Skip to main content

Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain

  • Conference paper
  • First Online:
Applied Cryptography and Network Security Workshops (ACNS 2021)

Abstract

In recent years, the transitioning of conventional power grid system into the smart grid infrastructure has made the power distribution network more susceptible towards faults and physical attacks. In this context, we discuss recently proposed Manipulation-of-Demand via IoT attack, False Data Injection Attacks and Electric Fault Attacks. These attacks directly or indirectly can lead to localized blackout, falsified load forecasting, imbalance in demand-response system, generator tripping, frequency instability and loss of equipment etc. To detect and trace back to the source of such attacks, in this paper we inspect the potential of the promising permissioned blockchain technology which is designed for digital transaction, but has been extended to authenticate and assure integrity of real power consumption information in a seem-less manner. This information can be picked up from the smart meters, however the trusted gathering and recording of the information is imperative for end-to-end security. In this work, we bind the smart meter readings to the underlying hardware by enabling the properties of Physically Unclonable Functions (PUFs) which works as a hardware fingerprint of the device. The proposed PUF based power profile verification scheme would further prevent the system from the injection of any false data by an illegitimate smart meter. The novelty of the proposed work is to blend these two technologies in developing a robust and privacy-aware framework which detects and prevents the above mentioned security vulnerabilities and can be easily integrated with the smart grid infrastructure. Finally an end-to-end demonstration of the attack has been presented using MATLAB and Power World simulator whereas the proposed framework has been prototyped using commercial off-the-shelf products such as Raspberry Pi and Artix 7 FPGA along with an in-house blockchain simulator and a privacy-preserving detection scheme.

We would like to thank Swarnajayanti fellowship funded by DST, India, Information Security Education Awareness Project funded by DIT India, and Cyber Security Research in CPS funded by TCG Foundation, India for partially funding our research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Elia Group Grid Data. http://www.elia.be/en/grid-data

  2. Inter Planetary File System (November 2019). https://ipfs.io/

  3. Ali, S., Mansoor, H., Arshad, N., Khan, I.: Short term load forecasting using smart meter data. In: Proceedings of the Tenth ACM International Conference on Future Energy Systems, pp. 419–421 (2019)

    Google Scholar 

  4. Barbosa, P., Brito, A., Almeida, H.: A technique to provide differential privacy for appliance usage in smart metering. Inf. Sci. 370, 355–367 (2016)

    Article  Google Scholar 

  5. Batra, N., et al.: NILMTK: an open source toolkit for non-intrusive load monitoring. In: Proceedings of the 5th International Conference on Future Energy Systems, pp. 265–276 (2014)

    Google Scholar 

  6. Benning, L.: Load-Forecasting. https://github.com/lbenning/Load-Forecasting

  7. Boyapally, H., et al.: Safe is the new smart: PUF-based authentication for load modification-resistant smart meters. IEEE Trans. Dependable Secur. Comput. 1–1 (2020)

    Google Scholar 

  8. Chatterjee, U., et al.: Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Trans. Dependable Secur. Comput. 16(3), 424–437 (2019)

    Article  Google Scholar 

  9. Chatterjee, U., et al.: PUFSSL: an OpenSSL extension for PUF based authentication. In: 23rd IEEE International Conference on Digital Signal Processing, DSP 2018 (2018)

    Google Scholar 

  10. Chatterjee, U., Sahoo, D.P., Mukhopadhyay, D., Chakraborty, R.S.: Trustworthy proofs for sensor data using FPGA based physically unclonable functions. In: 2018 Design, Automation & Test in Europe Conference & Exhibition, DATE 2018 (2018)

    Google Scholar 

  11. Dabrowski, A., Ullrich, J., Weippl, E.R.: Grid shock: coordinated load-changing attacks on power grids: the non-smart power grid is vulnerable to cyber attacks as well. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 303–314 (2017)

    Google Scholar 

  12. Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992–8004 (2019)

    Article  Google Scholar 

  13. Gao, J., et al.: GridMonitoring: secured sovereign blockchain based monitoring on smart grid. IEEE Access 6, 9917–9925 (2018)

    Article  Google Scholar 

  14. Guan, Z., et al.: Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 56, 82–88 (2018)

    Article  Google Scholar 

  15. Huang, B., Cárdenas, A.A., Baldick, R.: Not everything is dark and gloomy: power grid protections against IoT demand attacks. In: Heninger, N., Traynor, P. (eds.) 28th USENIX Security Symposium, USENIX Security (2019)

    Google Scholar 

  16. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)

    Article  Google Scholar 

  17. Kolter, J.Z., Johnson, M.J.: REDD: a public dataset for energy disaggregation research. In: Workshop on Data Mining Applications in Sustainability (SIGKDD), San Diego, CA, vol. 25, pp. 59–62 (2011)

    Google Scholar 

  18. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 21–32 (2009)

    Google Scholar 

  19. Lombardi, F., Aniello, L., De Angelis, S., Margheri, A., Sassone, V.: A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids. Living Internet Things: Cybersecur. IoT 2018, 1–6 (2018)

    Google Scholar 

  20. Mohammadi, F., Nazri, G.A., Saif, M.: A fast fault detection and identification approach in power distribution systems. In: 2019 International Conference on Power Generation Systems and Renewable Energy Technologies. IEEE (2019)

    Google Scholar 

  21. Nourizadeh, S., Yari, V., Ranjbar, A.M.: Frequency monitoring and control during power system restoration based on wide area measurement system. Math. Probl. Eng. 2011, 9 (2011)

    Article  Google Scholar 

  22. Ruj, S., Pal, A.: Analyzing cascading failures in smart grids under random and targeted attacks. In: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications. pp. 226–233 (2014)

    Google Scholar 

  23. Silvestre, D., Hespanha, J.P., Silvestre, C.: Fault detection for cyber physical systems: smart grid case. In: 23rd International Symposium on Mathematical Theory of Networks and Systems (MTNS), pp. 475–481. IEEE (2018)

    Google Scholar 

  24. Soltan, S., Mittal, P., Poor, H.V.: BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In: Enck, W., Felt, A.P. (eds.) 27th USENIX Security Symposium, USENIX Security, August 15–17, 2018, pp. 15–32 (2018)

    Google Scholar 

  25. Wang, H., et al.: Deep learning-based interval state estimation of AC smart grids against sparse cyber attacks. IEEE Trans. Ind. Inform. 14(11), 4766–4778 (2018)

    Article  Google Scholar 

  26. Zhang, H., Wang, J., Ding, Y.: Blockchain-based decentralized and secure keyless signature scheme for smart grid. Energy 180, 955–967 (2019)

    Article  Google Scholar 

  27. Zhao, J., Zhang, G., La Scala, M., Dong, Z.Y., Chen, C., Wang, J.: Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Trans. Smart Grid 8(4), 1580–1590 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soumyadyuti Ghosh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghosh, S., Chatterjee, U., Chatterjee, D., Masburah, R., Mukhopadhyay, D., Dey, S. (2021). Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2021. Lecture Notes in Computer Science(), vol 12809. Springer, Cham. https://doi.org/10.1007/978-3-030-81645-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-81645-2_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-81644-5

  • Online ISBN: 978-3-030-81645-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics