Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures

The electricity industry is now at the verge of a new era-an era that promises, through the evolution of the existing electrical grids to smart grids, more efficient and effective power management, better reliability, reduced production costs, and more environmentally friendly energy generation. Numerous initiatives across the globe, led by both industry and academia, reflect the mounting interest around not only the enormous benefits but also the great risks introduced by this evolution. This paper focuses on issues related to the security of the smart grid and the smart home, which we present as an integral part of the smart grid. Based on several scenarios, we aim to present some of the most representative threats to the smart home/smart grid environment. The threats detected are categorized according to specific security goals set for the smart home/smart grid environment, and their impact on the overall system security is evaluated. A review of contemporary literature is then conducted with the aim of presenting promising security countermeasures with respect to the identified specific security goals for each presented scenario. An effort to shed light on open issues and future research directions concludes this paper.

[1]  Tony Flick,et al.  Securing the Smart Grid: Next Generation Power Grid Security , 2010 .

[2]  Elisa Bertino,et al.  Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[3]  Wolfgang Granzer,et al.  Privacy enabled web service access control using SAML and XACML for home automation gateways , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[4]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[5]  Yang Xiao,et al.  Non-repudiation in neighborhood area networks for smart grid , 2013, IEEE Communications Magazine.

[6]  Andreas Pitsillides,et al.  Building energy-aware smart homes using web technologies , 2013, J. Ambient Intell. Smart Environ..

[7]  Florian Skopik,et al.  A Survey on Threats and Vulnerabilities in Smart Metering Infrastructures , 2012 .

[8]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[9]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[10]  Nesime Tatbul,et al.  Load Shedding , 2009, Encyclopedia of Database Systems.

[11]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[12]  Sergio Saponara,et al.  Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid , 2012, J. Comput. Networks Commun..

[13]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[14]  Dimitrios Makrakis,et al.  Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[15]  Mamun Bin Ibne Reaz,et al.  A Review of Smart Homes—Past, Present, and Future , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[16]  S. Mauw,et al.  Specification-based intrusion detection for advanced metering infrastructures , 2022 .

[17]  Kameshwar Poolla,et al.  Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .

[18]  Young-Jin Kim,et al.  A secure decentralized data-centric information infrastructure for smart grid , 2010, IEEE Communications Magazine.

[19]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[20]  David P. Varodayan,et al.  Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[21]  Peng Liu,et al.  Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.

[22]  G. Danezis,et al.  Privacy Technologies for Smart Grids - A Survey of Options , 2012 .

[23]  William H. Sanders,et al.  AMI threats, intrusion detection requirements and deployment recommendations , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[24]  Jing Huang,et al.  State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.

[25]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[26]  Georgios Mantas,et al.  Security in Smart Home Environment , 2011 .

[27]  John R. Williams,et al.  Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining , 2012, PAISI.

[28]  Claude Castelluccia,et al.  DREAM: DiffeRentially privatE smArt Metering , 2012, ArXiv.

[29]  Linqiang Ge,et al.  A novel architecture against false data injection attacks in smart grid , 2012, 2012 IEEE International Conference on Communications (ICC).

[30]  Mario Gerla,et al.  MobiCom 2010 Poster : Frequency Quorum Rendezvous for Fast and Resilient Key Establishment under Jamming Attack , 2011 .

[31]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[32]  Conversion and delivery of electrical energy in the 21st century , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[33]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[34]  Ivan Stojmenovic,et al.  A Security Architecture for Data Aggregation and Access Control in Smart Grids , 2011, ArXiv.

[35]  Jianfeng Ma,et al.  Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems , 2012, Int. J. Distributed Sens. Networks.

[36]  Zhu Han,et al.  Defending false data injection attack on smart grid network using adaptive CUSUM test , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[37]  Jan Camenisch,et al.  A Signature Scheme with Efficient Protocols , 2002, SCN.

[38]  Ulrich Greveler,et al.  Multimedia Content Identification Through Smart Meter Power Usage Profiles , 2012 .

[39]  W. Kempton,et al.  The consumer's energy analysis environment , 1994 .

[40]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[41]  S. Karnouskos,et al.  Smart Houses for a Smart Grid , 2009 .

[42]  Ward Jewell,et al.  Wireless AMI application and security for controlled home area networks , 2011, 2011 IEEE Power and Energy Society General Meeting.

[43]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[44]  A. Kamilaris,et al.  Integrating Web-Enabled Energy-Aware Smart Homes to the Smart Grid , 2012 .

[45]  Tobias Jeske,et al.  Privacy-preserving smart metering without a trusted-third-party , 2011, Proceedings of the International Conference on Security and Cryptography.