Mitigation of P2P Overlay Attacks in the Automatic Metering Infrastructure of Smart Grids‡

نویسندگان

  • Cristina Rottondi
  • Marco Savi
  • Giacomo Verticale
  • Christoph Krauß
چکیده

Measurements gathered by Smart Meters and collected through the Automatic Metering Infrastructure of Smart Grids can be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring. Therefore, to prevent the disclosure of personal information through the analysis of energy consumption patterns, the metering data must be securely handled. Peer-to-peer (P2P) networking is a promising approach for interconnecting communication nodes among the AMI to efficiently perform data collection while ensuring privacy and confidentiality, but it is also prone to various security attacks. This paper discusses the impact of the most relevant P2P attack scenarios on the performance of a protocol for privacy preserving aggregation of metering data. The protocol relies on communication Gateways located in the customers’ households and interconnected by means of a variant of the Chord overlay. We also propose some countermeasures to mitigate the effects of such attacks: we integrate a Verifiable Secret Sharing scheme based on Pedersen commitments in the aggregation protocol, which ensures data integrity, with compliance checks aimed at identifying the injection of altered measurements. Moreover, we introduce Chord auxiliary routing tables to counteract the routing pollution performed by dishonest nodes. The paper evaluates the computational complexity and effectiveness of the proposed solutions through analytical and numerical results. Copyright c © 2012 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Cyber Attack Surface Analysis of Advanced Metering Infrastructure

Cyber attacks on critical infrastructure have been an issue of importance in industry over the past several years, as well as a focus of academic research. Cyber attacks of various types and magnitude have been on the rise targeted specifically at power grids. A successful attack on the power grid could result in significant impacts including grid shutdown, cascading failures, damage to the inf...

متن کامل

Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure

The age of Internet of Things (IoT) has brought in new challenges specifically in areas such as security. The evolution of classic power grids to smart grids is a prime example of how everything is now being connected to the Internet. With the power grid becoming smart, the information and communication systems supporting it is subject to both classical and emerging cyber-attacks. The article i...

متن کامل

From inter-connecting P2P overlays to co-operating P2P systems. (De l'interconnexion à la coopération des systèmes pair-à-pair)

Peer-to-peer (P2P) systems are used by millions of users every day. In many scenarios, it is desirable for the users from di erent P2P systems to communicate and exchange content or services with each other. This requires co-operation between the P2P systems, which is often di cult or impossible, due to the two following reasons. First is the lack of an inter-overlay routing infrastructure thro...

متن کامل

A First Look at Peer-to-Peer Worms: Threats and Defenses

Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strategy than random scanning for locating victims. This paper describes the danger posed by P2P worms and initiates the study of possible mitigation mechanisms. In particular, the paper explores the feasibility of a self-defense infr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013