDF
    Smart metering has emerged as the next-generation of energy distribution, consumption, and monitoring systems via the convergence of power engineering and information and communication technology (ICT) integration otherwise known as smart grid systems. While the innovation is advancing the future power generation, distribution, consumption monitoring and information delivery, the success of the platform is positively correlated to the thriving integration of technologies upon which the system is built. Nonetheless, the rising trend of cybersecurity attacks on cyber infrastructure and its dependent systems coupled with the systemā€™s inherent vulnerabilities present a source of concern not only to the vendors but also the consumers. These security concerns need to be addressed in order to increase consumer confidence so as to ensure greatest adoption and success of smart metering. In this paper, we present a functional communication architecture of the smart metering system. Following that, we demonstrate and discuss the taxonomy of smart metering common vulnerabilities exposure, upon which sophisticated threats can capitalize. We then introduce countermeasure techniques, whose integration is considered pivotal for achieving security protection against existing and future sophisticated attacks on smart metering systems

    Securing the IOT Based Smart Meter Monitoring Using AES Algorithm

    Get PDF
    Smart meter is the upgradation of the existing meter in terms of cost, communication infrastructure, internet of things and reliable technologies. In the ambitious flagship programme of digital India-project an initiative of India, the potential fields of the missions are identified in the area are smart energy, smart meters, smart homes, and smart cities. More than 100 smart cities are planned for information and communication technology-driven solutions with big data analytics in India. The exponential growth in smart meter has given certain security risks, cyber threats and protection of stored data as Nation security. Smart meters, comprising of several communication, monitoring intelligent, metering and electrical equipment used in power meter, have a greater exposure to meter security and cyber-attacks which potentially disrupt distribution in a city. The paper proposed the energy meter with Advanced Encryption Standard (AES) algorithm enable with NodeMCU hardware. The data generated by the energy meter is stored in the cloud using AES algorithm to secure this data from intruders. This system ensures the AES can be employed in smart meter security and communication infrastructure

    Smart Grid Technologies in Europe: An Overview

    Get PDF
    The old electricity network infrastructure has proven to be inadequate, with respect to modern challenges such as alternative energy sources, electricity demand and energy saving policies. Moreover, Information and Communication Technologies (ICT) seem to have reached an adequate level of reliability and flexibility in order to support a new concept of electricity networkā€”the smart grid. In this work, we will analyse the state-of-the-art of smart grids, in their technical, management, security, and optimization aspects. We will also provide a brief overview of the regulatory aspects involved in the development of a smart grid, mainly from the viewpoint of the European Unio

    Smart meter: Applications, security issues and challenges

    Get PDF
    The smart meter is an important intelligent device on the Smart Grid that has the capability to report information related to power consumption, billing and other significant readings.The protection of smart meter communications against attacks is essential to ensure reliable operations of the Smart Grid.In this paper, we give an overview of smart meter applications, and we discuss the security issues and attacks that can be performed on the smart meter and that may have severe impacts on the global Smart Grid network
    • ā€¦
    corecore