Remote Control of Smart Meters: Friend or Foe?

The traditional electrical grid is transitioning into the smart grid. New equipment is being installed to simplify the process of monitoring and managing the grid, making the system more transparent to use but also introducing new security problems. Smart meters are replacing the traditional electrical utility meters, offering new functionalities such as remote reading, automatic error reporting, and the possibility for remote shutoff. This last feature is studied in this paper through two scenarios where the effects are outlined, both on a theoretical level and through a simulation. In the first scenario, the frequency property of the grid is the target to possibly cause a blackout. In the second scenario, the voltage is driven out of bounds by the adversary.

[1]  Dmitry Podkuiko,et al.  Embedded Firmware Diversity for Smart Electric Meters , 2010, HotSec.

[2]  G.N. Ericsson,et al.  Management of information security for an electric power Utility-on security domains and use of ISO/IEC17799 standard , 2005, IEEE Transactions on Power Delivery.

[3]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[4]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[5]  José Fernando Prada The Value of Reliability in Power Systems-Pricing Operating Reserves-June 1999 , 1999 .

[6]  G.N. Ericsson Toward a Framework for Managing Information Security for an Electric Power Utility—CIGRÉ Experiences , 2007, IEEE Transactions on Power Delivery.

[7]  Naoki Tanaka,et al.  Nonintrusive Load-Shed Verification , 2011, IEEE Pervasive Computing.

[8]  Claudio A. Canizares,et al.  Distribution System Voltage Regulation and Var Compensation for Different Static Load Models , 2000 .

[9]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[10]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[11]  Eric A. M. Luiijf,et al.  Creating a European SCADA Security Testbed , 2007, Critical Infrastructure Protection.

[12]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[13]  Fred Denny,et al.  Distribution System Modeling and Analysis , 2001 .

[14]  Ross Anderson,et al.  Who Controls the off Switch? , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[15]  H Markiewicz,et al.  Voltage Disturbances Standard EN 50160 - Voltage Characteristics in Public Distribution Systems , 2008 .

[16]  Janaka Ekanayake,et al.  Demand side primary frequency response support through smart meter control , 2009, 2009 44th International Universities Power Engineering Conference (UPEC).

[17]  Aiko Pras,et al.  Intrusion Detection in SCADA Networks , 2010, AIMS.

[18]  Lennart Söder,et al.  Distributed generation : a definition , 2001 .

[19]  Mathias Ekstedt,et al.  Issues of cyber security in SCADA-systems - On the importance of awareness , 2009 .

[20]  William H. Sanders,et al.  Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[21]  G.N. Ericsson Information Security for Electric Power Utilities (EPUs)—CIGRÉ Developments on Frameworks, Risk Assessment, and Technology , 2009, IEEE Transactions on Power Delivery.

[22]  Jens-Tobias Zerbst,et al.  Zone principles as Cyber Security architecture element for Smart Grids , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).

[23]  Edmund Y. Lam,et al.  Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.