Skip to main content
Log in

A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The literature does not present integral solutions to allow using the same credential to access the smart meter and smart house from an electric utility and vice-versa. The main reason being the technology gap in the communication between the Advanced Metering Infrastructure (AMI) and the Internet. The technology used in the Internet domain to communicate with Data Concentrators (DC) and the electric utility is more powerful than the technology used in the communication between smart meters and the DC, which is bandwidth limited and better suited to the Internet of Things (IoT) domain. Therefore, we are proposing the use of Identity Management (IdM) and a key-based scheme to enable the integration of IoT and the Internet using the same credentials, without creating a security bottleneck in the communication. An additional security mechanism is provided in the smart house context to isolate the house from direct accesses from the Internet, though allowing the utility to reconfigure the electric power consumption profile to avoid a potential blackout, for instance. Our proposal includes multi-sensor anti-tampering techniques to provide physical protection to a smart meter, in conjunction with a multilevel integrity mechanism to provide logical protection to its resource-constrained microcontroller, given the smart meter is a key component to mitigate electricity consumption fraud. The prototype has shown that our proposal is feasible for protecting the smart house, smart meter and the end-to-end communication between smart meter or house and the utility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Cai Z, Yu M, Steurer M, Li H, Dong Y (2016) A network model for the real-time communications of a smart grid prototype. J Netw Comput Appl 59:264–273

    Article  Google Scholar 

  2. Gungor VC, Sahin D, Kocak T, Ergut S, Buccella C, Cecati C, Hancke GP (2013) A survey on smart grid potential applications and communication requirements. IEEE Trans Ind Inf 9(1):28–42

    Article  Google Scholar 

  3. Shiobara T, Palensky P, Nishi H (2015) Effective metering data aggregation for smart grid communication infrastructure, IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society, Yokohama, pp. 2136–2141. https:/doi.org/10.1109/IECON.2015.7392417

  4. Emmanuel M, Rayudu R (2016) Communication technologies for smart grid applications: a survey. J Netw Comput Appl 74:133–148

    Article  Google Scholar 

  5. Ganzha M, Paprzycki M, Pawłowski W, Szmeja P, Wasielewska K (2016) Semantic interoperability in the internet of things: an overview from the INTER-IoT perspective. J Netw Comput Appl 81:111–124

    Article  Google Scholar 

  6. OpenID Connect Core 1.0 Available at: http://openid.net/specs/openid-connect-core-1_0.html. Accessed March 2017

  7. Infoworld. Millions of embedded devices use the same hard-coded SSH and TLS private keys. Available at: http://www.infoworld.com/article/3009667/security/millions-of-embedded-devices-use-the-same-hard-coded-ssh-and-tls-private-keys.html. Accessed March 2017

  8. Hacker News Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys. Available at: http://thehackernews.com/2015/11/iot-device-crypto-keys.html. Accessed March 2017

  9. ZDnet Smart meter hacking tool released. Available at: http://www.zdnet.com/article/smart-meter-hacking-tool-released/. Accessed March 2017

  10. Patel SC, Sanyal P (2008) Securing SCADA systems. Inf Manag Comput Secur 16(4):398–414

    Article  Google Scholar 

  11. Warmer C, Kok K, Karnouskos S, Weidlich A, Nestle D, Selzam P, Ringelstein j, Dimeas A, andDrenkard S (2009) Web services for integration of smart houses in the smart grid. Proc of Grid-Interop Conference, Denver, USA, pp. 1–5

  12. Yan Y, Qian Y, Sharif H, Tipper D (2013) A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Commun Surv Tutorials 15(1):5–20

    Article  Google Scholar 

  13. ZDnet Could lax smart meter security blackout the UK? Available at: http://www.zdnet.com/article/could-lax-smart-meter-security-blackout-the-uk/. Accessed March 2017

  14. Tanimoto S, Kinno R, Iwashita M, Kobayashi T, Sato H, Kanai A (2016) Risk assessment of home gateway/smart meter in smart grid service. Proc Int Congr Adv Appl Informatics:1126–1131

  15. Kołodziej J, Jaatun MG, Khan SU, Koeppen M (2013) Security-aware and data intensive low-cost mobile systems. Mob Networks Appl 18(5):591–593

    Article  Google Scholar 

  16. Liu J, Xiao Y, Chen CLP (2012) Authentication and access control in the internet of things. 32nd International Conference on Distributed Computing Systems Workshops, Macau, pp. 588–592. https:/doi.org/10.1109/ICDCSW.2012.23

  17. Chin WL, Lin YH, Chen HH (2016) A framework of machine-to-machine authentication in smart grid: a two-layer approach. IEEE Commun Mag 54(12):102–107

    Article  Google Scholar 

  18. Saxena N, Choi BJ (2016) Integrated distributed authentication protocol for smart grid communications. IEEE Syst J:(99)1–12. https:/doi.org/10.1109/JSYST.2016.2574699

  19. Mohammad N, Barua A, Arafat MA (2013) A smart prepaid energy metering system to control electricity theft.2013 International Conference on Power, Energy and Control (ICPEC), Sri Rangalatchum Dindigul, pp. 562–565. https:/doi.org/10.1109/ICPEC.2013.6527721

  20. Tangsunantham N, Ngamchuen S, Nontaboot V, Thepphaeng S, Pirak C (2013) Experimental performance analysis of current bypass anti-tampering in smart energy meters. 2013 Australasian Telecommunication Networks and Applications Conference (ATNAC), Christchurch, pp. 124–129. https:/doi.org/10.1109/ATNAC.2013.6705368

  21. Kadurek P, Blom J, Cobben JFG, Kling WL (2010) Theft detection and smart metering practices and expectations in the Netherlands. 2010 I.E. PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe), Gothenburg, pp. 1–6. https:/doi.org/10.1109/ISGTEUROPE.2010.5638852

  22. Fraser T (2000) LOMAC: low water-mark integrity protection for COTS environments. Proceeding 2000IEEE Symposium on Security and Privacy. S&P 2000, Berkeley, CA, pp.230–245. https:/doi.org/10.1109/SECPRI.2000.848460

  23. Brasser F, El Mahjoub B, Sadeghi A-R, Wachsmann C, Koeberl P (2015) TyTAN: tiny trust anchor for tiny devices. 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, pp. 1–6. https:/doi.org/10.1145/2744769.2744922

  24. Al-Ali AR, AL-Rousan M (2004) Java-based home automation system. IEEE Trans Consum Electron 50(2):498–504

    Article  Google Scholar 

  25. Golzar MG, Tajozzakerin H (2010) “A new intelligent remote control system for home automation and reduce energy consumption,” 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation, Kota Kinabalu, Malaysia, pp. 174–180. https:/doi.org/10.1109/AMS.2010.46

  26. Korkmaz I, Metin SK, Gurek A, Gur C, Gurakin C, Akdeniz M (2015) A cloud based and android supported scalable home automation system. Comput Electr Eng 43:112–128

    Article  Google Scholar 

  27. Chan H, Perrig A (2003) Security and privacy in sensor networks. Computer 36(10):103–105

    Article  Google Scholar 

  28. The hacker News. Linux Worm targets Internet-enabled Home appliances to Mine Cryptocurrencies Available at: http://thehackernews.com/2014/03/linux-worm-targets-internet-enabled.html. Accessed March 2017

  29. Zheng J, Gao DW, Lin L (2013) Smart meters in smart grid: an overview. 2013 I.E. GreenTechnologies Conference (GreenTech), Denver, CO, pp. 57–64. https:/doi.org/10.1109/GreenTech.2013.17

  30. Ramírez DF, Céspedes S (2015) Routing in neighborhood area networks: a survey in the context of AMI communications. J Netw Comput Appl 55:68–80

    Article  Google Scholar 

  31. Dark Reading. Smart meter hack shuts off the lights. Available at: http://www.darkreading.com/perimeter/smart-meter-hack-shuts-off-the-lights/d/d-id/1316242. Accessed March 2017

  32. Weiss M, Helfenstein A, Mattern F, Staake T (2012) Leveraging smart meter data to recognize home appliances. 2012 I.E. International Conference on Pervasive Computing and Communications, Lugano, pp. 190–197. https:/doi.org/10.1109/PerCom.2012.6199866

  33. Biba KKJ (1977) Integrity considerations for secure computer systems. Proc Symp on Comput Archit 5(7):66

    Google Scholar 

  34. Witkovski A, Santin A, Abreu V, Marynowski J (2015) An IdM and key-based authentication method for providing single sign-on in IoT. 2015 I.E. Global Communications Conference (GLOBECOM), San Diego, CA, pp. 1–6. https:/doi.org/10.1109/GLOCOM.2015.7417597

  35. Drotos D μCSim: software simulator for microcontrollers, Available at: http://mazsola.iit.uni-miskolc.hu/~drdani/ embedded/ucsim/ Accessed March 2017

  36. IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS) (2011) End-Use Applications, and Loads, in IEEE Std 2030–2011, pp.1-126. htpps:/doi.org/10.1109/IEEESTD.2011.6018239

  37. Wolkerstorfer M, Schweighofer B, Wegleiter H, Statovci D, Schwaiger H, Lackner W (2016) Measurement and simulation framework for throughput evaluation of narrowband power line communication links in low-voltage grids. J Netw Comput Appl 59:285–300

    Article  Google Scholar 

  38. ANSI X9 encryption collection. Available at: http://webstore.ansi.org/RecordDetail.aspx?sku=X9+Encryption+Collection. Accessed March 2017

  39. Vaadin OpenID Integration. Available at: https://vaadin.com/directory#!addon/openid-integration. Accessed March 2017

  40. Java API for RESTful Services. Available at: https://jax-rs-spec.java.net/. Accessed March 2017

  41. Eclipse Foundation, “Californium.” Available at: https://www.eclipse.org/californium/. Accessed March 2017

  42. The Contiki Operating System. Available at: http://contiki-os.org/. Accessed March 2017

  43. Mohammadali A, Tadayon MH, Asadian M (2014) A new key management for AMI systems based on DLMS/COSEM standard. Telecommunications (IST), 2014 7th International Symposium on, Tehran, pp. 849–856. https:/doi.org/10.1109/ISTEL.2014.7000822

  44. Ribeiro R, Santin A, Abreu V, Marynowski J, Viegas E (2016) Providing security and privacy in smart house through mobile cloud computing. Proc of IEEE Latin-American Conference on Communications:1–6

  45. Niewiadomska-Szynkiewicz E, Sikora A, Kołodziej J (2013) Modeling mobility in cooperative ad hoc networks. Mob Networks Appl 18(5):610–621

    Article  Google Scholar 

Download references

Acknowledgements

This work was partially sponsored by the Brazilian National Council for Scientific and Technological Development (CNPq), grants 307346/2015-3 and 404963/2013-7. Vilmar Abreu Junior wishes to thanks to CNPq for scholarship granting, process 381612/2014-7. We wish to thank for the valuable contribution to the electric engineering Alison Lando, Ivan Chueiri, Voldi Zambenedetti and Marcio Hamerschmidt (Copel). Moreover, we thanks to our partners from industry, Siemens and Copel.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vilmar Abreu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abreu, V., Santin, A., Xavier, A. et al. A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT. Mobile Netw Appl 23, 967–981 (2018). https://doi.org/10.1007/s11036-017-0960-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-017-0960-4

Keywords

Navigation