A Simulation Model for the Analysis of Security Attacks in Advanced Metering Infrastructure

The integration of Information and Communication Technologies in the power grid has given rise to new applications such as Advanced Metering Infrastructure. However, these technologies have also exposed the grid to new forms of security attacks. It is challenging to analyse and find solutions for these attacks due to the complexity of the grid system. There is a need of simple mechanisms to model and study the security implications of new power applications. This paper introduces a simulation model to evaluate the impact of security attacks on the Advanced Metering Infrastructure of a microgrid. The model is evaluated by demonstrating three security attack scenarios which lead to theft of power theft, privacy loss, and power outage.

[1]  Saurabh Amin,et al.  In quest of benchmarking security risks to cyber-physical systems , 2013, IEEE Network.

[2]  Christian Dufour,et al.  On the use of real-time simulation technology in smart grid research and development , 2013, 2013 IEEE Energy Conversion Congress and Exposition.

[3]  Ehab Al-Shaer,et al.  A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Transactions on Smart Grid.

[4]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[5]  Devendra Shelar,et al.  Security Assessment of Electricity Distribution Networks Under DER Node Compromises , 2016, IEEE Transactions on Control of Network Systems.

[6]  Kan Chen,et al.  A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure , 2015, IEEE Transactions on Smart Grid.

[7]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[8]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[9]  J. Chris Foreman,et al.  Identifying the Cyber Attack Surface of the Advanced Metering Infrastructure , 2015 .

[10]  Aditya Ashok,et al.  Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.

[11]  Ryan K. L. Ko,et al.  Taxonomy of Man-in-the-Middle Attacks on HTTPS , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[12]  Vijay Varadharajan,et al.  Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures , 2014, 2014 19th International Conference on Engineering of Complex Computer Systems.

[13]  Xiaojun Cao,et al.  Attacks/faults detection and isolation in the Smart Grid using Kalman Filter , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[14]  Sujeet Shenoi,et al.  Security analysis of an advanced metering infrastructure , 2017, Int. J. Crit. Infrastructure Prot..

[15]  Eul Gyu Im,et al.  Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems , 2012 .

[16]  T. Huld,et al.  Energy solutions in rural Africa: mapping electrification costs of distributed solar and diesel generation versus grid extension , 2011 .

[17]  Arif Sarwat,et al.  A survey on security assessment of metering infrastructure in Smart Grid systems , 2015, SoutheastCon 2015.

[18]  Lindah Kotut,et al.  Survey of Cyber Security Challenges and Solutions in Smart Grids , 2016, 2016 Cybersecurity Symposium (CYBERSEC).

[19]  Chao Yang,et al.  Agent-based Network Security Simulator Nessi2 , 2015 .

[20]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.