12.07.2015 Views

Wireless AMI Application and Security for Controlled Home Area ...

Wireless AMI Application and Security for Controlled Home Area ...

Wireless AMI Application and Security for Controlled Home Area ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8solutions to these attacks were developed. Though morethreats are possible as this application scenario matures, thefoundation laid by this framework can be used to add newsolutions to emerging threats.Due to space limitations the overall framework ofimplementation could not be presented in this manuscript. Acommon security framework against the indentified attacksusing the proposed solutions will be presented in futurepapers.Future work in the area involves looking at the wirelesscommunication path between <strong>AMI</strong> of individual residences<strong>and</strong> the utility’s control center. This will involve studying adifferent class of attacks that are remote in nature <strong>and</strong> involveexploiting vulnerabilities at the network layer. Such researchwill be complementary to the work presented here, which waslocal in nature to the WHAN-SM. Additional work also needsto be done by st<strong>and</strong>ardization bodies to provide capabilities toappliances <strong>and</strong> other equipment that are expected to be part offuture WHAN-SMsVI. ACKNOWLEDGMENTThe authors gratefully acknowledge the support of thePower Systems Engineering Research Center (PSERC) <strong>and</strong>the contributions from the industrial <strong>and</strong> academic members ofPSERC Project T-39, “Communication Requirements <strong>and</strong>Integration Options <strong>for</strong> Smart Grid Deployment,” <strong>and</strong> from theUS Department of Energy Project DE-FG36-08GO88149,“Sustainable Energy Solutions.”VII. REFERENCES[1] US Department of Energy, “What the Smart Grid Means to Americans,”Tech. Rep., Available: http://www.oe.energy.gov/Documents<strong>and</strong>Media/ConsumerAdvocates.pdf.[2] F. Derbel, “Trends in Smart Metering,” in 6th International Multi-Conference on Systems, Signals <strong>and</strong> Devices (SSD), 23-26 2009.[3] W. Sweet, “The Smart Meter Avalanche”, IEEE Spectrum, October2009.[4] “Going Green with <strong>AMI</strong> <strong>and</strong> ZigBee Smart Energy,” Daintree NetworksWhite Paper, 2008. Available: http://www.daintree.net /downloads/whitepapers/ ami-smart-energy.pdf[5] C. Bennett <strong>and</strong> D. Highfill, “Networking <strong>AMI</strong> Smart Meters,” IEEEEnergy 2030 Conference 2008. Atlanta, GA 17-18 Nov 2008[6] F. Cohen, “The Smarter Grid,” IEEE <strong>Security</strong> <strong>and</strong> Privacy, vol. 8, 2010.[7] “Securing the Smart Grid,” Cisco Systems White Paper, 2009. Available:www.cisco.com/web/strategy/docs/energy/SmartGrid<strong>Security</strong>_wp.pdf[8] R. Shein, “<strong>Security</strong> Measures <strong>for</strong> Advanced Metering InfrastructureComponents,” in Asia-Pacific Power <strong>and</strong> Energy EngineeringConference (APPEEC), 28-31 2010, pp. 1–3.[9] C. Bennett <strong>and</strong> S. Wicker, “Decreased Time Delay <strong>and</strong> <strong>Security</strong>Enhancement Recommendations <strong>for</strong> <strong>AMI</strong> Smart Meter Networks,” inInnovative Smart Grid Technologies (ISGT), 19-21 2010.[10] L. AlAbdulkarim <strong>and</strong> Z. Lukszo, “Integrating In<strong>for</strong>mation <strong>Security</strong>Requirements in Critical Infrastructures: Smart Metering Case,”International Journal of Critical Infrastructures, vol. 6, no. 2, 2010.[11] F. Clevel<strong>and</strong>, “Cyber <strong>Security</strong> Issues <strong>for</strong> Advanced MeteringInfrastructure (<strong>AMI</strong>),” in Power <strong>and</strong> Energy Society General Meeting –Conversion <strong>and</strong> Delivery of Electrical Energy in the 21st Century, 2008IEEE, 20-24 2008.[12] A. Metke <strong>and</strong> R. Ekl, “<strong>Security</strong> Technology <strong>for</strong> Smart Grid Networks,”Smart Grid, IEEE Transactions on, vol. 1, no. 1, pp. 99 –107, jun. 2010.[13] C. Bennett, B. Brown, B. Singletary, D. Highfill, D. Houseman, F.Clevel<strong>and</strong>, H. Lipson, J. Ivers, J. Gooding, J. McDonald, N. Greenfield,<strong>and</strong> S. Li, <strong>AMI</strong> System <strong>Security</strong> Requirements, Utility CommunicationArchitecture International User Group (UCAIUG), December 2008.[14] Behr, “Do smart meters mean smart electricity use?” Tech. Rep.,Available: http://www.scientificamerican.com/article.cfm?id=dosmartmeters-mean-smart-electricity-use.[15] A. Synder <strong>and</strong> M. Stuber, “The ANSI C 12 Protocol Suite – Updated<strong>and</strong> Now with New Network Capabilities” Power Systems Conference:Advanced Metering, Protection, Control, Communication, <strong>and</strong>Distributed Resources, 2007.[16] H. Sui, H. Wang, M.-S. Lu, <strong>and</strong> W.-J. Lee, “An <strong>AMI</strong> System <strong>for</strong> theDeregulated Electricity Markets,” Industry <strong>Application</strong>s, IEEETransactions on, vol. 45, no. 6, pp. 2104 –2108, nov. 2009.[17] Pacific Gas <strong>and</strong> Electric News Release, “PG&E Leads the Nation inSmart Meter Deployment,” Available: http://www.pge.com/about/news/mediarelations/newsreleases/q2 2009/090414.shtml.[18] Southern Company News Release, “Southern Company ReachesMilestone in Smart Meter Program with 1 Million Installations,” Availablehttp://southerncompany.mediaroom.com/index.php?s=43&item=1870.[19] Georgia Power News Release, “Your Meter is About to Get Smarter,”Available: http://www.georgiapower.com/residential/smartmeter.asp,[20] J.-M. Bohli, C. Sorge, <strong>and</strong> O. Ugus, “A Privacy Model <strong>for</strong> SmartMetering,” IEEE 2010 International Conference on Communications,May. 2010[21] J.-S. Lee, Y.-W. Su, <strong>and</strong> C.-C. Shen, “A Comparative Study of <strong>Wireless</strong>Protocols: Bluetooth, UWB, ZigBee, <strong>and</strong> Wi-Fi,” in 33rd AnnualConference of the IEEE Industrial Electronics Society, 2007, November2007, pp. 46–51.[22] Russell Dean Vines, “<strong>Wireless</strong> <strong>Security</strong> Essentials: Defending MobileSystems from Data Piracy”, 1st Edition, John Wiley & Sons, Inc, NewYork, USA, 2002[23] IEEE802.15.4, IEEE St<strong>and</strong>ard 802, part 15.4: <strong>Wireless</strong> Medium AccessControl (MAC) <strong>and</strong> PHY) Specifications <strong>for</strong> Low Rate <strong>Wireless</strong> Personal<strong>Area</strong> Networks (WPANs), 2003.[24] T. Godfrey <strong>and</strong> C. Rodine, “Unified Metrics <strong>for</strong> Management of SmartGrid <strong>Home</strong> <strong>Area</strong> Networks,” IEEE 2010 International Conference onCommunications, May. 2010[25] V. Navda, A. Bohra, <strong>and</strong> S. Ganguly, “Using Channel Hopping toIncrease 802.11 Resilience to Jamming Attacks,” in In Proc. IEEEInfocom Minisymposium, 2007.[26] “The Network Simulator NS-2,” User In<strong>for</strong>mation, Available:http://www.isi.edu/nsnam/ns/.[27] A. Shamir, “On the Generation of Cryptographically StrongPseudor<strong>and</strong>om Sequences,” ACM Trans. Comput. Syst., vol. 1, 1983.[28] National Institute of St<strong>and</strong>ards <strong>and</strong> Technology (NIST), “CryptographicToolkit,” Available: http://csrc.nist.gov/groups/ST/toolkit/index.html.[29] P. Yi, A. Iwayemi, <strong>and</strong> C. Zhou, “Frequency Agility in a ZigBeeNetwork <strong>for</strong> Smart Grid <strong>Application</strong>,” Innovative Smart GridTechnologies 2010, Gaithesburg, MD Jan. 2010.VIII. BIOGRAPHIESVisvakumar Aravinthan (S’04, M’10) received his BS degree in ElectricalEngineering from University of Moratuwa, Sri Lanka in 2002 <strong>and</strong> received hisMS <strong>and</strong> Ph.D. in electrical engineering from Wichita State University in 2006<strong>and</strong> 2010 respectively. Currently, he is a visiting lecturer at ClemsonUniversity teaching power system courses. His research interests includedistribution automation, smart grid applications, electric vehicles <strong>and</strong> controls.Vinod Namboodiri teaches communications <strong>and</strong> networking courses as anAssistant Professor of Electrical Engineering <strong>and</strong> Computer Science atWichita State University. He per<strong>for</strong>ms research in energy related aspects ofwireless networking that includes optimizing energy consumption of portablewireless networking devices <strong>and</strong> the application of wireless technologies <strong>for</strong>the Smart Grid.Samshodh Sunku received his BE degree in Electronics <strong>and</strong> CommunicationEngineering from Visvesvaraya Technological University in 2007 <strong>and</strong>presently pursuing MS in Electrical Engineering at Wichita State Universityper<strong>for</strong>ming duties as a Graduate Research Assistant. His research interests arein <strong>Wireless</strong> networking technologies <strong>and</strong> Smart Grid.Ward Jewell teaches electric power systems <strong>and</strong> electric machinery as aProfessor of Electrical Engineering at Wichita State University. Dr. Jewell isSite Director <strong>for</strong> the Power Systems Engineering Research Center (PSerc). Heis a Fellow of the IEEE. He per<strong>for</strong>ms research in electric power systems <strong>and</strong>advanced energy technologies. He has been with Wichita State since 1987.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!