You are on page 1of 20

Future Generation Computer Systems 136 (2022) 358–377

Contents lists available at ScienceDirect

Future Generation Computer Systems


journal homepage: www.elsevier.com/locate/fgcs

Review article

Systematic survey of advanced metering infrastructure security:


Vulnerabilities, attacks, countermeasures, and future vision

Mostafa Shokry a , Ali Ismail Awad b,c,d,e , , Mahmoud Khaled Abd-Ellah f ,
Ashraf A.M. Khalaf g
a
Department of Infrastructure and Information Security, Ministry of Electricity and Renewable Energy, Cairo, Egypt
b
College of Information Technology, United Arab Emirates University, Al Ain P.O. Box 17551, United Arab Emirates
c
Department of Computer Science, Electrical and Space Engineering, Luleå, University of Technology, 97187 Luleå, Sweden
d
Faculty of Engineering, Al-Azhar University, Qena P.O. Box 83513, Egypt
e
Centre for Security, Communications and Network Research, University of Plymouth, Plymouth PL4 8AA, UK
f
Egyptian Russian University, Cairo 11829, Egypt
g
Department of Electrical Engineering, Faculty of Engineering, Minia University, Minia 61519, Egypt

article info a b s t r a c t

Article history: There is a paradigm shift from traditional power distribution systems to smart grids (SGs) due to
Received 27 February 2022 advances in information and communication technology. An advanced metering infrastructure (AMI)
Received in revised form 22 June 2022 is one of the main components in an SG. Its relevance comes from its ability to collect, process, and
Accepted 24 June 2022
transfer data through the internet. Although the advances in AMI and SG techniques have brought
Available online 27 June 2022
new operational benefits, they introduce new security and privacy challenges. Security has emerged
Keywords: as an imperative requirement to protect an AMI from attack. Currently, ensuring security is a major
Advanced metering infrastructure challenge in the design and deployment of an AMI. This study provides a systematic survey of the
Ssmart grid security of AMI systems from diverse perspectives. It focuses on attacks, mitigation approaches, and
Cybersecurity future visions. The contributions of this article are fourfold: First, the vulnerabilities that may exist
Security vulnerability in all components of an AMI are described and analyzed. Second, it considers attacks that exploit
Security threat these vulnerabilities and the impact they can have on the performance of individual components and
Security attack
the overall AMI system. Third, it discusses various countermeasures that can protect an AMI system.
Countermeasure
Fourth, it presents the open challenges relating to AMI security as well as future research directions.
The uniqueness of this review is its comprehensive coverage of AMI components with respect to their
security vulnerabilities, attacks, and countermeasures. The future vision is described at the end.
© 2022 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license
(http://creativecommons.org/licenses/by/4.0/).

Contents

1. Introduction....................................................................................................................................................................................................................... 359
2. Related work ..................................................................................................................................................................................................................... 359
3. AMI overview.................................................................................................................................................................................................................... 360
3.1. AMI components .................................................................................................................................................................................................. 360
3.2. AMI architecture .................................................................................................................................................................................................. 361
3.3. AMI tiers ............................................................................................................................................................................................................... 363
4. Security vulnerabilities of AMI ....................................................................................................................................................................................... 363
4.1. Vulnerabilities in the hardware layer ............................................................................................................................................................... 363
4.2. Vulnerabilities in the data layer ........................................................................................................................................................................ 364
4.3. Vulnerabilities in the communication layer ..................................................................................................................................................... 364
5. Security perimeters for AMI............................................................................................................................................................................................ 365
5.1. Data encryption.................................................................................................................................................................................................... 366
5.2. Authentication mechanisms ............................................................................................................................................................................... 366
5.3. Intrusion detection systems ............................................................................................................................................................................... 366
6. Lessons learned and discussion ...................................................................................................................................................................................... 368

∗ Corresponding author at: College of Information Technology, United Arab Emirates University, Al Ain P.O. Box 17551, United Arab Emirates.
E-mail addresses: ali.awad@uaeu.ac.ae, ali.awad@ltu.se (A.I. Awad).

https://doi.org/10.1016/j.future.2022.06.013
0167-739X/© 2022 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

6.1. Open challenges ................................................................................................................................................................................................... 370


6.1.1. Open challenges in securing the AMI hardware layer .................................................................................................................... 370
6.1.2. Open challenges in securing the AMI data and communication layers ........................................................................................ 370
6.2. Future vision......................................................................................................................................................................................................... 370
6.2.1. Artificial intelligence ............................................................................................................................................................................ 372
6.2.2. Cloud computing .................................................................................................................................................................................. 372
6.2.3. Big data analytics ................................................................................................................................................................................. 373
6.2.4. Blockchains............................................................................................................................................................................................ 373
7. Conclusion ......................................................................................................................................................................................................................... 373
CRediT authorship contribution statement ................................................................................................................................................................... 373
Declaration of competing interest.................................................................................................................................................................................. 374
References ......................................................................................................................................................................................................................... 374

system as a countermeasure for avoiding issues with authentica-


1. Introduction tion. Furthermore, Kumar et al. [10] studied attacks that violate
the privacy of the data. In addition, Pedramnia and Rahmani [11]
Traditional electric power grid infrastructures that are still considered only denial-of-service (DoS) attacks against an AMI.
in use will soon be considered to be outdated, mainly because Finally, Tan et al. [12] analyzed the security of only the data.
they do not utilize the rapid development of modern information The relevance and uniqueness of this survey are due to its
and communications technology (ICT) [1]. A smart grid (SG) is a comprehensive coverage of the entire AMI system. It analyzes
modern infrastructure based on ICT, providing enhanced services vulnerabilities, attacks, and countermeasures. When analyzing
for smart energy distribution and real-time tracking of energy vulnerabilities, attacks, countermeasures, open security
consumption. An SG is a modernization of an electricity delivery challenges, and cutting-edge technologies, this survey considers
system that enables it to monitor, protect, and automatically the AMI hardware layer, data layer, and communication layer. The
contributions of this paper are threefold:
optimize the operation of its interconnected elements to save
energy, reduce costs, and increase reliability and transparency [2]. • The survey is comprehensive and also focused. It reviews
A full-function SG uses a huge number of sensors throughout the security vulnerabilities that can be exploited, attacks, and
transmission and distribution grid, including smart meters (SMs). countermeasures for both the overall AMI system and its
These intelligent devices can collect and move data in real time. components.
They offer two-way communications for monitoring supply and • It considers the impact of an attack, as well as defense tech-
consumption. Fig. 1 illustrates how these intelligent devices are niques and security perimeters. The article aims to provide a
integrated into an SG system [3]. full description of vulnerabilities, attacks, and countermea-
An advanced metering infrastructure (AMI) is one of the major sures.
components of an SG. It integrates multiple technologies and • The survey provides insights into AMI security and several
devices to achieve a specific objective, such as collecting data open challenges. Furthermore, at the end of the paper, rele-
from various devices [4]. Although SGs have improved power vant cutting-edge technologies and possible deployments of
management by connecting generation and distribution in smart these technologies are described.
ways, they have new security challenges due to the links between
This article is organized into seven sections as follows. Sec-
the power system and ICT [5,6].
tion 2 reviews relevant works and compares previous surveys
A successful attack of an SG may lead to either localized or
of AMI security. Section 3 is an overview of AMIs, including the
widespread denial of the electricity service, which in turn may
main components, the main architecture types, and the tiers of an
cause a blackout [7]. For example, on December 23, 2015, the
AMI system. Section 4 covers the main vulnerabilities and attacks
control centers of three Ukrainian electricity distribution compa-
against the key components of an AMI system. It also discusses
nies were remotely accessed by adversaries, who took control of
the impact of these attacks. Section 5 describes some of the main
the supervisory control and data acquisition systems. Malicious
countermeasure techniques for securing an AMI system. Section 6
actors opened breakers at some 30 distribution substations in the is the discussion and considers existing open challenges for each
capital city Kyiv and the western Ivano-Frankivsk region, causing layer of an AMI system. Finally, the conclusions and remarks are
more than 200,000 consumers to lose power [8]. It is anticipated in Section 7. Fig. 2 is a mind map illustrating the overall structure
that AMIs will become more widespread due to the development and key sections of this article.
of the internet of things (IoT), smart cities, and smart homes.
Thus, it is crucial to identify security vulnerabilities and attack 2. Related work
mitigation approaches as a preventive strategy for alleviating
attacks of AMIs. There have been many surveys on the state of the art of AMI
This article provides a comprehensive survey of the security security, including on vulnerabilities, attacks, and countermea-
of AMI systems. It covers the entire architecture of an AMI sys- sures. Pealy and Matin [13] focused on attacks and mitigation
tem, including the hardware. It considers attacks against SMs, techniques for the hardware layer, which is represented only by
data concentrators (DCs), and communication channels, as well SMs. Kumar et al. [10] described cyberattacks against SM com-
as the data and applications. Furthermore, to build a complete ponents, especially attempts to steal the data being transferred
picture, mitigation approaches and current countermeasures are through the AMI system and threats to the privacy of the data.
covered, along with related attacks. Since attacks and mitigation Ghosal and Conti [9] focused on key management techniques that
approaches are considered in a single article, it should be easier to can be used to secure an AMI from attacks, such as authentication
identify new challenges and build a realistic vision of the future. between AMI entities.
Although there have been many review papers on AMI secu- Desai et al. [14] gave a detailed analysis of privacy problems
rity, some have focused on only one type of countermeasure. For relevant to an AMI and their corresponding solutions. El Mrabet
example, Ghosal and Conti [9] focused on the key management et al. [15] provided descriptions of several severe cyberattacks
359
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Fig. 1. Main components of an SG system, including the location of AMI components.

relating to the communication protocols used in an AMI and pro- attacks that may exploit these vulnerabilities, the direct impact
posed a cybersecurity strategy for detecting and countering these on each AMI layer, and the overall impact on the AMI. Identifying
attacks. Pedramnia and Rahmani [11] studied different types of mitigation techniques for protecting an AMI system from attack
DoS attacks due to vulnerabilities in the LTE as a communica- has not been fully covered in any previously published survey,
tion technology and also countermeasures. Hansen, Staggs, and which demonstrates the significance and the need for this survey.
Shenoi [16] analyzed the security issues in an AMI system with This article aims to address the drawbacks identified in the
more than a million SMs, 100 DCs, and a two-meter data man- previously published surveys by considering security vulnerabili-
agement system, as well as the impact of these attacks on the ties, attacks, and countermeasures across the overall AMI system.
performance of the AMI system. Another contribution of this survey is the categorization of the
Tan et al. [12] described attacks to steal the data in an AMI security vulnerabilities, attacks, and security perimeters based on
system. Tong et al. [17] considered the different types of intrusion the main AMI layers, namely the AMI hardware layer, data layer,
detection system (IDS) that can be used to secure an AMI system. and communication layer.
Jokar, Arianpoo, and Leung [18] discussed several SG cyberattacks,
focusing on those compromising the privacy of the data in the 3. AMI overview
AMI. Saxena and Choi [19] studied the different types of authen-
tication and access control techniques that can be applied to an
An AMI is an intermediate system between the user domain
AMI system to prevent unauthorized access.
and the utility domain. Its main purposes are power pricing
Anzalchi and Sarwat [20] investigated the importance of the
and demand-side management. An AMI architecture is generally
authentication between an SM and a utility center (UC) and
composed of three main types of component: SMs, DCs, and the
the different authentication techniques that can be used. Fore-
central system. There are bidirectional communication networks
man and Gurugubelli [21] discussed the attack surfaces of the
among those components. Fig. 3 illustrates the main components
main components of an AMI system. Komninos, Philippou, and
of an AMI architecture [25].
Pitsillides [22] studied the cyberattacks that may occur against
a home area network (HAN) in an AMI system, including SMs
and other smart devices in the HAN. Mohassel et al. [23] gave 3.1. AMI components
an overview of AMIs but without including the security issues.
Ancillotti, Bruno, and Conti [24] studied the attacks related to An SM is sometimes called a next-generation meter due to its
the communication technologies used in an AMI to transfer data advanced features [26]. The main purpose of an SM is to collect
between the different tiers of the AMI. data on electricity consumption from a customer’s premises [27].
This exploration of state-of-the-art research identified several An SM has two main parts: (1) A meter records the energy
relevant surveys that have already been published. Table 1 sum- used by the customer. These meter readings are sent to the DC.
marizes the results of this analysis. It shows that there are still (2) Computing elements perform preconfigured tasks such as
research gaps that need to be addressed. No single previous work remotely connecting or disconnecting, remotely upgrading the
has investigated existing vulnerabilities in an AMI system, the firmware, and tamper and theft detection and prevention [28].
360
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Fig. 2. Mind map illustrating the overall structure of the article and its key sections. In addition, the figure highlights the core elements and the sub-sections.

There are multiple definitions of a DC, which are also called An AMI has three main layers (Fig. 4): hardware layer, data
smart meter gateways or data aggregators [29]. Even though layer, and communication layer. As illustrated in Fig. 3, the hard-
there are multiple definitions, they are still used for the same ware layer includes SMs, DCs, and the UC. The communication
function, which is to act as an intermediate device between the layer can be wired or wireless. It is used to transfer data from
SM and the data center in the UC. A DC performs two main SMs to DCs, from DCs to the UC, and vice versa. The data layer
functions: forwarding data from SMs to the UC and sending comprises data relevant to the customer, which may represent
commands to SMs from the UC [30]. the user’s electricity consumption or the commands sent from the
A UC has a data center. It is generally located within the main UC.
facilities of the utility company. The main purposes of a UC are to
collect the data that are gathered from SMs, to send commands to 3.2. AMI architecture
SMs through the DC to get the SMs to perform specific tasks, and
Various architectures can be used to implement an AMI de-
to monitor aspects of the SG, such as the amount of generated
pending on the components and the communication technol-
power, the transmission lines, and the distribution centers [31].
ogy used. The architecture must meet the main objective of the
Communication networks play an important role in an AMI.
AMI, which is sending data from SMs to DCs then forwarding
They are responsible for connecting together all the main compo- these data to the UC through a bidirectional communication
nents of an AMI, including SMs, DCs, and the UC [32]. Bidirectional channel [36].
communication channels are used to send data from SMs to DCs Generally speaking, there are two main categories of AMI
and then on to the UC and also to send commands from the architecture: direct and indirect [37]. In a direct architecture, an
UC to the SMs [33]. The communication technologies used in an SM is connected directly to the UC through a communication
AMI vary widely, but generally, we can classify them as wired network, either wired or wireless, without the need for a DC. The
and wireless [34]. Using the right communication method is very advantage of a direct architecture is the simple implementation.
important as it has a vital role in protecting the AMI due to This type of architecture is appropriate for a small area and
the amount and sensitivity of the data transferred through the when the number of users and the amount of data is low [38].
channel [35]. With more users and data, a direct architecture is no longer the
361
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 1
Comparison of relevant surveys of AMI security identified in the literature review.
Ref, Year Objectives Remarks Our contributions
[13], 2020 Brief overview of attacks and mitigation Focuses only on attacks relevant to SMs. Attacks and mitigation techniques for
techniques but covering only SMs, which are the three AMI layers are introduced.
in the hardware layer of an AMI.
[10], 2019 Surveys of real cyberattack incidents in Focuses only on attacks compromising Extended countermeasure techniques
traditional energy networks and smart privacy. are considered, such as authentication,
metering networks. encryption, and intrusion detection.
[9], 2019 Highlights key security issues for AMIs and on Focuses only on authentication issues for Security challenges and extended
how key management techniques can be AMIs and key management systems. countermeasure techniques are
utilized. considered.
[14], 2019 Comprehensive survey of privacy-related Focuses only on privacy issues in AMIs and Security challenges and extended
research on IoT-enabled SG environments. the corresponding solutions. countermeasure techniques are
considered.
[15], 2018 Reviews of security requirements and Focuses on attacks related to the protocols Considers the AMI hardware, data, and
descriptions of several severe cyberattacks. that are used in AMI communication communication layers.
channels.
[11], 2018 LTE network vulnerabilities that lead to a DoS Discusses DoS attacks that may occur due Focuses on the AMI hardware, data, and
for legitimate subscribers in an AMI are to using an LTE network as a communication layers.
covered. communication technology.
[16], 2017 Security analysis of AMIs. Describes common attacks, the Mitigation techniques that can be
vulnerabilities of an AMI, and the impact of applied to the AMI to overcome
these attacks on the main components of different security vulnerabilities and
an AMI. attacks are considered.
[12], 2016 Surveys of recent security advances for SGs Studies the security of an AMI system from Overview of possible attacks against all
using a data-driven approach and centered the data perspective only. AMI layers is introduced.
around security vulnerabilities and solutions
over the entire life cycle of SG data.
[17], 2016 Analyzes potential threats to an AMI and Focuses only on IDS as a countermeasure. Multiple countermeasure techniques,
investigates current academic approaches to such as encryption and authentication,
IDS and other techniques for AMI. are covered.
[18], 2016 Introduces several SG cybersecurity and Focuses only on the privacy of data being Attacks related to the three AMI layers
privacy issues. transferred through the AMI channels. and various countermeasures are
covered.
[19], 2015 Reviews of existing authentication protocols Focuses only on authentication and access Vulnerabilities for each AMI layer and
and mutual authentication when control techniques without discussing the mitigation techniques are discussed.
communicating information across an SG vulnerabilities of the main components of
network. the AMI system and their related attacks.
[20], 2015 Assessment of cybersecurity for an SG and an Focuses only on authentication and privacy Several mitigation techniques are
AMI, as well as network vulnerabilities and issues between SMs and the UC in an AMI. covered.
attack countermeasures.
[21], 2015 Examines cyberattack surfaces for hardware Discusses only the attack surface in an AMI Security vulnerabilities, possible attacks,
and network configurations, protocols, and without considering vulnerabilities, attacks, and possible mitigation approaches are
software. or how to secure the AMI network. described.
[22], 2014 Presents issues related to the security of an SG Focuses on only one tier of an AMI, the All tiers of the AMI system—HAN, WAN,
and a smart home. HAN. and NAN—are covered.

Fig. 3. Main hardware components and general architecture of an AMI.

362
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Fig. 4. Three main AMI layers and their related components.

optimum choice, so an indirect architecture would be used [39]. customer and the UC [50]. Second, it is important that the data
An indirect architecture has an intermediary between the SMs cannot be modified during transmission from the source to the
and the UC [40]. The intermediary can be the cloud, so that the destination. Any modification would affect the integrity of the
data is forwarded to the UC by the internet. Alternatively, for an service, whether that relates to data transferred from the SM to
aggregator-based architecture, there are DCs between the SMs the UC or vice versa [50]. Finally, the availability of the service can
and the UC [41,42]. be measured as the percentage of the time that a stable service
is provided to the customer [50].
3.3. AMI tiers As a result of integrating ICT into traditional power grids,
security is a new challenge for such SGs [51]. As we saw in the
An AMI has three main zones or tiers. Each zone contains previous sections, the AMI, which is a major component of an
some of the components of the AMI. The three tiers of an AMI SG, consists of multiple devices. Most of these components are
are the HAN, neighbor area network (NAN), and wide area net- outside the UC, such as the SMs and DCs, so they are vulnerable
work (WAN) (Fig. 3) [43]. Each tier in an AMI can connect the to physical attacks and cyberattacks. In this section, we will
components using different communication technologies [44]. discuss security issues related to the main components of an
The HAN is the first tier of an AMI. It is within the customer’s AMI, including both hardware and software. We will consider
premises, which could be a home or commercial building. It vulnerabilities, possible attacks, and the impact of an attack on
connects intelligent end devices (IEDs) with an SM. In a HAN, the components.
the data are the energy consumed by each IED, which are passed
to an SM through a bidirectional communication channel. As 4.1. Vulnerabilities in the hardware layer
the amount of data transferred through the HAN is low, low-
energy communication technologies can be used, such as Zigbee, As shown in Fig. 4, the hardware layer consists of both the
Bluetooth, and Wi-Fi [45]. SMs and the DCs in an AMI system. Because of its nature, there
The second AMI tier or stage in the AMI architecture is a NAN, are several vulnerabilities for an SM located outside the UC.
which can link to multiple HANs. The main component in a NAN Moreover, as we discussed previously, an SM can be controlled by
is a DC, which collects data from SMs via the HANs [46]. Due a UC, as it can send commands to the SM through a bidirectional
to the increased data size and the number of customers in a channel. One of these commands is a remote disconnect, which
NAN compared to a HAN, the communication technology must allows the UC to connect or disconnect an SM [60]. This feature
be able to transfer a high amount of data more securely. Thus, is essential but at the same time makes the SM vulnerable to
cellular networks (LTE/2G-3G systems), optical fibers, and power an attacker impersonating the UC. The attacker can send this
line communication systems are used [47]. command to multiple SMs, which can lead to a denial of power
The last stage in the AMI is the WAN, which connects all the attack [61].
HANs and NANs with the UC. The WAN is linked to the meter data Lack of resources, such as internal storage, in an SM adds
management system, which collects, stores and analyzes the data another security challenge. An SM has a small amount of storage,
and sends commands or actions back to the NAN and then onto which is used for both the data collected from users and the
the HAN. Due to the large distance between the NANs and the UC, firmware. The latter is important for the functionality of the
which may be in another city, wired communication technology SM. This tiny storage space can lead to another issue, as it may
is preferred, as it can transfer the collected data faster and more prevent firmware updates, which are essential, especially security
securely. Power line communications are often used to connect upgrades. Moreover, the SM may not have enough space for cryp-
HANs to NANs, then connecting NANs to WAN. [48]. tographic functions. These could be deployed in extra disk storage
outside the SM chip, where they are vulnerable to both physical
4. Security vulnerabilities of AMI and cyber-access. An attacker can exploit this vulnerability with
a buffer overflow attack by broadcasting malicious messages that
An AMI is a service provided from the UC to the customer. Its fill the SM buffer so that the SM has to stop receiving data
aim is to enhance both the performance of the SG and the power temporarily [62].
service given to the customer. The security level, and hence, the An important feature of an SM is that the customer can ac-
stability of this service, are assessed using three features, namely cess it through a web page, allowing them to monitor power
confidentiality, integrity, and availability, which are called the CIA consumption and pay bills. This feature makes the SM vulner-
triad [49]. able to attacks via the web application, such as SQL injection,
The first of these, confidentiality, means that the data can be DoS, and distributed denial-of-service (DDoS) attacks. Addition-
accessed only by authorized users and not shared with anyone ally, this feature means that the data stored in the SM, either
else. Power consumption and a customer’s private data are ex- the data on energy consumption or the installed firmware, are
amples of confidential data, which can be accessed only by the vulnerable. An attacker can execute an authentication bypass
363
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 2
Security vulnerabilities in the AMI hardware layer and their related attacks.
References Publication year AMI Vulnerabilities Attack Direct impact General impact
component
[52–55] 2020, 2017, 2013, SM Bidirectional Attacker impersonates a UC SMs shut down. Widespread denial of
2019 communications and sends malicious code to power.
between the SM and SMs.
customer and between
the SM and the UC.
[56] 2012 SM Lack of resources in SM. Attacker performs buffer Instability in the Localized denial of
overflow attack. operation of the SM. power.
[57,58] 2016, 2018 SM Customer interference. Attacker sends malicious SM shuts down. Localized denial of
code to affect the firmware power or data theft.
of the SM or the data
stored in the SM.
[57,59] 2016, 2019 SM Ability to log on to the SQL injection, DoS, or DDoS. Stop the SM. Localized denial of
SM via a web power.
application.

attack. This means that even without knowing the customer’s cre- which threatens the reliability or privacy of the service. An inter-
dentials, they can steal data from or manipulate the data on the nal or external attacker could manipulate the data in the WAN
SM, which threatens the confidentiality, privacy, and availability in the UC. For example, they could modify the commands sent to
of the customer’s private data [63]. SMs, thus leading to instability of the SG and possibly causing a
These vulnerabilities and the resulting attacks against an SM denial of power [67]. Another vulnerability of an AMI is the use of
can degrade the performance and functionality of the SM and the internet protocol (IP) for transferring data, which makes the
the SG. One of the major impacts of an attack against an SM data vulnerable to attacks that succeed against IP-based systems,
is the theft of either the data on energy consumption or the such as IP spoofing, teardrop attacks, DoS, and others, which can
firmware installed on the SM. Knowing the customer’s energy
lead to data theft [68].
consumption over time can reveal the signatures of the electrical
Table 4 summarizes the various attacks that can occur against
appliances used by the customer, thus threatening the customer’s
an AMI system. Each kind of attack affects one or more of confi-
privacy. Moreover, a modification of the firmware can lead to the
dentiality, integrity, and availability, and this must be considered
dysfunction of the SM, which could disable it [64].
These attacks against the SM can also be performed against in the AMI design process. Any modification to the data or the
a DC, although they can have a larger impact, especially if the applications that run in the AMI affect the integrity of the system.
AMI has an indirect or mesh topology architecture, since multiple Attacks compromising customer data affect the confidentiality
SMs are connected to the UC through a single DC. Attacking a DC and integrity of these data. Attacks that damage the SM or DC
can affect several SMs, leading to a localized denial of power for due to a firmware modification affect confidentiality, integrity,
more than one SM simultaneously or the theft of data from all and availability.
the customers connected to the compromised DC [65].
Table 2 lists the vulnerabilities for both SMs and DCs such as
4.3. Vulnerabilities in the communication layer
the lack of resources of the SM and the direct connection between
the customer and SM, and the attacks that can be performed due
to the exploitation of these vulnerabilities. These attacks include As stated previously, communication channels are used to
buffer overflow attack and sending malicious code either to SM or connect IEDs to SMs within the HAN, SMs to DCs within the NAN,
DC to affect the downloaded firmware on them, and the impact and DCs to UC within the WAN. So, due to the importance and the
of these attacks, either on the device or on the entire SG. amount of data transferred through the communication channels,
they are the part of the AMI system most vulnerable to threats
4.2. Vulnerabilities in the data layer and attacks.
Wireless communication is used by HANs and NANs, which
As previously mentioned, the main purpose of the AMI is to makes the networks vulnerable to attacks against wireless com-
collect data from SMs and forward these data through DCs to munication channels, such as man-in-the-middle (MITM) attacks.
the UC, where the data are stored and analyzed. A huge amount This may lead to the theft of customer data [82]. Another vul-
of data is transferred through the AMI architecture. These data nerability of the communication channels is the failure of a com-
include the users’ energy consumption and their personal infor- munication line, which can occur because of interference, breaks
mation plus the status of components within the AMI, such as
to the cables, path degeneration, or loss of bandwidth. This can
health checks or logs. These data are vulnerable to attacks such as
lead to both localized and widespread denial of power and hence,
data manipulation, insertion, and hijacking attacks. These attacks
threaten the availability of the service [83].
can be performed within any one of the three AMI tiers [66].
Table 5 lists the relations between the vulnerabilities in the
Table 3 summarizes the relations between the vulnerabilities
in the AMI data layer, the related attacks, and the impact of these AMI communication layer, the attacks that exploit these vulnera-
attacks. The most common types of attacks against the data layer bilities, and the impact on the performance and the parameters of
of an AMI include data manipulation due to the direct connec- the AMI system. The major vulnerability in an AMI communica-
tion between the customer and the SM, firmware manipulation tion layer is the use of wireless transmission media between the
because of the remote updating feature of an AMI system, and SMs and DCs due to the large distance between them. Wireless
fraudulent manipulation of a customer’s energy consumption. communications are vulnerable to common attacks, such as ses-
If attackers can manipulate or insert data in the HAN, then sion hijacking, MITM, and communication channel failure, which
they can modify the data on power consumption or steal data, can lead to leakage or data fraud.
364
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 3
Security vulnerabilities in the AMI data layer and related attacks.
References Publication Vulnerabilities Attack Direct impact General impact
year
[33,69] 2019, 2018 Direct connection between Customer makes fraudulent Data loss or modification. High energy losses and compromised
the customer and the SM. claim for energy privacy of customer usage data.
consumption.
[70] 2017 Remote updating of Firmware manipulation. Data modification. SM and DC shut down, leading to
firmware and direct localized denial of power.
connection between the
customer and the SM.
[7,71,72] 2015, 2015, Customer interference with Injection of false data. Data modification. Attacker controls the SM and
2021 SM. compromises estimates of power system
state.
[73] 2015 Remote connection to SM DoS attack. Denial of data transfer. Localized and widespread denial of
and DC using the IP in the power.
AMI system.
[74,75] 2019, 2018 Lack of security Data manipulation by Data fabrication. Affect the integrity of or steal data.
configuration in utility data internal attacker.
center.

Table 4
Possible security threats and their impacts on an AMI.
References Publication year Threat Compromised AMI Vulnerabilities Impact:
service Integrity (I) Availability (A)
Confidentiality (C)
[53,57–59,76] 2016, 2018, 2019, Tamper with application Integrity Management applications Disruption of the communication
2019, 2017 services at AMI nodes. and services remain flow due to rerouting of all traffic to
exposed and available to all the attacker’s node for later
nodes. manipulation. (I)
[54,55,77] 2013, 2019, 2015 Masquerade as the control Integrity & Lack of authentication or Impersonation of the control center
center. Confidentiality encryption. to send unauthorized commands to
meters or read metering data. (I,C)
[78–81] 2020, 2012, 2013, Bypass authentication in Integrity & Poor implementation of Manipulation of reading parameters
2011 metering protocols. Confidentiality metering protocols. of SMs. (C,I)
[56,59] 2019, 2012 Buffer overflow in the AMI Integrity & Firmware makes System becomes unstable or freezes.
meter’s firmware. Confidentiality assumptions regarding the Parameter values in the memory
data it receives, particularly stack are changed. Arbitrary code is
the size of each message executed. (C,I)
format.
[69,70] 2019, 2017 Firmware manipulation. Integrity, Firmware architecture with Attacker executes a disconnect action
Availability, & poor access controls. and then makes the meter
Confidentiality. completely unresponsive till it is
returned to the manufacturer, thus
making it impossible for the network
operator to reverse their actions.
(C,I,A)

Table 5
Security vulnerabilities in the AMI communication layer and their related attacks.
Reference Publication year Vulnerabilities Attack Direct impact General impact
[84] 2011 Wireless communication Firmware update of the SM Leak from communication Localized and widespread
technology used. or DC. media. denial of power.
[85–87] 2021, 2015, 2013 Wireless transmission Session hijacking. Leak from security protocols Data theft or manipulation.
media. in the transmission media.
[88–90] 2020, 2017, 2019 Inadequate wireless MITM attack. Failure of a communication Data theft or manipulation.
technology security. channel.
[91,92] 2018, 2020 Interference to Bandwidth loss. Bandwidth congestion. Data congestion or loss.
communication channels.

5. Security perimeters for AMI will briefly discuss some of the most common countermeasures
for each layer of the AMI and also discuss relevant works in the
Countermeasures must be used to protect an AMI from attack. literature.
Different techniques can be used for each component of the This survey discusses the three countermeasures that are
AMI. For the data layer, encryption and integrity checking can the most common mitigation approaches: data encryption (data
safeguard the data transferred between the main components. layer), authentication (hardware layer), and IDSs (data and com-
For the hardware layer, authentication and authorization can be munication layers). Preserving the privacy of the data collected
used to verify the identity of entities joining the AMI network. For by the AMI system is essential. The data must be protected both
the communication layer, intrusion detection techniques can be in transit and when stored. Encryption can prevent unauthorized
used to detect unauthorized access to the network. This section access and modification of these data.
365
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Some AMI components are outside the premises of the elec- 5.2. Authentication mechanisms
tricity utility, and such physically unprotected end devices must
be protected from unauthorized access. Moreover, the AMI com- Verifying the source of data is crucial for protecting the data
munication layer depends on wireless communications for trans- transmitted through an AMI system. Therefore, authentication
mitting data, which means the data are vulnerable to access or mechanisms play a vital role in securing the hardware layer of
interference by an attacker. Thus, an IDS is the optimum solution the AMI, including both SMs and DCs. Authentication is essential
for an AMI as a second line of defense, since it can detect any when establishing node-to-node communications. Authentication
security breaches in the system. can be used to prevent attacks where an attacker impersonates
Attackers can exploit vulnerabilities in communication tech- either a UC and sends broadcast shutdown message to multiple
nologies. For example, by spoofing a known ID or injecting ma- SMs or an SM and sends malicious code to the DC, which may
licious code, an attacker could deactivate the demand–supply affect the firmware of the DC and affect the performance of the
balance and steal or modify customers’ energy consumption data. DC and the overall SG.
Thus, authentication is an important mitigation technique that In this section, we give an overview of various techniques
must be applied in an AMI system. for authenticating the source of data. Lee, Hwang, and Choi [55]
proposed a unified approach for compression and authentication
5.1. Data encryption of power reading signals in multicarrier systems based on com-
pressive sensing (CS) of SM readings. Robles et al. [58] developed
Encryption is an important method for securing the data layer a combination of a blockchain and smart contracts to enable user
of an AMI system. It can preserve the privacy of data being empowerment of data management for the HAN tier of an AMI.
transferred through the AMI via the HAN, NAN, or WAN. It can Li et al. [100] presented a new authentication architecture that
protect the AMI from attacks such as MITM, data hijacking, and boosts the utilization of a set of efficient authentication schemes
data sniffing. and fault diagnosis algorithms that can be used for authentication
Tonyali, Saputro, and Akkaya [77] conducted a feasibility study failures.
on the integration of a fully homomorphic encryption (FHE) sys- Mustapa et al. [95] introduced a novel authentication scheme
tems with the wireless communication standard IEEE 802.11s. using ring oscillator physically unclonable functions (ROPUFs),
Their method can be used when transferring data through a
which covers the communication between the UC and an SM.
HAN. A variety of conditions were studied with the NS-3 network
Kamto et al. [81] proposed a mechanism based on group IDs. It
simulator tool. Parvez, Islam, and Kaleem [94] proposed a sim-
is a lightweight key distribution and management scheme that
ple node-to-node authentication method based on electromag-
establishes the keys for many entities for a small overhead. Chin,
netic signal strength using two simple servers, which includes
Lin, and Chen [96] designed an authentication scheme for an AMI
two-level encryption, without increasing the packet processing
that utilizes SMs to enable two-way communications between an
overhead. One server (master) manages the encryption of data
SM and the UC. The SM is authenticated globally by a public key
being transferred between the SM and the UC whereas the other
infrastructure (PKI) and authenticated locally with channel signa-
server manages randomized data transfers. Ibrahem et al. [52]
tures. Nabeel et al. [79] proposed an approach based on physically
proposed a privacy-preserving monitoring and billing scheme
unclonable functions (PUFs). It provides strong hardware-based
using functional encryption (PMBFE).
authentication of SMs and efficient key management between
Hasan and Mouftah [93] proposed an encryption service for
SMs and the UC.
SG AMI using lightweight encryption of AMI data. Lee et al. [56]
Nath et al. [97] proposed an authentication and key man-
proposed a system with searchable and homomorphic encryption
agement scheme based on configurable ROPUFs implemented on
to protect customers’ private information and support real-time
measurements of electricity usage. Saxena, Choi, and Grijalva [53] Xilinx Spartan-3E FPGA boards. Nicanfar et al. [80] proposed an
proposed a secure and privacy-preserving scheme based on ad- efficient scheme that mutually authenticates an SM of a HAN
ditive homomorphic encryption and proxy re-encryption opera- and an authentication server in the UC by utilizing an initial
tions. The proposed scheme can aggregate metering data without password. Saxena and Choi [98] developed a protocol that pro-
revealing the actual individual data (identity or energy usage) to vides distributed and mutual authentication among communicat-
intermediate entities or any third party, and hence, it can defend ing entities based on a certificateless cryptosystem and PKI. The
against identity and related data theft attacks. protocol is lightweight, integrated, distributed, and centrally con-
Alsharif et al. [76] proposed an efficient and privacy-preserving trolled and has a cloud-trusted authority. George, Nithin, and Kot-
data collection and access control scheme for multi-recipient AMI tayil [99] used a hybrid encryption scheme for unicast, multicast,
networks. These authors developed a novel proxy re-encryption and broadcast communications in an AMI. A key management
scheme that allows data aggregation before re-encryption. It scheme for hybrid communication modes was proposed. Naseer,
allows either full or partial access to the aggregated data after re- Bhutta, and Alojail [78] developed a protocol to establish a session
encryption as needed. Parvez et al. [57] proposed a localization- key for a DC and SM after authenticating each other. It has four
based key management system. Meter data are encrypted by the phases: initialization, registration, mutual authentication, and key
key associated with the coordinate of the meter and a random exchange.
key index, but keys are managed and distributed by a trusted Table 7 compares published authentication techniques that
third party. Seo, Ding, and Bertino [54] proposed an efficient can be deployed in an AMI such as blockchain with smart con-
encryption key management mechanism for end-to-end security tracts, integration between PKI system and channel signature,
in an AMI by applying certificateless public key cryptography for and PUF technologies. Furthermore, performance metrics from
SM key management. This approach eliminates the overhead due different viewpoints and the possible types of attacks that can
to certificate management by the utility company. be defended by authentication are listed as well.
Table 6 compares published studies on encryption for an AMI.
It lists the different encryption techniques used to secure the data 5.3. Intrusion detection systems
layer such as the FHE system, proxy re-encryption, encrypting key
management system, and PMBFE techniques. The performance An IDS is a powerful tool for securing both the data and the
metrics from different points of view and the possible attacks that communication layer of an AMI system from attackers, who could
can be prevented with data encryption are also listed. otherwise exploit unknown system vulnerabilities and disrupt
366
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 6
Comparison of published studies on data encryption techniques used for securing an AMI data layer.
Reference, year Target attacks Encryption Objectives Assumptions Performance Performance impact
technique metrics
[52], 2020 Collusion and PMBFE To preserve customer Compared with Communication Reduces the time required
eavesdropping privacy while homomorphic-based and for key generation,
attacks. collecting their power and inner-product computation encryption, and decryption
consumption data for functional encryption, overheads. by nearly 99%. Reduces the
monitoring and PMBFE has been time to generate the 48
billing. evaluated with monitoring keys by 98.6%
extensive and the time to generate
computer-based the 100 decryption keys for
simulations. billing by 96%.
[76], 2019 Collusion Proxy To provide N/A Computation Lower computational cost
attacks. re-encryption. fine-grained access and for each entity in the AMI
control for communication network and low
multi-recipient AMI overheads. communication overhead.
networks, so that
each recipient can
access only the data
intended for it.
[53], 2017 MITM, replay, Additive To ensure privacy N/A Computation, Low overheads because of
and homomorphic during data communication, efficient short signatures,
impersonation encryption and aggregation. and storage XOR and hash operations,
attacks. proxy overheads. as well as the transmission
re-encryption of fewer bits due to
operations with compression by pairing and
the Paillier exponential operations.
cryptosystem.
[57], 2016 Decoding Localization- To ensure data N/A N/A N/A
energy based key privacy in the AMI.
consumption management.
readings,
injecting false
data or
command
signals, and
jamming.
[77], 2015 N/A FHE To investigate the Based on wireless Encrypted data Higher latency than other
feasibility of FHE LAN 802.11s protocol size, average approaches. Has a higher
systems for an IEEE for communications completion data size compared to PHE
802.11s-based AMI with a mesh topology time, and AES that exceeds the
application while network. Simulated throughput, maximum transmission
preserving consumer using NS-3 software. and average unit. Hence, generates more
privacy. Approach compared number of fragmented packets.
with AES and PHE fragmented Completion time is good
encryption with and packets. when the max. number of
without an nodes is 81.
aggregator.
[93], 2015 N/A Lightweight To present an Compared with a PKI, Speed, cost- Lighter than hybrid
encryption. encryption service for it is completely effectiveness, approaches. Much lower
SG AMI based on the dependent on and the key generation time than
cloud. symmetric generation time an in-house PKI.
cryptography. for different
numbers of
session keys.
[94], 2014 N/A Key To enhance two-level One server (master) Packet N/A
management encryption without manages data overhead.
with two increasing packet encryption between
independent overhead. the meter and energy
and partially supplier whereas the
trusted but other manages
simple servers. randomized data
transfer over a
wireless mesh
network.
(continued on next page)

the AMI system. Various types of IDS have been implemented to system. The first stage of intrusion detection uses a support vector
protect AMIs. Faisal et al. [112] proposed an IDS architecture for machine (SVM) as a detection algorithm to uncover suspicious
an AMI that was placed in SMs, DCs, and the central system (the behavior inside a SM. The second stage uses a temporal failure
AMI head end). They used data mining on the public KDD Cup propagation graph to generate attack routes for identifying attack
1999 dataset to determine the requirements for the three com- events.
ponents of the AMI. This extended the work of Faisal et al. [111]. Li, Qiu, and Jing [106] introduced an IDS based on an online-
Sun et al. [104] proposed a two-stage cyber-intrusion protection sequence extreme learning machine (OS-ELM) to detect attacks
367
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 6 (continued).
Reference, year Target attacks Encryption Objectives Assumptions Performance Performance impact
technique metrics
[54], 2013 Spoofing, Encryption key To secure data Communications Computational Decreased the overhead of
eavesdropping, management. transmission between between the utility overhead of the registrations.
and MITM the SMs and the company and SMs SM.
attacks. utility company. over a local area
network (LAN).
Performance was
compared with an
approach based on a
PUF.
[56], 2012 Internal Searchable To prevent internal Proposed system Communication N/A
attacks. encryption and threats in advance. protects customers’ and
homomorphic private information computation
encryption. while allowing time.
real-time
measurement of
electricity usage.
Proposed AMI system
based on Zigbee
network. Surveyed
five SMs.

against an AMI. Jokar, Nicanfar, and Leung [113] presented a Table 8 compares relevant studies on IDSs that are suitable
layered specification-based IDS for a HAN implemented using for deployment in an AMI. The table lists the IDS techniques such
Zigbee to protect the physical and medium access control layers. as layered specification-based IDS and IDS based on a distributed
Yao et al. [102] proposed an AMI intrusion detection model based fog architecture, the objective, the assumptions made, the per-
on the cross-layer feature fusion of convolutional neural networks formance metrics, and the performance impact. Some types of
(CNNs) and long short-term memory (LSTM) to obtain compre- attacks that can be prevented by an IDS are also mentioned.
hensive features with multi-domain characteristics based on the
KDD Cup 99 and NSL-KDD datasets. Alseiari and Aung [109] 6. Lessons learned and discussion
developed a real-time distributed IDS for an AMI infrastructure
that utilizes data stream mining in a multi-layer implementation. The former sections of this survey evidence that an AMI is
Vijayanand, Devaraj, and Kannapiran [107] proposed an IDS a critical component of the smart grid system. Therefore, an
for early detection of threats against the AMI of an SG. This AMI system requires a high level of security against all possible
IDS has a multi-SVM classifier with a mutual information-based attacks. Security standards published by the National Institute of
feature selection technique to detect attacks against the NAN of Standards and Technology (NIST) must be taken into considera-
an SG. Huang [101] proposed an improved intrusion detection tion in the design and implementation of an AMI system to meet
algorithm with a generalized regression neural network (GRNN). the requirements of the CIA triad. These security standards are
It has an excellent nonlinear mapping function and a high conver- essential for ensuring the robustness of an AMI system.
gence rate. The study used the public intrusion detection dataset Despite the importance of an AMI system in improving oper-
NSL-KDD to verify and analyze the proposed algorithm. ational efficiency and customer service and in conserving energy,
Pourfallah, Jafari, and Shahhoseini [110] proposed an IDS based the deployment of SGs and new communication technologies has
on a SVM and principal component analysis (PCA) to recog- led to new security challenges. With the increasing number of IoT
nize and identify intrusion and attacks in an SG. Park, Li, and devices, such as SMs and DCs, the security risks to an AMI system
Hong [103] built a machine learning and context-aware IDS, are proportionally increasing. AMI systems provide the UC with
which was considered to be effective based on the detection rate a huge amount of data and information, and it is imperative that
(DR) of anomaly signs and the possibility of process achievement the UC can protect these data from different types of attacks.
compared to previous systems. An AMI system consists of three main layers, namely, the
Radoglou-Grammatikis and Sarigiannidis [105] presented a hardware, communication, and data layers. Each layer has its own
new IDS for an AMI that utilizes machine learning capabilities features and characteristics, and they are vulnerable to various
based on a decision tree to distinguish between normal and ma- types of attack. For the hardware layer, as the number of SMs
licious activities. Chekired, Khoukhi, and Mouftah [59] proposed increases, the number of attacks against them also increases, such
a hierarchical and distributed IDS based on a distributed fog as injecting malicious code to steal data or modify the firmware
architecture using three hierarchical network levels (i.e., HAN, in the SM, which can lead to a localized DoS. The communica-
residential area network, and fog operation center network). Jokar tion links that interconnect the AMI components together which
and Leung [108] developed a novel intrusion detection and pre- is the main component of the AMI communication layer have
vention system for Zigbee-based HANs in an SG. It employs a vulnerabilities that can be exploited to perform attacks such as
model-based IDS as well as a machine learning-based intrusion traffic interspersion attacks, MITM attacks, and session hijacking
prevention system (IPS) to protect the network against a wide attacks. For the data layer, The data transferred through an AMI
range of attack types. network are vulnerable to unauthorized tampering, unauthorized
Firmware manipulation can be prevented by intrusion de- destruction, or theft.
tection techniques. Jakaria, Rahman, and Hasan [69] proposed Encryption countermeasure technique can be applied to the
a novel way to detect fraudulent data from SMs based on the AMI data layer to protect the data that are being transferred.
energy consumption patterns of consumers by utilizing deep Traditional encryption techniques depend on decrypting the en-
learning. They devised a method for detecting suspicious relay crypted data before performing any computational process. [77].
nodes in an AMI that could manipulate the data before forwarding Decrypting the data makes them vulnerable to internal and ex-
it to an aggregator. ternal attacks. Homomorphic encryption can help to preserve
368
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 7
Comparison of published studies on authentication techniques for securing an AMI.
Ref, year Target Authentication Objective Assumptions Performance metrics Performance AMI
attack technique impact parameters
[78], 2020 N/A Four phases to To manage keys, Simulation calculated Communication Latency increased SM/UC
establish a session especially key the overhead using efficiency, delivery as the number of connection
key: Initialization, distribution. hashing with a ratio, latency, and nodes increased.
registration, 1024-byte RSA key. overhead ratio.
mutual
authentication,
and key exchange.
[55], 2019 Imperson- CS To compress and N/A Residual error of a N/A SM and DC.
ation. authenticate power received signal and
reading signals in authentication error
multicarrier systems probability.
based on CS.
[58], 2018 Modifying Blockchain and To present a use case N/A N/A N/A Data
data. smart contracts. where both blockchain
and smart contracts are
employed based on
cryptography to enable
user empowerment of
data management.
[95], 2016 N/A ROPUFs with a To secure the data being Implemented on Latency and data Storage cost of SM/UC
Hamming code. transferred from an SM Spartan 3E. storage. authentication is connection
to the UC. low.
[96], 2016 N/A PKI and channel To enable two-way Two meters collect Detection probability. N/A SM/UC
signatures. communications data and send them connection
between the SM and the to the HAN
UC. concentrator.
Machine-to-machine
authentication in the
SG occurs via a
two-layer approach,
with global and local
layers.
[97], 2016 Wireless Configurable To provide end-to-end Xilinx Spartan 3E Storage requirement N/A SM/UC
sensor ROPUFs. security for the FPGA boards. and authentication connection
network confidentiality and time.
attacks. integrity of messages
exchanged between the
UC and SMs.
[98], 2016 Insider and Attribute-based To authenticate and IEC 61850 Communication and N/A N/A
outsider access control. authorize users to client/server IED computation
attacks. mitigate outsider and simulation on a PC overheads.
insider threats in the SG with the SG ware
whenever a user Java IEC61850
accesses the devices. client/server SDK.
[99], 2016 N/A Key management To ensure confidentiality, Unicast connection Computational load N/A N/A
scheme. integrity, and between SM and UC on SM represented by
authenticity. established using TCP execution time.
over Ethernet.
Multicast and
broadcast connection
is established using
UDP.
[100], 2015 N/A N/A To boost the utilization Fault diagnoses of Communication and N/A SM and DC
of efficient authentication computation costs,
authentication schemes. failures. and payload for
authentication.
[80], 2013 N/A Identity-based To mutually authenticate Uses the security Overhead cost. N/A HAN/UC
cryptography. an SM in a HAN with an analyzer automated connection
authentication server in validation of internet
the SG. security protocols and
applications.
(continued on next page)

the privacy of data in an AMI system since computational pro- Authentication techniques such as PKI can be applied to the
cesses can be applied to the encrypted data without the need AMI hardware layer to verify the source of the data being sent
for decrypting them, thus making the data more secure [114]. for preventing unauthorized access to an AMI system, either
This encryption technique is suitable for the AMI data layer. It internally or externally. Determining the appropriate authenti-
enhances the security of the data, both in storage and during cation technique for an AMI is challenging because of the lack
transit. of resources in an SM, the vulnerabilities in the communication
369
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 7 (continued).
Ref, year Target Authentication Objective Assumptions Performance metrics Performance AMI
attack technique impact parameters
[79], 2012 N/A PUF technology. To provide strong Uses Xilink’s N/A N/A N/A
hardware-based Spartan-6 FPGA
authentication of SMs board, which is
and efficient key connected to a PC
management to ensure through a serial port.
the confidentiality and
integrity of messages
exchanged between SMs
and the utility.
[81], 2011 N/A Lightweight key To guarantee the N/A Computational and N/A HAN
distribution and trustworthiness of the storage overhead.
management AMI.
scheme tailored to
AMI.

channels, the multiple sources of data in the system, and the huge system, and inadequate physical security. Attackers often exploit
amount of data traversing the AMI system. The data layer must poorly protected devices connected to the internet to cause phys-
be fully secured from any form of modification [100]. ical damage to a network, to wiretap into communications, or to
An IDS can be used as a second line of defense for an AMI launch disruptive attacks, such as DDoS. Common vulnerabilities
communication layer to detect external intruders, as it can de- of IoT devices relate to device memory, device physical interface,
tect malicious behavior. Nowadays, an IPS is integrated with an device web interface, device firmware, device network services,
IDS to prevent an attack after detecting it [111]. Using an IPS third-party back-end APIs, and local data storage.
based on artificial intelligence (AI) is essential as it ensures the
cybersecurity requirements of confidentiality, integrity, and avail- 6.1.2. Open challenges in securing the AMI data and communication
ability (CIA) [104]. An IPS consists of three main modules named layers
The AMI data layer is the backbone of an AMI system. Main-
the agent module, analysis engine, and the response module.
taining the privacy of data is important as it can contain sensi-
There are three main types of analysis engine: signature-based,
tive information. Encryption techniques have several challenges,
anomaly-based, and specification-based [115]. A signature-based
including the overhead of managing the encryption keys, the
IPS compares potential malicious behavior in an AMI system with
difficulty in decrypting the data, the key exchange system, and
a predetermined set of signatures for different attacks [115]. An
the integration with cloud-based systems. Integrity checks are ap-
anomaly-based intrusion detection and prevention system can plied after data are received to ensure that the data have not been
identify abnormal behavior in an AMI system using machine modified during transmission, but these too suffer from security
learning or a neural network. Specification-based intrusion detec- challenges. An open challenge for integrity check mechanisms is
tion and prevention systems utilize predetermined policies that the heterogeneity of data sources, especially in an AMI system
prescribe the normal behavior of the AMI system. with a large number of data sources.
Despite all the previously mentioned possible security coun- The AMI communication layer plays a vital role in the per-
termeasures and the mitigation approaches described in the lit- formance of an AMI system, as it is responsible for transferring
erature, there are open challenges that are existing for each layer data from the customer domain to the utility domain and vice
of the AMI system that need considerable research attention. versa. There are several open challenges related to the type of
the transmission media, required bandwidth, latency, the used
6.1. Open challenges topology, and the quality of service when designing an appro-
priate communication channel. These challenges are due to the
6.1.1. Open challenges in securing the AMI hardware layer huge amount of data being handled and transferred through the
For node-to-node communications, authentication and autho- communication channel [116].
rization are the two main techniques for protecting the hardware The required bandwidth is a very important metric in de-
layer of an AMI. There are several challenges with both older and signing and choosing the appropriate transmission media (optical
contemporary authentication protocols with respect to efficiency, fiber, radio waves, etc.) and the appropriate communication tech-
cost, delay, and privacy. Published works mainly focus on hard- nology, which can be either wired or wireless. The IEEE P2030
ware authentication, and less attention has been given to user standard does not define the bandwidth requirements [117].
authentication. Therefore, user authentication and authorization Achieving low latency is another important open challenge for
protocols, either in the HAN for end users or in the UC for admins, the communication layer due to the huge amount of data [118].
are considered open challenges in securing the hardware layer of One of the most important parameters in designing the AMI
communication layer is determining the appropriate topology
an AMI system from unauthorized access attacks, like spoofing
that connects either SMs to DC or DCs to the MDM system located
attacks. Authentication protocols can prevent the leakage of con-
on the UC. There are various network topologies that can be
fidential data and protect the privacy of the information of the
used either star or mesh topology. Each network topology has its
relevant entity, whether a home or a corporate customer. Access-
own features and capabilities thus determining the appropriate
based techniques must be applied to authenticate and authorize
topology can be considered a new open challenge for the AMI
the source of the data. communication layer.
As the SMs in an AMI system are IoT devices, any vulnerability
can result in severe threats to the AMI system, since most IoT 6.2. Future vision
devices have security issues. IoT devices on the internet have very
few security mechanisms to protect them against various emerg- Several researchers have adopted new technologies for an AMI
ing threats. These devices can, thus, be infected by malicious to enhance performance, such as by accelerating the information-
code or malware due to the absence of proper authentication gathering process. Moreover, some recent techniques can en-
mechanisms, a lack of default credentials, the absence of a lockout hance the analysis of the huge amount of data collected from
370
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 8
Comparison of published studies on IDSs used for securing an AMI.
Ref, year Target attack Technique used Objective Assumptions Performance metrics Performance AMI
impact parameter
[101], 2021 N/A GRNN intrusion To protect the AMI Uses dataset N/A N/A Data
detection algorithm. from outside attacks NSL-KDD to verify
and analyze the
algorithm.
[102], 2021 N/A Cross-layer feature To protect the AMI Experiments based Accuracy, P, F, DR, Accuracy, DR, and Data
fusion of a CNN and from outside attacks. on the KDD Cup and false positive rate FPR of the
LSTM networks. 1999 and (FPR). proposed intrusion
NSL-KDD datasets. detection model
were improved.
[103], 2020 N/A Machine learning and To protect the AMI N/A DR and possibility of N/A Data
context-aware. from outside attacks. process achievement.
[104], 2020 N/A SVM and temporal To present a Test platform Space and time. N/A SM
failure propagation two-stage based on NS-3 to
graph. cyber-intrusion simulate an AMI
protection system. network
environment and
on single-board
computers to
emulate IEEE
802.15.4
communications
between a grid
router and an SM.
[59], 2019 False Distributed fog To protect the AMI Performance Intrusion DRs and N/A N/A
measurement architecture. from cyberattack. metrics compared communication
injection attack. with centralized overhead.
architectures.
[69], 2019 Firmware Energy consumption To detect fraudulent N/A N/A N/A Data
manipulation. patterns. data from SMs.
[105], 2018 N/A Machine learning To protect the AMI N/A Accuracy and positive Accuracy and true Data
capabilities based on from cyberattack. rate. positive rate of
a decision tree. the IDS reached
0.996 and 0.993.
[106], 2018 N/A OS-ELM To detect attacks Comparative Five indicators: N/A Data
against the AMI. analysis with Accuracy, FPR, false
other algorithms negative rate (FNR),
including training time, and
back-propagation test time.
neural network,
radial basis
function network,
extreme learning
machine, and
OS-ELM.
[107], 2017 N/A Multi-SVM classifier. To detect attacks Training and Attack DR. N/A NAN
against the NAN of testing the
an SG. classifier with the
ADFA-LD dataset.
[108], 2016 N/A Q-learning To protect the Zigbee-based N/A N/A HAN
network against a HANs in SG SEP
wide range of attack 2.0 specification as
types. well as IEEE
802.15.4 standard
to precisely
characterize the
expected normal
behavior.
[109], 2015 N/A Data stream mining To present a N/A DR, FPR, and FNR. N/A Data
in a multi-layer real-time distributed
implementation. IDS for an AMI
infrastructure.
[110], 2014 N/A SVM and PCA. To recognize and Data KDD99 and DR and the rate of Correct DR and Data
identify intrusion and numerical attack error detection. the rate of attack
attacks in an SG. simulations. error detection
work best with
PCA.
(continued on next page)

371
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Table 8 (continued).
Ref, year Target attack Technique used Objective Assumptions Performance metrics Performance AMI
impact parameter
[111], 2014 N/A Data stream mining. To enhance the Consists of Accuracy (%), kappa N/A Data
security of an AMI individual IDSs for statistic (%), model
through IDS, a second three different size (kB), running
line of defense after levels of AMI time (seconds), model
the primary security components. KDD cost (RAM hours),
methods of Cup 1999 dataset FPR (%), and FNR (%).
encryption, is used.
authentication, and
authorization.
[112], 2012 N/A Public data stream To present an IDS IDS architecture Accuracy, kappa N/A Data
mining. architecture for an consists of three statistic, FPR, FNR,
AMI to complement local IDSs in SMs, time, and memory
other security DCs, and the consumption.
measures. central system.
KDD Cup 1999
dataset used for
analysis.
[113], 2011 N/A Layered To detect intrusion. Uses Zigbee, Detection capabilities. N/A HAN
specification-based specifically the
IDS. physical and
medium access
control layers.

SM devices, such as AI, big data analytics, blockchains, and cloud As mentioned in the previous section, the performance of en-
computing, which could solve some of the open challenges al- cryption algorithms and key exchange systems affects the perfor-
ready mentioned for each layer of an AMI system. mance of the AMI data layer. Encryption is necessary for ensuring
the security of the data traversing the AMI system and protecting
6.2.1. Artificial intelligence the data from unauthorized access. The use of AI in encryption
One advance in smart metering is the integration with AI. is called neural cryptography, which relies on artificial neural
In an AI metering (AIM) system, the smart appliances and the networks [125].
electricity consumption of the customer are fully controlled by There are some challenges for traditional signature-based,
the system [119]. An AIM has additional features compared to anomaly-based, and specification-based approaches to IDS. Inte-
an AMI, such as a schedule of usage for various smart devices, grating AI into an IDS could solve these issues. For example, AI can
renewable energy source integration, and power quality moni- increase the flexibility of IDS compared to using a threshold. It can
increase the adaptability and introduce additional pattern recog-
toring [120]. An important feature provided by AIM is detecting
nition features. IDS enhanced with AI is faster than a conventional
the location of each appliance deployed in the HAN using a smart
IDS and also has the ability to learn [126].
multi-power tap, which is an SM with an advanced multi-outlet
power strip. It provides important contextual information such as
6.2.2. Cloud computing
the identity and location of electric home appliances, temporal
Cloud computing allows users to share pools of preconfigured
power consumption, and can control the power supply to those
network resources, like servers, storage, and applications. These
appliances [121].
resources can be accessed at anytime and from anywhere through
There are three main types of AI: decision tree-based, rule-
the internet [127]. As the number of SMs and the amount of
based, and data mining. Decision tree-based AI is used for fore-
data increase, an AMI system could use a UC in the cloud instead
casting and classification tasks, making it suitable for AMI sys-
of a physical UC [128]. Of course, the security perimeter has
tems. Rule-based techniques apply a set of rules and are useful to be assessed before deploying a cloud-computing model. An
for auditing data. Data mining can uncover patterns, associations, important feature of cloud computing is the default isolation of
changes, anomalies, and statistically significant structures and the components in the system by clustering them into security
events in data [122]. Thus, AI can also be applied as a mitigation groups. This prevents unauthorized access or the insertion of
technique for securing an AMI system. Using machine learning malicious code by attackers into an end device, as communication
and deep learning, over time, an AI system can learn the behavior between entities can be blocked by default [129].
of each device in the AMI system. Thus, AI can help an AMI system A major weakness of an AMI system is the dependency on
to recognize and detect malicious behavior faster than traditional the TCP/IP stack protocol, as it is vulnerable and susceptible
techniques. AI can detect threats masked as normal activity due to different attacks due to the use of IP in the communication
to its automated ability to skim through massive chunks of data channel between two entities [130]. A cloud-computing system
and traffic [123]. can solve this issue, as the identification of and communications
Because AI can perform a high-speed scan of an entire AMI between entities in a cloud environment depend on asset ID
system, it can discover both known and new vulnerabilities, values, which harden the AMI system and prevent attackers from
which could be exploited in the future. AI is the core of many IDSs performing a vulnerability scan [131].
used for detecting vulnerabilities and threats. IDSs are considered As mentioned previously, the AMI hardware layer has an open
the first line of defense for any system. However, customers challenge relating to the authentication protocols needed to en-
can access web servers to enter data or pay a bill, so an ex- sure the privacy and confidentiality of the data. IoT devices,
tra layer of security is needed to safeguard the privacy of this such as SMs and DCs, can be connected to the cloud, which
sensitive information. AI can provide strong customer authenti- provides a methodology for authentication through an IP/MPLS
cation using biometrics such as facial recognition or fingerprint (internet protocol/multiprotocol label switching) core to alleviate
scanners [124]. this issue [132].
372
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

6.2.3. Big data analytics data storage is decentralized, it is more difficult for an attacker
The integration of ICT into traditional power grids introduces to penetrate the system and consolidate the sensitive data [145].
an additional information or data layer to conventional electric- Unauthorized access is one of the most common attacks,
ity transmission and distribution networks. This data layer is which could be prevented by integrating blockchain technology
responsible for collecting, storing, and analyzing data from the into an AMI system due to the comprehensive encryption of a
increasing number of installed SMs and other IoT devices through blockchain. The data can then be securely transmitted without
a SG [133]. An effective and efficient analysis of the data collected attackers accessing or tampering with the data. Thus, a blockchain
through an AMI system can add significant value for a utility com- could increase the confidentiality and integrity of sensitive data
pany, such as load forecasting and load analysis. As the number transmitted and processed through an AMI [146].
of end devices increases, the volume of data collected increases As previously noted, integrity checks are used by an AMI data
significantly, so that it becomes big data, which makes the data layer to ensure that the data are transferred from the source to
analysis more complicated and requires more accuracy [134]. the destination without any modification. Traditional integrity
Analyzing logs, network packets, and system events for foren- check algorithms generally use encryption techniques that rely
sic purposes and intrusion detection has traditionally been a on trusted third-party auditors [147]. Recently, a blockchain has
significant problem, since traditional methods do not have ade- been used to implement a data integrity verifier for a large IoT
quate tools for supporting long-term, large-scale analytics [135]. system. Since an AMI is such a system, the permissionless data
Big data analytics techniques enable the storage and analysis utilization features of a blockchain could be used to prevent
of large heterogeneous datasets at an unprecedented scale and unauthorized access to the data [148].
speed. They can perform deeper analytics on the data, provide The use of inadequate authentication and authorization
a consolidated view of security-related information, and achieve protocols is an open challenge for the AMI hardware layer. Au-
real-time analysis of streaming data. Note that configuring big thentication and authorization are vital for safeguarding the main
data analysis tools properly still requires the system architects components of an AMI system from unauthorized access. Block-
and analysts to have a deep knowledge of their system [136]. chain technology has recently been used for access control. A
Big data are produced rapidly. Thus, traditional software for blockchain consists of records (blocks) recorded in a decentral-
storing, processing, and managing data are generally not ap- ized digital ledger, which stores transactions, in contrast to the
propriate [137]. The huge amount of data must be stored and tables in a relational database [149].
processed by a large compute cluster. Integrating big data with
a cloud-computing environment overcomes this issue, as the 7. Conclusion
cloud can store a huge amount of data, avoiding the need for
a dedicated space and expensive computational resources [138]. The AMI plays a vital role in an SG, which aims to opti-
Applying big data analytics to the AMI data layer has the follow- mize the use of the latest ICT tools. Connecting SGs and AMIs
ing benefits: better management of the collected data, prevention to the cyberworld opens up new security challenges that must
of potential failures of AMI components through predictive analy- be addressed. A successful attack against an SG may lead to
sis, increased customer satisfaction, and higher overall efficiency either localized or widespread denial of the electricity service,
of the AMI system [139]. which can lead to blackouts. Thus, this article provides a com-
One of the open challenges related to the AMI data layer is prehensive survey of AMI security, encompassing vulnerabilities,
the existence of multiple data sources. Thus, a huge amount of attacks, and countermeasures. To give a full picture of AMI se-
heterogeneous data needs to be collected and analyzed in real curity, the current challenges and future research directions are
time [140]. Integrating big data analytics into an AMI system also presented. The relevance and uniqueness of this survey are
could enhance the performance of the system. Moreover, big its comprehensive coverage of AMI systems, including security
data can speed up decision-making processes, as follows. Big vulnerabilities, attacks, and countermeasures. Furthermore, the
data techniques can be divided into big data management and impact of different attack types on AMI components and on the
big data analytics. Big data management is responsible for the entire SG has been presented as well. There should be more re-
storage and integration of big data so that the data are ready search on emerging technologies such as AI, cloud computing, big
to be analyzed. Big data analytics is the analysis of the collected data analytics, and blockchains, which could be used to develop
data and provides information in a form useful for decision- innovative mechanisms for improving AMI security. Although
making [141]. Big data analytics techniques have the potential to multiple countermeasure techniques can be applied to an AMI to
provide a significant advance in actionable security intelligence enhance its security, a risk assessment must first be undertaken
by reducing the time for correlating, consolidating, and contex- to determine the existing vulnerabilities and the threats and
tualizing diverse security event information. It can also be used whether the current countermeasures are adequate or whether
to correlate long-term historical data for forensic purposes [142]. additional mitigation techniques must be applied. Also, it must
be determined for a known risk to an AMI whether it will be
6.2.4. Blockchains mitigated, accepted, or transformed.
Blockchains are a form of distributed ledger. A blockchain
can generate trust in an untrusting environment and thus, is a CRediT authorship contribution statement
powerful new cybersecurity tool. The decentralized ledger con-
tains transactions from multiple devices. The data are encrypted Mostafa Shokry: Data curation, Formal analysis, Methodol-
and stored by members of the blockchain to ensure data in- ogy, Investigation, Resources, Validation, Visualization, Writing
tegrity [143]. – original draft, Writing – review & editing. Ali Ismail Awad:
Due to the distributed nature of a blockchain, it can be used Conceptualization, Formal analysis, Methodology, Investigation,
to secure the overall AMI system and its related devices by Project administration, Resources, Supervision, Validation, Visu-
decentralizing the administration. This approach eliminates the alization, Writing – review & editing. Mahmoud Khaled Abd-
dependency of each device on a central admin or authority. It Ellah: Conceptualization, Methodology, Project administration,
makes the end devices, such as SMs, more secure because they Resources, Supervision, Writing – review & editing. Ashraf A.M.
can detect and take action against suspicious commands from an Khalaf: Conceptualization, Methodology, Project administration,
unknown network [144]. With blockchain technology, since the Resources, Supervision; Writing – review & editing.
373
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

Declaration of competing interest [20] A. Anzalchi, A. Sarwat, A survey on security assessment of metering
infrastructure in smart grid systems, in: SoutheastCon 2015, IEEE, 2015,
pp. 1–4, http://dx.doi.org/10.1109/SECON.2015.7132989.
The authors declare the following financial interests/personal
[21] J.C. Foreman, D. Gurugubelli, Identifying the cyber attack surface of the
relationships which may be considered as potential competing advanced metering infrastructure, Electr. J. 28 (1) (2015) 94–103, http:
interests: Co-author, Ali Ismail Awad is an Associate Editor for //dx.doi.org/10.1016/j.tej.2014.12.007.
Future Generation Computer Systems. [22] N. Komninos, E. Philippou, A. Pitsillides, Survey in smart grid and smart
home security: Issues, challenges and countermeasures, IEEE Commun.
Surv. Tutor. 16 (4) (2014) 1933–1954, http://dx.doi.org/10.1109/COMST.
References 2014.2320093.
[23] R. Rashed Mohassel, A. Fung, F. Mohammadi, K. Raahemifar, A survey
[1] M.A. Faisal, Z. Aung, J.R. Williams, A. Sanchez, Data-stream-based intru- on advanced metering infrastructure, Int. J. Electr. Power Energy Syst. 63
sion detection system for advanced metering infrastructure in smart grid: (2014) 473–484, http://dx.doi.org/10.1016/j.ijepes.2014.06.025.
A feasibility study, IEEE Syst. J. 9 (1) (2015) 31–44, http://dx.doi.org/10. [24] E. Ancillotti, R. Bruno, M. Conti, The role of communication systems in
1109/JSYST.2013.2294120. smart grids: Architectures, technical solutions and research challenges,
[2] M. Nabeel, X. Ding, S.-H. Seo, E. Bertino, Scalable end-to-end security for Comput. Commun. 36 (17–18) (2013) 1665–1697, http://dx.doi.org/10.
advanced metering infrastructures, Inf. Syst. 53 (2015) 213–223, http: 1016/j.comcom.2013.09.004.
//dx.doi.org/10.1016/j.is.2015.01.004. [25] H. Mohammed, S. Tonyali, K. Rabieh, M. Mahmoud, K. Akkaya, Efficient
[3] S.N. Lighari, B.B. Jensen, D.M.A. Hussain, A.A. Shaikh, Attacks and their privacy-preserving data collection scheme for smart grid AMI networks,
defenses for advanced metering infrastructure, in: 2014 6th International in: 2016 IEEE Global Communications Conference, GLOBECOM, IEEE, 2016,
Congress on Ultra Modern Telecommunications and Control Systems and pp. 1–6, http://dx.doi.org/10.1109/GLOCOM.2016.7841782.
Workshops, ICUMT, 2014, pp. 148–151, http://dx.doi.org/10.1109/ICUMT. [26] M. Cebe, K. Akkaya, Efficient public-key revocation management for
2014.7002094. secure smart meter communications using one-way cryptographic accu-
[4] P. Jokar, N. Arianpoo, V.C. Leung, Electricity theft detection in AMI using mulators, in: 2018 IEEE International Conference on Communications, ICC,
customers’ consumption patterns, IEEE Trans. Smart Grid 7 (1) (2015) IEEE, 2018, pp. 1–6, http://dx.doi.org/10.1109/ICC.2018.8423023.
216–226, http://dx.doi.org/10.1109/TSG.2015.2425222. [27] A. Ghasempour, Optimized advanced metering infrastructure architecture
[5] K.I. Sgouras, A.D. Birda, D.P. Labridis, Cyber attack impact on critical smart of smart grid based on total cost, energy, and delay, in: 2016 IEEE
grid infrastructures, in: ISGT 2014, 2014, pp. 1–5, http://dx.doi.org/10. Power Energy Society Innovative Smart Grid Technologies Conference,
1109/ISGT.2014.6816504. ISGT, 2016, pp. 1–6, http://dx.doi.org/10.1109/ISGT.2016.7781250.
[6] F. Ye, Y. Qian, R.Q. Hu, A security protocol for advanced metering infras- [28] V. Gulisano, M. Almgren, M. Papatriantafilou, Metis: a two-tier intrusion
tructure in smart grid, in: 2014 IEEE Global Communications Conference, detection system for advanced metering infrastructures, in: Interna-
2014, pp. 649–654, http://dx.doi.org/10.1109/GLOCOM.2014.7036881. tional Conference on Security and Privacy in Communication Networks,
[7] X. Liu, P. Zhu, Y. Zhang, K. Chen, A collaborative intrusion detection Springer, 2014, pp. 51–68, http://dx.doi.org/10.1145/2602044.2602072.
mechanism against false data injection attack in advanced metering [29] N. Saxena, B.J. Choi, R. Lu, Authentication and authorization scheme for
infrastructure, IEEE Trans. Smart Grid 6 (5) (2015) 2435–2443, http: various user roles and devices in smart grid, IEEE Trans. Inf. Foren-
//dx.doi.org/10.1109/TSG.2015.2418280. sics Secur. 11 (5) (2015) 907–921, http://dx.doi.org/10.1109/TIFS.2015.
[8] D.U. Case, Analysis of the cyber attack on the ukrainian power grid, 2512525.
vol. 388, Tech. rep., Electricity Information Sharing and Analysis Center [30] A. Ghasempour, Optimizing the Advanced Metering Infrastructure Archi-
(E-ISAC), 2016, URL https://africautc.org/wp-content/uploads/2018/05/E- tecture in Smart Grid, Utah State University, 2016, http://dx.doi.org/10.
ISAC_SANS_Ukraine_DUC_5.pdf. 26076/7573-ab56.
[9] A. Ghosal, M. Conti, Key management systems for smart grid advanced [31] A.M. Khattak, S.I. Khanji, W.A. Khan, Smart meter security: Vulnerabilities,
metering infrastructure: A survey, IEEE Commun. Surv. Tutor. 21 (3) threat impacts, and countermeasures, in: S. Lee, R. Ismail, H. Choo
(2019) 2831–2848, http://dx.doi.org/10.1109/COMST.2019.2907650. (Eds.), Proceedings of the 13th International Conference on Ubiquitous
[10] P. Kumar, Y. Lin, G. Bai, A. Paverd, J.S. Dong, A. Martin, Smart grid Information Management and Communication, IMCOM 2019, Springer
metering networks: A survey on security, privacy and open research International Publishing, Cham, 2019, pp. 554–562, http://dx.doi.org/10.
issues, IEEE Commun. Surv. Tutor. 21 (3) (2019) 2886–2927, http://dx. 1007/978-3-030-19063-7_44.
doi.org/10.1109/COMST.2019.2899354. [32] M. Bae, K. Kim, H. Kim, Preserving privacy and efficiency in data
[11] K. Pedramnia, M. Rahmani, Survey of DoS attacks on LTE infrastruc- communication and aggregation for AMI network, J. Netw. Comput. Appl.
ture used in AMI system and countermeasures, in: 2018 Smart Grid 59 (2016) 333–344, http://dx.doi.org/10.1016/j.jnca.2015.07.005.
Conference, SGC, IEEE, 2018, pp. 1–6, http://dx.doi.org/10.1109/SGC.2018. [33] S.K. Singh, R. Bose, A. Joshi, Entropy-based electricity theft detection in
8777832. AMI network, IET Cyber-Phys. Syst. Theory Appl. 3 (2) (2018) 99–105,
[12] S. Tan, D. De, W.-Z. Song, J. Yang, S.K. Das, Survey of security advances http://dx.doi.org/10.1049/iet-cps.2017.0063.
in smart grid: A data driven approach, IEEE Commun. Surv. Tutor. 19 (1) [34] S. Nimbargi, S. Mhaisne, S. Nangare, M. Sinha, Review on AMI technology
(2016) 397–422, http://dx.doi.org/10.1109/COMST.2016.2616442. for smart meter, in: 2016 IEEE International Conference on Advances
[13] S. Pealy, M.A. Matin, A survey on threats and countermeasures in in Electronics, Communication and Computer Technology, ICAECCT, IEEE,
smart meter, in: 2020 IEEE International Conference on Communication, 2016, pp. 21–27, http://dx.doi.org/10.1109/ICAECCT.2016.7942549.
Networks and Satellite, ComNetSat, 2020, pp. 417–422, http://dx.doi.org/ [35] Z. Ismail, J. Leneutre, D. Bateman, L. Chen, A game theoretical analysis of
10.1109/Comnetsat50391.2020.9328943. data confidentiality attacks on smart-grid AMI, IEEE J. Sel. Areas Commun.
[14] S. Desai, R. Alhadad, N. Chilamkurti, A. Mahmood, A survey of privacy 32 (7) (2014) 1486–1499, http://dx.doi.org/10.1109/JSAC.2014.2332095.
preserving schemes in IoE enabled smart grid advanced metering infras- [36] M.I. Ibrahem, M. Mahmoud, M.M. Fouda, F. Alsolami, W. Alasmary, X.
tructure, Cluster Comput. 22 (1) (2019) 43–69, http://dx.doi.org/10.1007/ Shen, Privacy-preserving and efficient data collection scheme for AMI
s10586-018-2820-9. networks using deep learning, IEEE Internet Things J. (2021) http://dx.
[15] Z. El Mrabet, N. Kaabouch, H. El Ghazi, H. El Ghazi, Cyber-security in smart doi.org/10.1109/JIOT.2021.3077897.
grid: Survey and challenges, Comput. Electr. Eng. 67 (2018) 469–482, [37] G. Lu, X. Tian, An efficient communication intrusion detection scheme
http://dx.doi.org/10.1016/j.compeleceng.2018.01.015. in AMI combining feature dimensionality reduction and improved
[16] A. Hansen, J. Staggs, S. Shenoi, Security analysis of an advanced metering LSTM, Secur. Commun. Netw. 2021 (2021) http://dx.doi.org/10.1155/
infrastructure, Int. J. Crit. Infrastruct. Prot. 18 (2017) 3–19, http://dx.doi. 2021/6631075.
org/10.1016/j.ijcip.2017.03.004. [38] V.B. Krishna, G.A. Weaver, W.H. Sanders, PCA-based method for detecting
[17] W. Tong, L. Lu, Z. Li, J. Lin, X. Jin, A survey on intrusion detection system integrity attacks on advanced metering infrastructure, in: International
for advanced metering infrastructure, in: 2016 Sixth International Confer- Conference on Quantitative Evaluation of Systems, Springer, 2015, pp.
ence on Instrumentation & Measurement, Computer, Communication and 70–85, http://dx.doi.org/10.1007/978-3-319-22264-6_5.
Control, IMCCC, IEEE, 2016, pp. 33–37, http://dx.doi.org/10.1109/IMCCC. [39] M. Erol-Kantarci, H.T. Mouftah, Energy-efficient information and com-
2016.193. munication infrastructures in the smart grid: A survey on interactions
[18] P. Jokar, N. Arianpoo, V.C. Leung, A survey on security issues in smart and open issues, IEEE Commun. Surv. Tutor. 17 (1) (2015) 179–197,
grids, Secur. Commun. Netw. 9 (3) (2016) 262–273, http://dx.doi.org/10. http://dx.doi.org/10.1109/COMST.2014.2341600.
1002/sec.559. [40] Vineeta, J.K. Thathagar, Cognitive radio communication architecture in
[19] N. Saxena, B.J. Choi, State of the art authentication, access control, and smart grid reconfigurability, in: 2012 1St International Conference on
secure integration in smart grid, Energies 8 (10) (2015) 11883–11915, Emerging Technology Trends in Electronics, Communication Networking,
http://dx.doi.org/10.3390/en81011883. 2012, pp. 1–6, http://dx.doi.org/10.1109/ET2ECN.2012.6470081.

374
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

[41] D.B. Avancini, J.J. Rodrigues, S.G. Martins, R.A. Rabêlo, J. Al-Muhtadi, P. [62] M. Milam, G. Kumar Venayagamoorthy, Smart meter deployment: US
Solic, Energy meters evolution in smart grids: A review, J. Cleaner Prod. initiatives, in: ISGT 2014, 2014, pp. 1–5, http://dx.doi.org/10.1109/ISGT.
217 (2019) 702–715, http://dx.doi.org/10.1016/j.jclepro.2019.01.229. 2014.6816507.
[42] V.C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, G.P. [63] I. Petruˇ sevski, M. Živanović, A. Rakić, I. Popović, Novel AMI architecture
Hancke, A survey on smart grid potential applications and communication for real-time smart metering, in: 2014 22Nd Telecommunications Forum
requirements, IEEE Trans. Ind. Inf. 9 (1) (2013) 28–42, http://dx.doi.org/ Telfor (TELFOR), 2014, pp. 664–667, http://dx.doi.org/10.1109/TELFOR.
10.1109/TII.2012.2218253. 2014.7034496.
[43] R.P. Díaz Redondo, A. Fernández-Vilas, G. Fernández dos Reis, Security [64] K. Zhang, Z. Hu, Y. Zhan, X. Wang, K. Guo, A smart grid AMI intrusion
aspects in smart meters: Analysis and prevention, Sensors 20 (14) (2020) detection strategy based on extreme learning machine, Energies 13 (18)
3977, http://dx.doi.org/10.3390/s20143977. (2020) 4907, http://dx.doi.org/10.3390/en13184907.
[44] S. Lee, J. Bong, S. Shin, Y. Shin, A security mechanism of smart grid [65] A.S. Alfakeeh, S. Khan, A.H. Al-Bayatti, A multi-user, single-authentication
AMI network through smart device mutual authentication, in: The Inter- protocol for smart grid architectures, Sensors 20 (6) (2020) 1581, http:
national Conference on Information Networking 2014, ICOIN2014, IEEE, //dx.doi.org/10.3390/s20061581.
2014, pp. 592–595, http://dx.doi.org/10.1109/ICOIN.2014.6799750. [66] W. Wang, Z. Lu, Cyber security in the smart grid: Survey and challenges,
Comput. Netw. 57 (5) (2013) 1344–1371, http://dx.doi.org/10.1016/j.
[45] Y. Yan, R.Q. Hu, S.K. Das, H. Sharif, Y. Qian, An efficient security protocol
comnet.2012.12.017.
for advanced metering infrastructure in smart grid, IEEE Netw. 27 (4)
[67] Y. Yan, Y. Qian, H. Sharif, D. Tipper, A survey on cyber security for smart
(2013) 64–71, http://dx.doi.org/10.1109/MNET.2013.6574667.
grid communications, IEEE Commun. Surv. Tutor. 14 (4) (2012) 998–1010,
[46] M. Delavar, S. Mirzakuchaki, M.H. Ameri, J. Mohajeri, PUF-based solutions
http://dx.doi.org/10.1109/SURV.2012.010912.00035.
for secure communications in advanced metering infrastructure (AMI),
[68] D.D. Roy, D. Shin, Network intrusion detection in smart grids for imbal-
Int. J. Commun. Syst. 30 (9) (2017) e3195, http://dx.doi.org/10.1002/dac.
anced attack types using machine learning models, in: 2019 International
3195.
Conference on Information and Communication Technology Convergence,
[47] I. Popović, A. Rakić, I.D. Petruševski, Multi-agent real-time advanced
ICTC, IEEE, 2019, pp. 576–581, http://dx.doi.org/10.1109/ICTC46691.2019.
metering infrastructure based on fog computing, Energies 15 (1) (2022)
8939744.
373, http://dx.doi.org/10.3390/en15010373. [69] A. Jakaria, M.A. Rahman, M.G.M.M. Hasan, Safety analysis of AMI networks
[48] L. Yan, Y. Chang, S. Zhang, A lightweight authentication and key agree- through smart fraud detection, in: 2019 IEEE Conference on Communica-
ment scheme for smart grid, Int. J. Distrib. Sens. Netw. 13 (2) (2017) tions and Network Security, CNS, IEEE, 2019, pp. 1–7, http://dx.doi.org/
1550147717694173, http://dx.doi.org/10.1177/1550147717694173. 10.1109/CNS.2019.8802845.
[49] A. Ghasempour, J.H. Gunther, Finding the optimal number of aggregators [70] S. Tonyali, K. Akkaya, N. Saputro, X. Cheng, An attribute & network
in machine-to-machine advanced metering infrastructure architecture of coding-based secure multicast protocol for firmware updates in smart
smart grid based on cost, delay, and energy consumption, in: 2016 13Th grid AMI networks, in: 2017 26Th International Conference on Computer
IEEE Annual Consumer Communications Networking Conference, CCNC, Communication and Networks, ICCCN, IEEE, 2017, pp. 1–9, http://dx.doi.
2016, pp. 960–963, http://dx.doi.org/10.1109/CCNC.2016.7444917. org/10.1109/ICCCN.2017.8038415.
[50] A. Gopstein, C. Nguyen, C. O’Fallon, N. Hastings, D. Wollman, NIST [71] A. Anwar, A.N. Mahmood, Z. Tari, Identification of vulnerable node
framework and roadmap for smart grid interoperability standards, release clusters against false data injection attack in an AMI based smart grid,
4.0, 2021, http://dx.doi.org/10.6028/NIST.SP.1108r4. Inf. Syst. 53 (2015) 201–212, http://dx.doi.org/10.1016/j.is.2014.12.001.
[51] K. Balachandran, R.L. Olsen, J.M. Pedersen, Bandwidth analysis of smart [72] L. Na, X. Xiaohui, M. Xiaoqin, M. Xiangfu, Y. Peisen, Fake data injection
meter network infrastructure, in: 16Th International Conference on Ad- attack detection in AMI system using a hybrid method, in: 2021 IEEE Sus-
vanced Communication Technology, 2014, pp. 928–933, http://dx.doi.org/ tainable Power and Energy Conference, ISPEC, IEEE, 2021, pp. 2371–2376,
10.1109/ICACT.2014.6779095. http://dx.doi.org/10.1109/iSPEC53008.2021.9735875.
[52] M.I. Ibrahem, M.M. Badr, M.M. Fouda, M. Mahmoud, W. Alasmary, Z.M. [73] Y. Guo, C.-W. Ten, S. Hu, W.W. Weaver, Modeling distributed denial of
Fadlullah, PMBFE: Efficient and privacy-preserving monitoring and billing service attack in advanced metering infrastructure, in: 2015 IEEE Power
using functional encryption for AMI networks, in: 2020 International & Energy Society Innovative Smart Grid Technologies Conference, ISGT,
Symposium on Networks, Computers and Communications, ISNCC, IEEE, IEEE, 2015, pp. 1–5, http://dx.doi.org/10.1109/ISGT.2015.7131828.
2020, pp. 1–7, http://dx.doi.org/10.1109/ISNCC49221.2020.9297246. [74] L. Blakely, M.J. Reno, K. Ashok, AMI data quality and collection method
[53] N. Saxena, B.J. Choi, S. Grijalva, Secure and privacy-preserving concen- considerations for improving the accuracy of distribution models, in:
tration of metering data in AMI networks, in: 2017 IEEE International 2019 IEEE 46th Photovoltaic Specialists Conference, PVSC, IEEE, 2019, pp.
Conference on Communications, ICC, IEEE, 2017, pp. 1–7, http://dx.doi. 2045–2052, http://dx.doi.org/10.1109/PVSC40753.2019.8981211.
org/10.1109/ICC.2017.7996874. [75] J. Wang, D. Shi, Y. Li, J. Chen, H. Ding, X. Duan, Distributed framework for
[54] S.-H. Seo, X. Ding, E. Bertino, Encryption key management for se- detecting PMU data manipulation attacks with deep autoencoders, IEEE
cure communication in smart advanced metering infrastructures, in: Trans. Smart Grid 10 (4) (2018) 4401–4410, http://dx.doi.org/10.1109/
2013 IEEE International Conference on Smart Grid Communications TSG.2018.2859339.
(SmartGridComm), IEEE, 2013, pp. 498–503, http://dx.doi.org/10.1109/ [76] A. Alsharif, M. Nabil, M.M.E.A. Mahmoud, M. Abdallah, EPDA: Efficient
SmartGridComm.2013.6688007. and privacy-preserving data collection and access control scheme for
[55] Y. Lee, E. Hwang, J. Choi, A unified approach for compression and multi-recipient AMI networks, IEEE Access 7 (2019) 27829–27845, http:
authentication of smart meter reading in AMI, IEEE Access 7 (2019) //dx.doi.org/10.1109/ACCESS.2019.2900934.
[77] S. Tonyali, N. Saputro, K. Akkaya, Assessing the feasibility of fully
34383–34394, http://dx.doi.org/10.1109/ACCESS.2019.2903574.
homomorphic encryption for smart grid AMI networks, in: 2015 Seventh
[56] C. Lee, H. Yang, B. Lee, D. Won, A novel privacy-enhanced AMI system
International Conference on Ubiquitous and Future Networks, IEEE, 2015,
using searchable and homomorphic encryption techniques, in: Interna-
pp. 591–596, http://dx.doi.org/10.1109/ICUFN.2015.7182613.
tional Conference on Hybrid Information Technology, Springer, 2012, pp.
[78] H. Naseer, M.N.M. Bhutta, M.A. Alojail, A key transport protocol for
608–617, http://dx.doi.org/10.1007/978-3-642-32645-5_76.
advance metering infrastructure (AMI) based on public key cryptography,
[57] I. Parvez, A.I. Sarwat, L. Wei, A. Sundararajan, Securing metering infras-
in: 2020 International Conference on Cyber Warfare and Security, ICCWS,
tructure of smart grid: A machine learning and localization based key
IEEE, 2020, pp. 1–5, http://dx.doi.org/10.1109/ICCWS48432.2020.9292385.
management approach, Energies 9 (9) (2016) 691, http://dx.doi.org/10.
[79] M. Nabeel, S. Kerr, X. Ding, E. Bertino, Authentication and key man-
3390/en9090691.
agement for advanced metering infrastructures utilizing physically
[58] T. Robles, B. Bordel, R. Alcarria, D. Sánchez-de Rivera, Blockchain tech- unclonable functions, in: 2012 IEEE Third International Conference on
nologies for private data management in AMI environments, Multidiscip. Smart Grid Communications, SmartGridComm, IEEE, 2012, pp. 324–329,
Digit. Publ. Inst. Proc. 2 (19) (2018) 1230, http://dx.doi.org/10.3390/ http://dx.doi.org/10.1109/SmartGridComm.2012.6486004.
proceedings2191230. [80] H. Nicanfar, P. Jokar, K. Beznosov, V.C. Leung, Efficient authentication and
[59] D.A. Chekired, L. Khoukhi, H.T. Mouftah, Fog-based distributed intrusion key management mechanisms for smart grid communications, IEEE Syst.
detection system against false metering attacks in smart grid, in: ICC J. 8 (2) (2013) 629–640, http://dx.doi.org/10.1109/JSYST.2013.2260942.
2019-2019 IEEE International Conference on Communications, ICC, IEEE, [81] J. Kamto, L. Qian, J. Fuller, J. Attia, Light-weight key distribution and man-
2019, pp. 1–6, http://dx.doi.org/10.1109/ICC.2019.8761752. agement for advanced metering infrastructure, in: 2011 IEEE GLOBECOM
[60] J.L. Pesesky, The vulnerabilities of the advanced metering infrastructure Workshops, GC Wkshps, IEEE, 2011, pp. 1216–1220, http://dx.doi.org/10.
in the Smart Grid (Master’s thesis), Utica College, 2016. 1109/GLOCOMW.2011.6162375.
[61] C. Hägerling, F.M. Kurtz, R.L. Olsen, C. Wietfeld, Communication ar- [82] M.Q. Ali, E. Al-Shaer, Randomization-based intrusion detection system
chitecture for monitoring and control of power distribution grids for advanced metering infrastructure, ACM Trans. Inf. Syst. Secur. 18 (2)
over heterogeneous ICT networks, in: 2014 IEEE International Energy (2015) 1–30, http://dx.doi.org/10.1145/2814936.
Conference, ENERGYCON, 2014, pp. 838–845, http://dx.doi.org/10.1109/ [83] V.Y. Pillitteri, T.L. Brewer, Guidelines for smart grid cybersecurity, Natl.
ENERGYCON.2014.6850523. Inst. Stand. Technol. (2014) http://dx.doi.org/10.6028/NIST.IR.7628r1.

375
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

[84] X. Wang, P. Yi, Security framework for wireless communications in smart [106] Y. Li, R. Qiu, S. Jing, Intrusion detection system using online sequence
distribution grid, IEEE Trans. Smart Grid 2 (4) (2011) 809–818, http: extreme learning machine (OS-ELM) in advanced metering infrastructure
//dx.doi.org/10.1109/TSG.2011.2167354. of smart grid, PLoS One 13 (2) (2018) e0192216, http://dx.doi.org/10.
[85] S.M. Alfassa, S. Nagasundari, P.B. Honnavalli, Invasion analysis of smart 1371/journal.pone.0192216.
meter in AMI system, in: 2021 IEEE Mysore Sub Section International [107] R. Vijayanand, D. Devaraj, B. Kannapiran, Support vector machine based
Conference, MysuruCon, IEEE, 2021, pp. 831–836, http://dx.doi.org/10. intrusion detection system with reduced input features for advanced
1109/MysuruCon52639.2021.9641595. metering infrastructure of smart grid, in: 2017 4Th International Con-
[86] H. Suleiman, I. Alqassem, A. Diabat, E. Arnautovic, D. Svetinovic, Inte- ference on Advanced Computing and Communication Systems, ICACCS,
grated smart grid systems security threat model, Inf. Syst. 53 (2015) IEEE, 2017, pp. 1–7, http://dx.doi.org/10.1109/ICACCS.2017.8014590.
147–160, http://dx.doi.org/10.1016/j.is.2014.12.002. [108] P. Jokar, V.C. Leung, Intrusion detection and prevention for ZigBee-based
[87] E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, C. Assi, Communica- home area networks in smart grids, IEEE Trans. Smart Grid 9 (3) (2016)
tion security for smart grid distribution networks, IEEE Commun. Mag. 1800–1811, http://dx.doi.org/10.1109/TSG.2016.2600585.
51 (1) (2013) 42–49, http://dx.doi.org/10.1109/MCOM.2013.6400437. [109] F.A.A. Alseiari, Z. Aung, Real-time anomaly-based distributed intrusion
[88] S. Kulkarni, R. Rahul, R. Shreyas, S. Nagasundari, P.B. Honnavalli, MITM detection systems for advanced metering infrastructure utilizing stream
intrusion analysis for advanced metering infrastructure communication in data mining, in: 2015 International Conference on Smart Grid and Clean
a smart grid environment, in: International Conference on Computational Energy Technologies, ICSGCE, IEEE, 2015, pp. 148–153, http://dx.doi.org/
Intelligence, Security and Internet of Things, Springer, 2020, pp. 256–267, 10.1109/ICSGCE.2015.7454287.
http://dx.doi.org/10.1007/978-3-030-66763-4_22. [110] S. Pourfallah, A.H. Jafari, H.S. Shahhoseini, An intrusion detection algo-
[89] A. Sahu, H.K. Tippanaboyana, L. Hefton, A. Goulart, Detection of rogue rithm for AMI systems based on SVM and PCA, Int. J. Cybern. Inf. (IJCI) 3
nodes in AMI networks, in: 2017 19Th International Conference on (4) (2014) 1, http://dx.doi.org/10.5121/ijci.2014.3401.
Intelligent System Application to Power Systems, ISAP, IEEE, 2017, pp. [111] M.A. Faisal, Z. Aung, J.R. Williams, A. Sanchez, Data-stream-based intru-
1–6, http://dx.doi.org/10.1109/ISAP.2017.8071424. sion detection system for advanced metering infrastructure in smart grid:
[90] M.H. Haider, S.B. Saleem, J. Rafaqat, N. Sabahat, Threat modeling of A feasibility study, IEEE Syst. J. 9 (1) (2014) 31–44, http://dx.doi.org/10.
wireless attacks on advanced metering infrastructure, in: 2019 13Th 1109/JSYST.2013.2294120.
International Conference on Mathematics, Actuarial Science, Computer [112] M.A. Faisal, Z. Aung, J.R. Williams, A. Sanchez, Securing advanced metering
Science and Statistics, MACS, IEEE, 2019, pp. 1–6, http://dx.doi.org/10. infrastructure using intrusion detection system with data stream min-
1109/MACS48846.2019.9024779. ing, in: Pacific-Asia Workshop on Intelligence and Security Informatics,
[91] E.S. Parizy, H.R. Bahrami, S. Choi, A low complexity and secure demand Springer, 2012, pp. 96–111, http://dx.doi.org/10.1007/978-3-642-30428-
response technique for peak load reduction, IEEE Trans. Smart Grid 10 6_8.
(3) (2018) 3259–3268, http://dx.doi.org/10.1109/TSG.2018.2822729. [113] P. Jokar, H. Nicanfar, V.C. Leung, Specification-based intrusion detection
[92] W. Jiang, Z. Yang, Z. Zhou, J. Chen, Lightweight data security protection for home area networks in smart grids, in: 2011 IEEE International
method for AMI in power internet of things, Math. Probl. Eng. 2020 Conference on Smart Grid Communications, SmartGridComm, IEEE, 2011,
(2020) http://dx.doi.org/10.1155/2020/8896783. pp. 208–213, http://dx.doi.org/10.1109/SmartGridComm.2011.6102320.
[93] M.M. Hasan, H.T. Mouftah, Encryption as a service for smart grid advanced
[114] X. Yi, R. Paulet, E. Bertino, Homomorphic encryption, in: Homomorphic
metering infrastructure, in: 2015 IEEE Symposium on Computers and
Encryption and Applications, Springer, 2014, pp. 27–46, http://dx.doi.org/
Communication, ISCC, IEEE, 2015, pp. 216–221, http://dx.doi.org/10.1109/
10.1007/978-3-319-12229-8.
ISCC.2015.7405519.
[115] P.I. Radoglou-Grammatikis, P.G. Sarigiannidis, Securing the smart grid:
[94] I. Parvez, A. Islam, F. Kaleem, A key management-based two-level en-
A comprehensive compilation of intrusion detection and prevention
cryption method for AMI, in: 2014 IEEE PES General Meeting| Conference
systems, IEEE Access 7 (2019) 46595–46620, http://dx.doi.org/10.1109/
& Exposition, IEEE, 2014, pp. 1–5, http://dx.doi.org/10.1109/PESGM.2014.
ACCESS.2019.2909807.
6939551.
[116] D.S. Kim, B.J. Chung, Y.M. Chung, Analysis of AMI communication methods
[95] M. Mustapa, M.Y. Niamat, A.P.D. Nath, M. Alam, Hardware-oriented au-
in various field environments, Energies 13 (19) (2020) 5185, http://dx.doi.
thentication for advanced metering infrastructure, IEEE Trans. Smart Grid
org/10.3390/en13195185.
9 (2) (2016) 1261–1270, http://dx.doi.org/10.1109/TSG.2016.2582423.
[117] T. Basso, J. Hambrick, D. DeBlasio, Update and review of IEEE P2030
[96] W.-L. Chin, Y.-H. Lin, H.-H. Chen, A framework of machine-to-machine au-
smart grid interoperability and IEEE 1547 interconnection standards, in:
thentication in smart grid: a two-layer approach, IEEE Commun. Mag. 54
2012 IEEE PES Innovative Smart Grid Technologies, ISGT, 2012, pp. 1–7,
(12) (2016) 102–107, http://dx.doi.org/10.1109/MCOM.2016.1600304CM.
http://dx.doi.org/10.1109/ISGT.2012.6175748.
[97] A.P.D. Nath, F. Amsaad, M. Choudhury, M. Niamat, Hardware-based novel
authentication scheme for advanced metering infrastructure, in: 2016 [118] D. Bian, M. Kuzlu, M. Pipattanasomporn, S. Rahman, Analysis of commu-
IEEE National Aerospace and Electronics Conference (NAECON) and Ohio nication schemes for advanced metering infrastructure (AMI), in: 2014
Innovation Summit, OIS, IEEE, 2016, pp. 364–371, http://dx.doi.org/10. IEEE PES General Meeting| Conference & Exposition, IEEE, 2014, pp. 1–5,
1109/NAECON.2016.7856831. http://dx.doi.org/10.1109/PESGM.2014.6939562.
[98] N. Saxena, B.J. Choi, Integrated distributed authentication protocol for [119] A. Aziz, S. Khalid, M. Mustafa, H. Shareef, G. Aliyu, Artificial intelligent
smart grid communications, IEEE Syst. J. 12 (3) (2016) 2545–2556, http: meter development based on advanced metering infrastructure technol-
//dx.doi.org/10.1109/JSYST.2016.2574699. ogy, Renew. Sustain. Energy Rev. 27 (2013) 191–197, http://dx.doi.org/
[99] N. George, S. Nithin, S.K. Kottayil, Hybrid key management scheme for 10.1016/j.rser.2013.06.051.
secure AMI communications, Procedia Comput. Sci. 93 (2016) 862–869, [120] R.E. Ogu, C.I. Ikerionwu, I.I. Ayogu, Leveraging artificial intelligence of
http://dx.doi.org/10.1016/j.procs.2016.07.260. things for anomaly detection in advanced metering infrastructures, in:
[100] D. Li, Z. Aung, J.R. Williams, A. Sanchez, Efficient and fault-diagnosable 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGE-
authentication architecture for AMI in smart grid, Secur. Commun. Netw. RIA), 2021, pp. 16–20, http://dx.doi.org/10.1109/CYBERNIGERIA51635.
8 (4) (2015) 598–616, http://dx.doi.org/10.1002/sec.1006. 2021.9428792.
[101] C. Huang, Forest management and resource monitoring based on AMI [121] I. Parvez, F. Abdul, A.I. Sarwat, A location based key management system
intrusion detection algorithm and artificial intelligence, J. Ambient Intell. for advanced metering infrastructure of smart grid, in: 2016 IEEE Green
Humaniz. Comput. (2021) 1–15, http://dx.doi.org/10.1007/s12652-021- Technologies Conference (GreenTech), IEEE, 2016, pp. 62–67, http://dx.
03211-y. doi.org/10.1109/GreenTech.2016.19.
[102] R. Yao, N. Wang, Z. Liu, P. Chen, X. Sheng, Intrusion detection system in [122] S. Otoum, B. Kantarci, H. Mouftah, A comparative study of AI-based
the advanced metering infrastructure: A cross-layer feature-fusion CNN- intrusion detection techniques in critical infrastructures, ACM Trans.
LSTM-based approach, Sensors 21 (2) (2021) 626, http://dx.doi.org/10. Internet Technol. (TOIT) 21 (4) (2021) 1–22, http://dx.doi.org/10.1145/
3390/s21020626. 3406093.
[103] S.-T. Park, G. Li, J.-C. Hong, A study on smart factory-based ambient [123] M. Zanetti, E. Jamhour, M. Pellenz, M. Penna, V. Zambenedetti, I. Chueiri,
intelligence context-aware intrusion detection system using machine A tunable fraud detection system for advanced metering infrastructure
learning, J. Ambient Intell. Humaniz. Comput. 11 (4) (2020) 1405–1412, using short-lived patterns, IEEE Trans. Smart Grid 10 (1) (2019) 830–840,
http://dx.doi.org/10.1007/s12652-018-0998-6. http://dx.doi.org/10.1109/TSG.2017.2753738.
[104] C.-C. Sun, D.J.S. Cardenas, A. Hahn, C.-C. Liu, Intrusion detection for [124] K. Song, P. Kim, V. Tyagi, S. Rajasekaran, Artificial immune system AIS
cybersecurity of smart meters, IEEE Trans. Smart Grid 12 (1) (2020) based intrusion detection system (IDS) for smart grid advanced metering
612–622, http://dx.doi.org/10.1109/TSG.2020.3010230. infrastructure (AMI) networks, Tech. rep., Virginia Tech, Blacksburg,
[105] P.I. Radoglou-Grammatikis, P.G. Sarigiannidis, An anomaly-based intrusion Virginia, 2018, URL http://hdl.handle.net/10919/83203.
detection system for the smart grid based on cart decision tree, in: 2018 [125] K. Inoue, M. Cho, Amplitude based keyless optical encryption system
Global Information Infrastructure and Networking Symposium, GIIS, IEEE, using deep neural network, J. Vis. Commun. Image Represent. 79 (2021)
2018, pp. 1–5, http://dx.doi.org/10.1109/GIIS.2018.8635743. 103251, http://dx.doi.org/10.1016/j.jvcir.2021.103251.

376
M. Shokry, A.I. Awad, M.K. Abd-Ellah et al. Future Generation Computer Systems 136 (2022) 358–377

[126] A. Kim, M. Park, D.H. Lee, AI-IDS: Application of deep learning to real- [148] H. Wang, J. Zhang, Blockchain based data integrity verification for large-
time web intrusion detection, IEEE Access 8 (2020) 70245–70261, http: scale IoT data, IEEE Access 7 (2019) 164996–165006, http://dx.doi.org/10.
//dx.doi.org/10.1109/ACCESS.2020.2986882. 1109/ACCESS.2019.2952635.
[127] M. Pau, E. Patti, L. Barbierato, A. Estebsari, E. Pons, F. Ponci, A. Monti, A [149] K. Mudliar, H. Parekh, P. Bhavathankar, A comprehensive integration
cloud-based smart metering infrastructure for distribution grid services of national identity with blockchain technology, in: 2018 International
and automation, Sustain. Energy Grids Netw. 15 (2018) 14–25, http: Conference on Communication Information and Computing Technol-
//dx.doi.org/10.1016/j.segan.2017.08.001, Technologies and Methodologies ogy, ICCICT, IEEE, 2018, pp. 1–6, http://dx.doi.org/10.1109/ICCICT.2018.
in Modern Distribution Grid Automation. 8325891.
[128] K. Billewicz, The use of cloud computing in AMI system architecture,
in: 2015 Modern Electric Power Systems, MEPS, 2015, pp. 1–6, http:
//dx.doi.org/10.1109/MEPS.2015.7477213.
[129] C. Esposito, A. Castiglione, F. Pop, K.-K.R. Choo, Challenges of connecting Mostafa Shokry (M.Sc.) is currently a Ph.D. candidate
edge and cloud computing: A security and forensic perspective, IEEE at the Faculty of Engineering, Minia University, Egypt.
Cloud Comput. 4 (2) (2017) 13–17, http://dx.doi.org/10.1109/MCC.2017. His research interests include cybersecurity and IoT
30. security with applications in advanced metering infras-
[130] R.C. Diovu, J.T. Agee, Data aggregation in smart grid AMI network for tructure and smart grids. Mostafa is currently working
secure transfer of energy user-consumption data, Int. J. Eng. Res. Afr. as a security engineer at the Ministry of Electricity and
35 (2018) 108–124, http://dx.doi.org/10.4028/www.scientific.net/JERA.35. Renewable Energy, Cairo, Egypt.
108.
[131] N. Ahmad, Cloud computing: Technology, security issues and solutions,
in: 2017 2Nd International Conference on Anti-Cyber Crimes, ICACC,
IEEE, 2017, pp. 30–35, http://dx.doi.org/10.1109/Anti-Cybercrime.2017.
7905258.
[132] T.D.P. Bai, S.A. Rabara, Design and development of integrated, secured and Ali Ismail Awad (SMIEEE, Ph.D.) is currently an As-
intelligent architecture for internet of things and cloud computing, in: sociate Professor with the College of Information
2015 3Rd International Conference on Future Internet of Things and Cloud, Technology (CIT), United Arab Emirates University
IEEE, 2015, pp. 817–822, http://dx.doi.org/10.1109/FiCloud.2015.23. (UAEU), Al Ain, United Arab Emirates. He is also an
[133] W.A. Günther, M.H. Rezazade Mehrizi, M. Huysman, F. Feldberg, Debating Associate Professor (Docent) with the Department of
big data: A literature review on realizing value from big data, J. Strateg. Computer Science, Electrical and Space Engineering,
Inf. Syst. 26 (3) (2017) 191–209, http://dx.doi.org/10.1016/j.jsis.2017.07. Luleå University of Technology, Luleå, Sweden, where
003. he also served as a coordinator of the Master Program
[134] J. Lv, M. Pawlak, U.D. Annakkage, Prediction of the transient stability in Information Security from 2017 to 2020. He is
boundary based on nonparametric additive modeling, IEEE Trans. Power an Associate Professor with the Electrical Engineering
Syst. 32 (6) (2017) 4362–4369, http://dx.doi.org/10.1109/TPWRS.2017. Department, Faculty of Engineering, Al-Azhar Univer-
2669839. sity at Qena, Qena, Egypt. He is also a Visiting Researcher at the University
[135] J. Peppanen, M.J. Reno, R.J. Broderick, S. Grijalva, Distribution system of Plymouth, United Kingdom. His research interests include Cybersecurity,
model calibration with big data from AMI and PV inverters, IEEE Trans. network security, Internet of Things security, and image analysis with biometrics
Smart Grid 7 (5) (2016) 2497–2506, http://dx.doi.org/10.1109/TSG.2016. and medical imaging applications. He has edited or co-edited eight books
2531994. and authored or co-authored several journal articles and conference papers
[136] S.N. Lighari, D.M.A. Hussain, Reviewing the security surveillance of AMI in these areas. He is an Editorial Board Member of the Future Generation
using big data analytics, in: 2017 7Th International Conference on Com- Computer Systems Journal, Computers & Security Journal, the Internet of Things,
munication Systems and Network Technologies, CSNT, 2017, pp. 230–233, Engineering Cyber Physical Human Systems Journal, and Health Information
http://dx.doi.org/10.1109/CSNT.2017.8418543. Science and Systems Journal. Dr. Awad is currently an IEEE senior member.
[137] S.A. El-Seoud, H.F. El-Sofany, M. Abdelfattah, R. Mohamed, Big data and
cloud computing: Trends and challenges, Int. J. Interact. Mob. Technol. 11
(2) (2017) http://dx.doi.org/10.3991/ijim.v11i2.6561.
[138] C. Castelino, D. Gandhi, H.G. Narula, N.H. Chokshi, Integration of big data Mahmoud Khaled Abd-Ellah (MIEEE, Ph.D.) received
and cloud computing, Int. J. Eng. Trends Technol. (IJETT) 16 (2) (2014) the M.Sc. degree from the Electrical Engineering De-
100–102, http://dx.doi.org/10.14445/22315381/IJETT-V16P220. partment, Faculty of Engineering, Assiut University,
[139] Y. Roh, G. Heo, S.E. Whang, A survey on data collection for machine learn- Egypt, in 2015, and the Ph.D. degree from the Elec-
ing: a big data-AI integration perspective, IEEE Trans. Knowl. Data Eng. tronics and Communications Engineering Department,
33 (4) (2019) 1328–1347, http://dx.doi.org/10.1109/TKDE.2019.2946162. Minia University, Egypt, in 2019. He is currently
[140] A. Mohamed, S.S. Refaat, H. Abu-Rub, A review on big data management an Assistant Professor of computer science at Egyp-
and decision-making in smart grid, Power Electr. Drives 4 (1) (2019) 1–13, tian Russian University. His research interests include
http://dx.doi.org/10.2478/pead-2019-0011. biomedical imaging, image analysis with applications
[141] P.D. Diamantoulakis, V.M. Kapinas, G.K. Karagiannidis, Big data analytics in medical imaging, digital forensics, Forecasting, IoT,
for dynamic energy management in smart grids, Big Data Res. 2 (3) (2015) computer vision, machine learning, deep learning, pat-
94–101, http://dx.doi.org/10.1016/j.bdr.2015.03.003. tern recognition, image processing, signal processing, and biometrics. He has
[142] T. Zhao, Y. Zhang, D. Zhang, Application technology of big data in smart published several journal articles, conference papers, and one book chapter in
distribution grid and its prospect analysis, Dianwang Jishu/Power Syst. these areas. He has served as a Reviewer for many prestigious journals, such as
Technol. 38 (2014) 3305–3312, http://dx.doi.org/10.13335/j.1000-3673. IEEE Access. Dr. Abd-Ellah is currently an IEEE member.
pst.2014.12.006.
[143] M. Nofer, P. Gomber, O. Hinz, D. Schiereck, Blockchain, Bus. Inform. Syst.
Eng. 59 (3) (2017) 183–187, http://dx.doi.org/10.1007/s12599-017-0467-
Ashraf A. M. Khalaf (Ph.D.) received his B.Sc. and M.Sc.
3.
degrees in electrical engineering from Minia University,
[144] Z. Zheng, S. Xie, H.-N. Dai, X. Chen, H. Wang, Blockchain challenges and
Egypt, in 1989 and 1994, respectively. He received
opportunities: A survey, In. J. Web Grid Serv. 14 (4) (2018) 352–375,
the degree of ‘‘Doctor of Engineering in System Sci-
http://dx.doi.org/10.1504/IJWGS.2018.095647.
ence and Engineering’’ from the Graduate School of
[145] D. Yaga, P. Mell, N. Roby, K. Scarfone, Blockchain technology overview,
Natural Science and Technology, Kanazawa University,
2019, http://dx.doi.org/10.6028/NIST.IR.8202, arXiv preprint arXiv:1906.
Japan, on March 22, 2000 (Ph.D. degree in Egypt).
11078.
His research interests include adaptive signal process-
[146] T.T.A. Dinh, R. Liu, M. Zhang, G. Chen, B.C. Ooi, J. Wang, Untangling
ing, audio, and image processing, AI, Neural networks,
blockchain: A data processing view of blockchain systems, IEEE Trans.
machine learning, and deep learning techniques. Data
Knowl. Data Eng. 30 (7) (2018) 1366–1385, http://dx.doi.org/10.1109/
communications, data security, and optical communi-
TKDE.2017.2781227.
cations. He is currently a professor of DSP and Head of Electrical Engineering
[147] C. Esposito, M. Ficco, B.B. Gupta, Blockchain-based authentication and
Department, Faculty of Engineering, Minia University, Egypt. ORCID # is:
authorization for smart city applications, Inf. Process. Manage. 58 (2)
0000-0003-3344-5420.
(2021) 102468, http://dx.doi.org/10.1016/j.ipm.2020.102468.

377

You might also like