You are on page 1of 8

1

Wireless AMI Application and Security for


Controlled Home Area Networks
Visvakumar Aravinthan, Member, IEEE, Vinod Namboodiri, Member, IEEE, Samshodh Sunku, Student
Member, IEEE and Ward Jewell, Fellow, IEEE

is consumed by residential customers. Advanced metering


Abstract-- Compared to the conventional grid, the smart grid infrastructure (AMI) is introduced at residential levels to
requires active participation of consumers to improve the quality incorporate these changes. With the introduction of AMI
and reliability of power delivery. Advanced metering technology, two-way communication between AMI and the
infrastructure (AMI), commonly known as the smart meter,
which has the capability of supporting various functions beyond control center as well as between the AMI and residential
that of recording energy usage, will facilitate this expected loads would be facilitated for demand response, dynamic
increase in consumer participation. Another primary benefit of pricing, and system monitoring [1]. In addition, AMI could be
AMI is load and cost management for the utility. AMI requires a used for greenhouse gas-emission mitigation [2].
reliable communication system between the smart meter and This work focuses on security aspects of communication
consumer equipment. This paper identifies wireless networking between AMI and terminal residential appliances. The home
solutions such as ZigBee as the best mode for such
communication. Due to the shared nature of the wireless area network (HAN) used for an AMI application should
medium, however, these deployments face security challenges ensure adequate and secure communication between AMI and
and interference issues. These must be addressed, taking into the terminal appliances. Terminal appliances are divided into
account the interests of both the utility and the consumer. This four groups to limit the data communication based on the
paper takes a comprehensive look at wireless security in the AMI applications. Figure 1 shows different residential appliances
based home-area network by identifying a wide range of possible and the groups (details are presented in the next section).
vulnerabilities. Countermeasures that can be used by both the
utility company as well as the customer are developed.

Index Terms—AMI, smart meters, home area networks,


security wireless networks, ZigBee

NOMENCLATURE
HAN Home area network
AMI Advanced metering infrastructure
EV Electric vehicles
WHAN-SM Wireless HAN for AMI
Figure 1: HAN Appliance Classification for AMI Application
I. INTRODUCTION
A recent article in IEEE Spectrum highlights the

T HE electric power industry is undergoing major changes in


the twenty-first century. Significant developments are in
the area of advanced measurements (synchrophasors, optical
importance placed on the issue of security and role of
communications for AMI [3]. Possible malicious behavior that
could hinder the secure communications include any
sensor technologies, etc.), improved communication information not reported to the AMI by an intentional action
infrastructures, renewable energy sources and electric vehicles of the consumer, or any action by a third party to intentionally
(EV). These changes are expected to influence the way energy or inadvertently modify the information of a consumer that
would give them higher priority or other benefits.
Wireless communication is considered an appropriate mode
This work was supported in part by the Power Systems Engineering
Research Center (PSerc). Project No: T-39 and by the US Department of for communication between AMI and loads in the home [4].
Energy Project DE-FG36-08GO88149 ZigBee is considered to be a good candidate for a cost
V. Aravinthan is with the Department of Electrical and Computer effective HAN solution [5]. A wireless communication-based
Engineering, Clemson University, Clemson, SC, 29634 USA (e-mail:
varavin@clemson.edu). network requires minimal infrastructure support in terms of
V. Namboodiri is with the Department of Electrical Engineering and cabling, and allows zero-configuration, where appliances can
Computer Science, Wichita State University, Wichita, KS 67260 USA (e- be added or removed easily, and possible integration with
mail: vinod.namboodiri @wichita.edu).
S. Sunku is with the Department of Electrical Engineering and Computer increasingly common wireless-based access networks and
Science, Wichita State University, Wichita, KS 67260 USA (e-mail: sxsunku home-security systems. Power line carrier (PLC) is another
@wichita.edu). communications system available within the home, but home
W. Jewell is with the Department of Electrical Engineering and Computer
Science, Wichita State University, Wichita, KS 67260 USA (e-mail:
wiring is designed for low-frequency electric power delivery
ward.jewell@wichita.edu). and not high-frequency data communications. PLC also is
978-1-4577-1002-5/11/$26.00 ©2011 IEEE
2

unavailable when the home electric system is faulted or open. expected that with introduction of AMIs, time of the day
Wireless enables communication between AMI and the outlet, tariffs will become more popular, allowing customers to
even with a fault in the electric connection between them. benefit from having appliances operate at times of lower tariff.
Comparatively, options like Ethernet cabling have extensive If control is done manually consumers are less attentive to
infrastructure costs with little flexibility to reconfigure the varying tariffs and thus less likely to optimize the energy cost
network architecture. by using appliances at off-peak times [14]. Any infrastructure
A wireless-based home area network for AMI (WHAN-SM) that allows reduced human intervention in energy cost
has more security challenges than possibly any other solution optimization is of high interest.
due to the shared wireless medium. There have been visionary
A. Role of Communication
documents on smart grids that call for improved security [6],
AMIs are expected to introduce two new categories of
[7]. There are researchers who have specifically focused on
communication. The first, already employed by many utilities
security and AMI and called for more work to be done in
in the U.S., is between the energy meter and the utility control
ensuring a secure framework, with some actually proposing
center. This facilitates observation of real-time power
such a framework or architecture [8] – [13] on which to build
consumption and any abnormalities in the system, and allows
solutions. Based on a survey of the literature and discussions
demand-side management. If real-time pricing in introduced,
with engineers and experts, what has been lacking, however, is
this category of communication will enable the consumer to
a concrete, low-level approach that looks at various possible
track the current price. In addition to the ANSI C12.22
attacks to such a WHAN-SM.
standard [15], significant work has been done on ensuring
This work takes a comprehensive look at wireless security
secure communication between the meter and the utility [16],
in WHAN-SM. Furthermore, countermeasures are developed
[17]. Many utilities in the U.S. have implemented AMI that
for both the utility and the customer. A key aspect that
have the capability of this level of communication [18]-[20].
differentiates security in WHAN-SM from that in
If the AMI is to allow load and cost management, a second
conventional HANs is that there are two different entities
category of communication between the meter and the users’
whose interests must be kept secure: (i) the utility company,
appliances is also necessary. One of the major concerns of
who must be sure that no one, including the customer, can
implementing this category of communication is the question
tamper with the measurement and control of appliances as
of consumer privacy [3], [21]. Customers have concerns about
agreed upon, and (ii) the customer, whose privacy must be
the utility knowing what electrical appliances they are using at
guarded at all times when the AMI is collecting and relaying
any given time. Therefore, a separate layer of communication,
data, and that personal appliance management preferences are
limited to the customer facility, is required. Using this
honored at all times. The traditional wireless local area
communication layer, the AMI will communicate with and
network security protocols are based on a single party
control the customer’s appliances without sharing this
application. Very limited work has been done for wireless
information with any other stakeholders.
local area network security solutions under the presence of
It should be noted that if the second layer of control is
more than one stakeholder. This work pays special attention to
achieved by enabling demand-side management, then
possible attacks and countermeasures needed with the
greenhouse gas emissions can be also controlled as well.
existence of these multiple parties.
Utilities subject to existing and proposed state and federal
The paper is organized as follows. In Section II, a more
emissions regulations could benefit greatly.
detailed description is given of the WHAN-SM scenario.
Further, the introduction of electric vehicles (EV) is a
Section III looks at relevant security objectives in WHAN-SM
serious concern for utilities. EV charging will be stochastic in
and discusses possible attacks. In Section IV, solutions to the
nature and a large increased load on the distribution
identified attacks are proposed. Concluding remarks with
transformers. Therefore, EVs require higher level bi-
some directions for future work are made in Section VI.
directional higher end communication; some of the
information about EV charging should be communicated to
II. HOME AREA NETWORK FOR AMIS
the utility (e.g. time required for charging, availability, and
The AMI will enable energy meters installed in all customer charge level of the battery). Therefore EVs should be
premises to communicate with the utility operated control categorized separately when the communication architecture is
center and with appliances installed in the premises, and to developed. As this scenario is still only emerging, we do not
control the appliances’’ operation. The future AMI will have address this appliance class in this work. This work focuses on
the ability to control how many appliances could operate at a the network within the home and how AMI deals with
given time and thus implement demand-side management for appliance classified in groups 1, 2, and 3, as described in
the utility. In such an application the utility control center Figure 1.
looks at aggregate loads from all its customers at a given time
and then issues specific control instructions to the AMIs. It is B. Communication Requirements in a WHAN-SM
envisioned that in the future when a customer participates in It may not be economical to have equal communication
AMI, the AMI would have control over some specific class of capability for all components; for example, a light bulb needs
appliances (typically the high-load appliances that the only minimal communication infrastructure whereas an air
customer can operate with some tolerance in delay). It is conditioner needs to communicate more information.
3

Communication needs are used to divide components into the and, based on the system loading profile and the information
four categories of Figure 1. provided by the consumer, AMI will allocate the time of
Controlling small loads such as light bulbs, phone chargers, operation of the appliance and send that information back to
and laptop computers will significantly increase the the outlet transceiver. On the other hand, for the group 1 and 2
installation cost and data traffic. Since control of these loads appliances, which will not be controlled by the AMI, the only
will not change the total load profile significantly, these Group information the AMI needs is the type of appliance (which
1 loads need to inform the control center only when they are could be identified by location of the outlet). Figure 2b shows
connected to and disconnected from the system. Group 2 uncontrolled operation; once the consumer switches on the
consists of large loads, such as stoves, that will not be appliance, the outlet will share this information with the AMI.
controlled because the consumer needs them to be available as
needed, not delayed to a later time. This type of appliance
needs minimal communication infrastructure, but will need to
send its power usage and expected duration of usage whenever
possible.
Group 3 loads are large loads, such as air conditioners and
clothes washers and dryers, for which usage will be controlled.
These loads will send a request through AMI and wait for
acceptance before operating. They will need to send extensive
information such as expected load, expected duration of usage, (a) Controlled Outlet (b) Uncontrolled Outlet
and duration of availability. Therefore, they may send more Figure 2: Communication and Control Enabled Power Outlets
data packets than the other two types of loads. Furthermore,
A downside to using wireless communication for the
the acknowledgement from the AMI is essential for this type
WHAN-SM scenario could be the data transfer rate, which can
of load as they wait to begin operation. The decision to
be slower than wired solutions. However, a WHAN-SM is
operate a component will depend on dynamic pricing and
used more for control than as a high-speed access network,
duration of availability. Depending on the customer’s
and thus, lower data rates are adequate. Current wireless
agreement with the utility, they will likely be able to override
solutions that are possible candidates for WHAN-SM are Wi-
a delay in operation by paying a higher energy price.
Fi, ZigBee, and Bluetooth, and their comparison can be found
Group 4 loads, EVs, are new to the power grid. Since these
in [22]. The ZigBee technology based on the IEEE 802.15.4
are very large and stochastic in nature, it is vital for the AMI
standard [23] is considered a good solution for the WHAN-
to communicate in advance the time of charging of EVs and to
SM scenario as it has a communication range varying from
plan the charging. Due to the extensive need for
10-100m, allows large-scale network configurations, and uses
communication, these are categorized as separate loads. It is
a low-power radio. The data rate capability for this technology
essential to build a communication architecture that can
is a modest 250kbps, but is more than adequate for the
manage this new load through timely and adequate control.
WHAN-SM application scenario. As a result, ZigBee seems to
C. Communication and Control Model in a WHAN-SM be the front runner in the race to be the wireless solution of
There are two options for communications between choice. Thus, this work makes periodic references to the
appliances and the AMI. The first option is to make appliances security architecture in place for ZigBee; however, for the
smart, whereby they will have the capability to communicate most part, a general wireless network is assumed that could
with the AMI and make the decisions (when to switch on, be based on any of the above solutions. The work in [24]
when to switch off, etc.). The main disadvantage of this presents an integration point for different types of wireless
method is the lack of communication/processing capability in networks for HAN through unified metrics that could be
currently manufactured appliances. The second option is to utilized to implement any of the proposed general solutions.
make the power outlets smarter by connecting a transceiver
with processing capability. The work in this paper is based on III. POSSIBLE SECURITY ATTACKS
this second option because it can be implemented with Possible security attacks in a wireless local area network
existing appliances. Migrating to the first option in the future were investigated and the possible attacks for a smart meter
as smart functions are added to appliances will not change the application are identified and presented in this section. Each of
communications security concerns, and will allow those the attacks is illustrated in terms of a WHAN-SM. The two-
appliances to be designed to a standard developed party dynamics that exist in the WHAN-SM scenario and
immediately. Figure 2 shows two different models for the related challenges are also discussed. The security objectives
outlet communication model. of the network and possible attacks it could face are defined
The first model (Figure 2a) is for controlled operation; this later in this work.
is for appliances clustered in group 3, which need approval
from the AMI to operate. The consumer will connect the A. Two Party Dynamics
appliance to the power outlet and program the outlet with the In traditional home area-based networks the customer is the
following information: required operation, availability, and only entity responsible for the operation of the network and
priority. This information will be communicated to the AMI, acquiring benefits from the deployed applications. For
4

example, consider the case of a home surveillance system. It is In the WHAN-SM scenario, a customer request for appliance
in the interests of the customer that the network functions operation must reach AMI in a timely manner; similarly,
properly as intended. The customer must correct any control commands from AMI to appliances must be timely to
unintended behavior of the network. ensure scheduling practices of the utility.
The WHAN-SM scenario has the additional dynamic of Security objectives such as fairness, which are common to
there being two parties with interests in the network. If the more general wireless networks, are not applicable in WHAN-
WHAN-SM does not function properly, it could prevent SM scenario, as all appliances that compete for access to the
controlled appliances from operating at request. Similarly, a medium belong to the same customer. Further, the WHAN-
misbehaving network could take away the ability to manage SM network is expected to be used mainly as a control
load based on the utility requirements. network and is not expected to be highly loaded in terms of
Further, the distributed control that exists between the two bandwidth, thus providing no incentives for selfish behavior
concerned parties could allow a third party to threaten the by nodes.
security of the network by impersonating one or the other
C. Attacks and Misbehavior Scenarios for WHAN-SM
party, or both. It should be noted that capturing shared secrets
is easier when more than one party is involved. Figure 3 shows possible attacks on a WHAN-SM. These
attacks are classified as local or remote attacks. The scope of
B. Security Objectives this work is limited to local attacks within the HAN where all
Out of the typical security concerns in a wireless network appliances communicate to their AMIs using a one-hop
[23], the following five main objectives were identified to network from their power outlets. Remote attacks, which
ensure a secure WHAN-SM: typically exploit weaknesses in the routing mechanisms and
Confidentiality: The goal of confidentiality is to ensure that multi-hop nature of networks, will not occur in the WHAN-
any sensitive data is not disclosed to parties other than those SM scenario.
involved in the communication process. In the WHAN-SM
scenario this could mean that apart from the customer and
utility, no other party gets access to the appliance usage
behavior of the customer. Further, the customer would prefer
the utility to have only an aggregate view of power consumed.
Integrity: This requirement is to ensure that a received
message is not altered from the way it was transmitted by the
sender. In the WHAN-SM scenario, this is important to allow
timely and accurate control. If an attacker manages to change
the source of the request, it could happen that the AMI ends up
communicating and controlling the wrong appliance.
Authentication: Authentication is used by one node to
identify another node or verify the source of origin of data in
the network. Authentication is important for administrative Figure 3: List of attacks on Wireless HAN scenario.
tasks like association, beaconing, and identifier collision. This Various attack scenarios are considered with the following
is critical in the WHAN-SM scenario to ensure that a customer assumptions:
is sure of the authenticity of an AMI with which its appliance (i) The customer is provided with a password by the utility
is communicating, and for the AMI to ensure that it is for authentication. A common authentication procedure,
communicating only with the assigned customer’s appliance. outlined in Section IV, is assumed for appliances to join
Availability: This property is to ensure that network services the network and prevent unauthorized access.
are available and will survive possible attacks or failures that (ii) The available encryption level is strong. This is a standard
could occur. In the WHAN-SM scenario, resource depletion is assumption, and could be based on a stronger encryption
typically not a concern when it comes to a resource like suite present in technologies like ZigBee.
energy which both the AMI and appliances are assumed to As a result of these precautions and assumptions any
have access to through power outlets. But computation authentication and snooping type of attacks from Figure 3 can
capabilities and memory constraints could be exploited by be ruled out. Local denial-of-services are typically based on
keeping these resources fully loaded, affecting the ability of de-authentication attacks that force appliances to repeatedly
the network to function as desired. Equipment failures may re-authenticate instead of using the network for useful
also be more common, especially with the low cost of purposes. Instead of considering such denial-of-service
WHAN-SM radios. attacks, this work focuses on the stronger attack of jamming
later in this section.
Time Sensitivity: Any message delayed over a specific Physical device tampering with the AMI, appliance, or
tolerable time frame may be of no use. A network must ensure power outlet are not considered in this work. The AMI could
relevance of communication by enforcing latency constraints. be made tamper proof by periodic communication with the
5

control center that allows adequate monitoring of its 3) Replay Attack: A neighbor could capture an appliance
operations. The case of customer appliance and power outlet request made at some other time by a customer and replay
tampering would be handled in the attack category of “device it another time when no actual request was made. The
impersonation,” discussed later in this section. neighbor does not gain any benefit, but it can hurt the
The rest of this section describes the attacks which are customer, and could even be a safety hazard. Such fake
relevant to WHAN_SM in Figure 3 in more detail. These requests could overload the AMI and have repercussions
attacks are a representative set of attacks possible in the on the whole grid due to overloading if not handled
WHAN-SM scenario. properly.
1) Jamming Attacks: In these attacks, an adversary disrupts 4) Non-repudiation: Non-repudiation is a concept whereby
communications in a wireless network by sending no party can refute some aspect of their participation in
deliberate signals on the shared medium. In a wireless the communication process. Specific to the WHAN-SM
network, packet communication is successful only if a scenario, the customer cannot later refute having received
receiver is able to successfully decode the sender’s certain control messages from the AMI to operate their
packet. If the medium is jammed by an adversary, the appliance. Alternately, an AMI cannot later deny how it
sender cannot begin communicating (if it senses the tried to control a customer appliance.
medium to be busy beforehand) or its transmitted packet
will be corrupted by the adversary’s signal when received.
Jamming can be carried out by sending a continuous or
intermittent busy tone on the channel used for
communication. A simpler form of jamming is for an
adversary to send a continuous stream of packets using
the same wireless technology, but at a much higher data
rate, possibly after tampering with the medium access
control protocol to gain an unfair advantage [25]. Based
on the investigation carried out for a six node scenario
using the NS-2 simulator [26] it was found that a jammer
could reduce each node’s packet delivery ratio from 80-
90% to about 40% by just using a data rate 10 times that
of an average node with a data rate of 100 kbps on a 2
Mbps channel. Figure 4: Example of an Appliance Impersonation Attack
It is fairly simple for an adversary to use a signal analyzer
or similar device based on common off the shelf IV. SECURITY SOLUTIONS
components to determine the channel used in a network.
To ensure a reliable WHAN-SM, security attacks must be
Such attacks are the most difficult to defend against and
prevented. This work focuses on developing solutions to these
could cripple a HAN based on a wireless architecture.
security attacks based on the operating conditions of the
2) Appliance Impersonation: Based on the customer-utility
electric power system at the residential level, and conventional
agreement, the customer agrees to let the utility control a
wireless local area network applications.
group of their appliances. However, there could be
Solutions developed by the authors to overcome each of the
instances where the customer would want to renege on
attacks identified in the previous section are presented in this
this agreement and not relinquish control. This could
section. An authentication procedure that will form the basis
occur, for example, when a customer tries to control the
of the solution to all attacks is presented first.
air conditioning for better comfort.
Under the customer-utility agreement, the utility controls A. Authentication Procedure
appliances from only a certain subset of classes, typically To ensure strong authentication the following key distribution
those that consume a lot of power. The customer could algorithm is assumed:
therefore exploit this fact and have a high power 1. The AMI is installed by the utility at the customer
consuming appliance impersonate an appliance from premises. The customer is given a password to be
another non-controlled class. For the utility, an inability to manually supplied to the power outlet through which any
control the appliance could result in demand exceeding appliance is supplied. This password can be used to
supply, possibly resulting in a blackout in parts of the generate a public-private key pair for encryption
grid. purposes.
The details of the attack are shown in Figure 4 where a 2. The power outlet for any appliance that connects to the
customer masquerades their air-conditioner as a network for the first time is challenged by the AMI for the
television. This attack is one example of vulnerabilities password. A correct response authenticates the appliance
arising out of the two party dynamic where one party to the AMI and sets up the required bi-directional control
might try to cheat the other. between the AMI and the power outlet. The
6

communication in this step can use a public key Each AMI on deployment will have a pre-defined sequence
cryptographic technique. of channels through which it moves as a function of time.
3. The AMI and the authenticated power outlet with the When a new node authenticates to the network on the control
newly joined appliance now decide on whether to use the channel, the AMI sends the encrypted channel sequence to the
established encryption keys or to generate new ones on a node using the customer’s public key. Each node can then
per-session basis. decrypt using the customer’s private key and adopt the
When an appliance tries to authenticate and join the sequence, beginning with the current data channel being used.
network, it uses the pre-defined authentication channel. Once Methods for generating and exchanging pseudo-random
authenticated it moves to a different data channel used by the sequences using public key encryption are well known [27],
AMI. The AMI is assumed to have two interfaces, one for with the U.S. National Institute for Standards and Technology
receiving authentication requests, and another for (NIST) offering several standards from which to pick [28]. If
communication with authenticated devices. Any attacks aimed such pseudo-random sequences are used, the jammer can at
at preventing authentication can be handled manually as these best make a guess on what channel will be used, with prior
are rare and customer involvement can be expected at a time history of channels used being of no help.
when appliances are added. As mentioned in Section III, it Depending on tolerable complexity and cost factors,
would be safe to assume that a customer can be trusted to keep additional protections like directional reception capabilities
the utility assigned password safe. could be used at the AMI and possibly the nodes at the power
outlet. It is important to note that in technologies like ZigBee,
B. Jamming
the physical layer is based on Direct Sequence Spread
Jamming is one of the most difficult denial of service
Spectrum (DSSS) [23] which provides some protection against
attacks to defend against. The best defense against intentional
noise on a channel.
jamming is the use of multiple alternate frequency channels if
The proposed channel switching algorithm complements
the current channel has significant interference that results in
this by moving across channels as well to avoid attacks based
packet losses above a certain threshold. The AMI and any
on overloading a specific channel with data1. This approach is
nodes deployed can be hard-coded to move through a pre-
different than the one in [29] which assumes that some
defined and common random sequence of channels, if
communication is possible between the AMI or network
communication on the default channel is unsuccessful for a
coordinator and nodes to move to a different channel upon
specified period.
interference. The proposed scheme assumes the worst case
The nature of the WHAN-SM scenario is different from
that communication may not be possible under a strong
typical wireless sensor network research problems. Battery
jamming scenario, and thus is more resilient.
energy is not a constraint due to access to power outlets for
charging. Hence, each packet could possibly be re-transmitted C. Load profiling algorithm to prevent impersonation
multiple times and on multiple channels until it succeeds. Device impersonation, as mentioned in the previous section,
The AMI, being a high functionality node compared to could be done by a customer to bypass stringent control on
typical customer nodes, could be equipped with more spread some appliance on an as-needed basis. This prevents the utility
spectrum capabilities that could reject interference to a greater from having demand side management control. A load
degree, and possibly help monitor the network and call for profiling scheme is proposed whereby the AMI compares the a
manual intervention. Directional reception taking into account device’s load profile to the type of device it is announced to
appliance locations in the residence and appropriate AMI be. This is based on the premise that different appliances or
placement can further mitigate the impact of jamming. devices have unique signatures that can be exploited to
The approach shown in Figure 5 is proposed to move the identify them. A simple experiment collecting power values of
entire network through a sequence of predefined channels, common household appliances with a power meter supports
which could mitigate the impact of a jammer. this premise as shown in Figure 6.

Figure 6: Appliance Loading Patterns

1
This makes the proposed scheme mimic the behavior of Frequency Hopping
Spread Spectrum (FHSS) which is not possible under ZigBee’s underlying
802.15.4 standard specifications. ZigBee defines a Frequency Agility
Figure 5: Channel Switching Algorithm capability, and this algorithm can be used to implement this capability.
7

Figure 7: Load profiling algorithm to counter the possibility of device impersonation.

Figure 7 shows the sequence of steps that will be taken by numbers of packets sent from the power outlet of an appliance.
the appliance, the power outlet, and the AMI. On receiving an Timestamp based approaches would work similarly.
appliance operation request, the power outlet seeks permission
from the AMI. Based on the advertised class of device that
needs to be operated, the AMI either allows operation (for
class 1 and 2), or schedules operation based on current load it
is handling (for class 3 and 4). For all cases, the AMI sends a
previously formed load profile of the advertised device to the
power outlet for verification.
If the peak load of the currently operating device (Lcurrent) is
higher than the known peak of the advertised device L by
factor δ, or if the loading pattern does not match the known Figure 8: The sequence number technique to detect packet reply attacks
profile, the power outlet does not allow device operation.
Each device’s profile can be pre-stored based on E. Non-Repudiation
manufacturer’s data, or verified against prior device operation In the proposed approach, non-repudiation can be achieved
history. by ensuring that customers and the AMI use unique keys for
encryption, possibly after initial authentication using pre-
D. Replay Attack assigned public-private key pairs. Further, the AMI would be
Replay attacks, where a neighbor requests operation of a required to keep a log of all communication for a specified
customer’s device, can be prevented using timestamps, packet number of days. If either party files a complaint, the logs can
sequence numbers, or session keys. If the network is time- be used to trace back events. Regulations will need to be
synchronized, each packet can include the time at which it was enforced to ensure that the utility does not tamper with these
sent. If the AMI sees a packet that differs significantly from logs and are available for third party investigations.
the current time, it can ignore it. Similarly, if packets from
each appliance’s power outlet have sequence numbers, the V. CONCLUSIONS AND FUTURE WORK
AMI can filter packets significantly out of sequence. The use
This work presents a secure framework for smart metering
of session-based keys can also catch replayed packets, but this in a wireless home area network scenario. Such a framework
is more complex than the timestamp or sequence number was designed by first examining the communication
methods. If the overall security framework uses session based requirements for AMI in the WHAN-SM scenario and then
keys, then additional mechanisms will not be needed to studying the security challenges that had to be addressed.
prevent replay attacks. First the security objectives to be met were identified, and
Figure 8 shows an example scenario where the AMI could then possible attacks and vulnerabilities were outlined. Based
detect the presence of a replay attack by monitoring sequence on the two stakeholder objective, residential electric usage and
conventional wireless local area network security protocols,
8

solutions to these attacks were developed. Though more [14] Behr, “Do smart meters mean smart electricity use?” Tech. Rep.,
Available: http://www.scientificamerican.com/article.cfm?id=dosmart-
threats are possible as this application scenario matures, the meters-mean-smart-electricity-use.
foundation laid by this framework can be used to add new [15] A. Synder and M. Stuber, “The ANSI C 12 Protocol Suite – Updated
solutions to emerging threats. and Now with New Network Capabilities” Power Systems Conference:
Due to space limitations the overall framework of Advanced Metering, Protection, Control, Communication, and
Distributed Resources, 2007.
implementation could not be presented in this manuscript. A [16] H. Sui, H. Wang, M.-S. Lu, and W.-J. Lee, “An AMI System for the
common security framework against the indentified attacks Deregulated Electricity Markets,” Industry Applications, IEEE
using the proposed solutions will be presented in future Transactions on, vol. 45, no. 6, pp. 2104 –2108, nov. 2009.
papers. [17] Pacific Gas and Electric News Release, “PG&E Leads the Nation in
Smart Meter Deployment,” Available: http://www.pge.com/about/news
Future work in the area involves looking at the wireless /mediarelations/newsreleases/q2 2009/090414.shtml.
communication path between AMI of individual residences [18] Southern Company News Release, “Southern Company Reaches
and the utility’s control center. This will involve studying a Milestone in Smart Meter Program with 1 Million Installations,” Available
different class of attacks that are remote in nature and involve http://southerncompany.mediaroom.com/index.php?s=43&item=1870.
[19] Georgia Power News Release, “Your Meter is About to Get Smarter,”
exploiting vulnerabilities at the network layer. Such research Available: http://www.georgiapower.com/residential/smartmeter.asp,
will be complementary to the work presented here, which was [20] J.-M. Bohli, C. Sorge, and O. Ugus, “A Privacy Model for Smart
local in nature to the WHAN-SM. Additional work also needs Metering,” IEEE 2010 International Conference on Communications,
to be done by standardization bodies to provide capabilities to May. 2010
[21] J.-S. Lee, Y.-W. Su, and C.-C. Shen, “A Comparative Study of Wireless
appliances and other equipment that are expected to be part of Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi,” in 33rd Annual
future WHAN-SMs Conference of the IEEE Industrial Electronics Society, 2007, November
2007, pp. 46–51.
VI. ACKNOWLEDGMENT [22] Russell Dean Vines, “Wireless Security Essentials: Defending Mobile
Systems from Data Piracy”, 1st Edition, John Wiley & Sons, Inc, New
The authors gratefully acknowledge the support of the York, USA, 2002
Power Systems Engineering Research Center (PSERC) and [23] IEEE802.15.4, IEEE Standard 802, part 15.4: Wireless Medium Access
Control (MAC) and PHY) Specifications for Low Rate Wireless Personal
the contributions from the industrial and academic members of Area Networks (WPANs), 2003.
PSERC Project T-39, “Communication Requirements and [24] T. Godfrey and C. Rodine, “Unified Metrics for Management of Smart
Integration Options for Smart Grid Deployment,” and from the Grid Home Area Networks,” IEEE 2010 International Conference on
Communications, May. 2010
US Department of Energy Project DE-FG36-08GO88149, [25] V. Navda, A. Bohra, and S. Ganguly, “Using Channel Hopping to
“Sustainable Energy Solutions.” Increase 802.11 Resilience to Jamming Attacks,” in In Proc. IEEE
Infocom Minisymposium, 2007.
[26] “The Network Simulator NS-2,” User Information, Available:
VII. REFERENCES
http://www.isi.edu/nsnam/ns/.
[1] US Department of Energy, “What the Smart Grid Means to Americans,” [27] A. Shamir, “On the Generation of Cryptographically Strong
Tech. Rep., Available: http://www.oe.energy.gov/DocumentsandMedia Pseudorandom Sequences,” ACM Trans. Comput. Syst., vol. 1, 1983.
/ConsumerAdvocates.pdf. [28] National Institute of Standards and Technology (NIST), “Cryptographic
[2] F. Derbel, “Trends in Smart Metering,” in 6th International Multi- Toolkit,” Available: http://csrc.nist.gov/groups/ST/toolkit/index.html.
Conference on Systems, Signals and Devices (SSD), 23-26 2009. [29] P. Yi, A. Iwayemi, and C. Zhou, “Frequency Agility in a ZigBee
[3] W. Sweet, “The Smart Meter Avalanche”, IEEE Spectrum, October Network for Smart Grid Application,” Innovative Smart Grid
2009. Technologies 2010, Gaithesburg, MD Jan. 2010.
[4] “Going Green with AMI and ZigBee Smart Energy,” Daintree Networks
White Paper, 2008. Available: http://www.daintree.net /downloads VIII. BIOGRAPHIES
/whitepapers/ ami-smart-energy.pdf
[5] C. Bennett and D. Highfill, “Networking AMI Smart Meters,” IEEE Visvakumar Aravinthan (S’04, M’10) received his BS degree in Electrical
Energy 2030 Conference 2008. Atlanta, GA 17-18 Nov 2008 Engineering from University of Moratuwa, Sri Lanka in 2002 and received his
[6] F. Cohen, “The Smarter Grid,” IEEE Security and Privacy, vol. 8, 2010. MS and Ph.D. in electrical engineering from Wichita State University in 2006
[7] “Securing the Smart Grid,” Cisco Systems White Paper, 2009. Available: and 2010 respectively. Currently, he is a visiting lecturer at Clemson
www.cisco.com/web/strategy/docs/energy/SmartGridSecurity_wp.pdf University teaching power system courses. His research interests include
[8] R. Shein, “Security Measures for Advanced Metering Infrastructure distribution automation, smart grid applications, electric vehicles and controls.
Components,” in Asia-Pacific Power and Energy Engineering Vinod Namboodiri teaches communications and networking courses as an
Conference (APPEEC), 28-31 2010, pp. 1–3. Assistant Professor of Electrical Engineering and Computer Science at
[9] C. Bennett and S. Wicker, “Decreased Time Delay and Security Wichita State University. He performs research in energy related aspects of
Enhancement Recommendations for AMI Smart Meter Networks,” in wireless networking that includes optimizing energy consumption of portable
Innovative Smart Grid Technologies (ISGT), 19-21 2010. wireless networking devices and the application of wireless technologies for
[10] L. AlAbdulkarim and Z. Lukszo, “Integrating Information Security the Smart Grid.
Requirements in Critical Infrastructures: Smart Metering Case,”
International Journal of Critical Infrastructures, vol. 6, no. 2, 2010. Samshodh Sunku received his BE degree in Electronics and Communication
[11] F. Cleveland, “Cyber Security Issues for Advanced Metering Engineering from Visvesvaraya Technological University in 2007 and
Infrastructure (AMI),” in Power and Energy Society General Meeting – presently pursuing MS in Electrical Engineering at Wichita State University
Conversion and Delivery of Electrical Energy in the 21st Century, 2008 performing duties as a Graduate Research Assistant. His research interests are
IEEE, 20-24 2008. in Wireless networking technologies and Smart Grid.
[12] A. Metke and R. Ekl, “Security Technology for Smart Grid Networks,” Ward Jewell teaches electric power systems and electric machinery as a
Smart Grid, IEEE Transactions on, vol. 1, no. 1, pp. 99 –107, jun. 2010. Professor of Electrical Engineering at Wichita State University. Dr. Jewell is
[13] C. Bennett, B. Brown, B. Singletary, D. Highfill, D. Houseman, F. Site Director for the Power Systems Engineering Research Center (PSerc). He
Cleveland, H. Lipson, J. Ivers, J. Gooding, J. McDonald, N. Greenfield, is a Fellow of the IEEE. He performs research in electric power systems and
and S. Li, AMI System Security Requirements, Utility Communication advanced energy technologies. He has been with Wichita State since 1987.
Architecture International User Group (UCAIUG), December 2008.

You might also like