Review of key management techniques for advanced metering infrastructure

2021 ◽  
Vol 17 (8) ◽  
pp. 155014772110415
Author(s):  
Otisitswe Kebotogetse ◽  
Ravi Samikannu ◽  
Abid Yahya

The electricity industry has been developed through the introduction of the smart grid. This has brought about two-way communication to the grid and its components. The smart grid has managed to increase the efficiency and reliability of the traditional power grid over the years. A smart grid has a system that is used to measure and collect readings for power consumption reflection, and the system is known as the Advanced Metering Infrastructure. The advanced metering infrastructure has its components too which are the smart metre, metre control system, collector or concentrator and communication networks (wide area network, neighbourhood area network, and home area network). The communication networks in the advanced metering infrastructure have created a vulnerability to cyber-attacks over the years. The reliability of the power grid to consumers relies on the readings from the smart metre, and this brings about the need to secure the smart metre data. This article presents a review of key management methods in advanced metering infrastructure environments. The article begins with an overview of advanced metering infrastructure and then shows the relationship between the advanced metering infrastructure and the smart grid. The review then provides the security issues related to advanced metering infrastructure. Finally, the article provides existing works of key management methods in advanced metering infrastructure and future directions in securing advanced metering infrastructure and the smart grid.

The smart grid cyber-physical system and advanced metering infrastructure is an immensely growing term in industrial research based on the electrical power grid system and has uncovered an efficient paradigm for the power generation, transmission, and for the expenditure management as well. These systems allow home area networks and advanced metering infrastructure to communicate bi-directionally. False data injection is a new and climacteric security threat to the power grid to tamper such important data. However, these communication channels that the energy service interfaces provide two-way communication according to the central control unit. Thus, for the security and robustness of the grid, it is critical to separate the false or infected data. The existing protocol on this problem is based on state estimation which is less secure and computationally expensive. In this paper, we propose a 2-way peg blockchain security system by providing a digital signature scheme between home area network device (Smart Meter) and AMI server to get authorization, providing an infected data detection algorithm based on fuzzy rule specification and 2WP based blockchain protocol and finally infected performance reputation updating algorithm by computing the probability distribution of uncouth level to detect the infected or compromised the. We get more efficiency and security by performing a detailed analysis.


2017 ◽  
Vol 2017 ◽  
pp. 1-18 ◽  
Author(s):  
Miguel Seijo Simó ◽  
Gregorio López López ◽  
José Ignacio Moreno Novella

Security in critical infrastructures such as the power grid is of vital importance. The Smart Grid puts power grid classical security approach on the ropes, since it introduces cyberphysical systems where devices, communications, and information systems must be protected. PoweRline Intelligent Metering Evolution (PRIME) is a Narrowband Power-Line Communications (NB-PLC) protocol widely used in the last mile of Advanced Metering Infrastructure (AMI) deployments, playing a key role in the Smart Grid. Therefore, this work aims to unveil the cybersecurity vulnerabilities present in PRIME standard, proposing solutions and validating and discussing the results obtained.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3776-3783

A Smart Grid is the advancement for power matrix with utilization of correspondence innovation with number of powerful meters which are interconnected and two-way data / information flows and has the main goals is to the active participants of consumers to improve quality and reliability of energy usage as for reducing energy consumption and provide increasing reliability as communication between smart meters and consumers. Basically, Smart Grid is working with distributed system manner, and create a network infrastructure as Advanced Metering Infrastructure (AMI) with number of different smart meter. This AMI network includes NAN (Neighbourhood Area Network), have connected with number of smart meters (as wired / wireless) connections with repeater / router as commonly name as Gateway collector which collets the all the consumers information’s and send to the Utility centre. The flow of information as energy usages and power in smart grids is bidirectional which is controlled with the help of software and supporting hardware. Here, with using of Optimized Network Engineering Tools (OPNET) Modeler is one of the most dominant simulation tools for the analysis of communication networks. In this paper, the number of smart meters is connected and create an AMI networks were developed with network parameters which related to different communication as wireless for the compute the different network parameters with respect to the time where data transfer and DDoS attack to the network. The security aspect as detect the DDoS attack to the AMI network and provide a guideline to the future of AMI network where escape strange challenges faced by Distribution companies. Here, in this paper the progressed metering foundation (AMI), which is one of the savvy framework's application regions where make a proving ground and arrangement in the OPNET for assessed the exhibition and power the board model for the framework


Sensors ◽  
2019 ◽  
Vol 19 (4) ◽  
pp. 909 ◽  
Author(s):  
Taimin Zhang ◽  
Xiaoyu Ji ◽  
Zhou Zhuang ◽  
Wenyuan Xu

As the core component of the smart grid, advanced metering infrastructure (AMI) is responsible for automated billing, demand response, load forecasting, management, etc. The jamming attack poses a serious threat to the AMI communication networks, especially the neighborhood area network where wireless technologies are widely adopted to connect a tremendous amount of smart meters. An attacker can easily build a jammer using a software-defined radio and jam the wireless communications between smart meters and local controllers, causing failures of on-line monitoring and state estimation. Accurate jammer localization is the first step for defending AMIs against jamming attacks. In this paper, we propose JamCatcher, a mobile jammer localization scheme for defending the AMI. Unlike existing jammer localization schemes, which only consider stationary jammers and usually require a high density of anchor nodes, the proposed scheme utilizes a tracker and can localize a mobile jammer with sparse anchor nodes. The time delay of data transmission is also considered, and the jammer localization process is divided into two stages, i.e., far-field chasing stage and near-field capturing stage. Different localization algorithms are developed for each stage. The proposed method has been tested with data from both simulation and real-world experiment. The results demonstrate that JamCatcher outperforms existing jammer localization algorithms with a limited number of anchor nodes in the AMI scenario.


2017 ◽  
Vol 6 (4) ◽  
pp. 337-342
Author(s):  
R. Dorothy ◽  
Sasilatha Sasilatha

The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system.  In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.


Sign in / Sign up

Export Citation Format

Share Document