Skip to main content

Evaluation of Cybersecurity Threats on Smart Metering System

  • Conference paper
  • First Online:
Information Technology - New Generations

Abstract

Smart metering has emerged as the next-generation of energy distribution, consumption, and monitoring systems via the convergence of power engineering and information and communication technology (ICT) integration otherwise known as smart grid systems. While the innovation is advancing the future power generation, distribution, consumption monitoring and information delivery, the success of the platform is positively correlated to the thriving integration of technologies upon which the system is built. Nonetheless, the rising trend of cybersecurity attacks on cyber infrastructure and its dependent systems coupled with the system’s inherent vulnerabilities present a source of concern not only to the vendors but also the consumers. These security concerns need to be addressed in order to increase consumer confidence so as to ensure greatest adoption and success of smart metering. In this paper, we present a functional communication architecture of the smart metering system. Following that, we demonstrate and discuss the taxonomy of smart metering common vulnerabilities exposure, upon which sophisticated threats can capitalize. We then introduce countermeasure techniques, whose integration is considered pivotal for achieving security protection against existing and future sophisticated attacks on smart metering systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Common Vulnerability Exposure.

References

  1. Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2013). A survey on smart grid communication infrastructures: Motivations, requirements, and challenges. Communication Surveys and Tutorials IEEE, 15(1), 5–20.

    Article  Google Scholar 

  2. Li, X., Liang, X., Lu, R., Shen, X., Lin, X., & Zhu, H. (2012). Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine, 50(8), 38–45.

    Article  Google Scholar 

  3. Cleveland, F. M. (2008). Cyber security issues for advanced metering infrastructure (ami). In Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, pp. 1–5.

    Google Scholar 

  4. Rinaldi, S. M. (2004). Modeling and simulating critical infrastructures and their interdependencies. System sciences, 2004. Proceedings of the 37th annual Hawaii international conference on, p. 20054.1. 8–pp.

    Google Scholar 

  5. Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. Control Systems IEEE, 21(6), 11–25.

    Article  Google Scholar 

  6. Flick, T., & Morehouse, J. (2010). Securing the smart grid: Next generation power grid security. Amsterdam: Elsevier.

    Google Scholar 

  7. Giani, A., Bitar, E., Garcia, M., McQueen, M., Khargonekar, P., & Poolla, K. (2011). Smart grid data integrity attacks: characterizations and countermeasures π. Smart Grid Communications (SmartGridComm), 2011 I.E. International Conference on, pp. 232–237.

    Google Scholar 

  8. Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cybersecurity for smart grid communications. IEEE Communication Surveys and Tutorials, 14(4), 998–1010.

    Article  Google Scholar 

  9. Wei, D., Lu, Y., Jafari, M., Skare, P., & Rohde, K. (2010) An integrated security system of protecting smart grid against cyber attacks. Innovative Smart Grid Technologies (ISGT), 2010, pp. 1–7.

    Google Scholar 

  10. Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. L. (2012). Cyber security and privacy issues in smart grids. Communication Surveys and Tutorials IEEE, 14(4), 981–997.

    Article  Google Scholar 

  11. Ericsson, G. N. (2010). Cybersecurity and power system communication—essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501–1507.

    Article  Google Scholar 

  12. Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), 847–855.

    Article  Google Scholar 

  13. Lu, Z., Lu, X., Wang, W., & Wang, C. (2010). Review and evaluation of security threats on the communication networks in the smart grid. Military Communications Conference, 2010-MILCOM 2010, pp. 1830–1835.

    Google Scholar 

  14. Metke, A. R., & Ekl, R. L. (2010). Security technology for smart grid networks. IEEE Transactions on Smart Grid, 1(1), 99–107.

    Article  Google Scholar 

  15. Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., & Assi, C. (2013). Communication security for smart grid distribution networks. IEEE Communications Magazine, 51(1), 42–49.

    Article  Google Scholar 

  16. Clements, S., & Kirkham, H. (2010). Cybersecurity considerations for the smart grid. IEEE PES General Meeting, pp. 1–5.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samuel Tweneboah-Koduah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Tweneboah-Koduah, S., Tsetse, A.K., Azasoo, J., Endicott-Popovsky, B. (2018). Evaluation of Cybersecurity Threats on Smart Metering System. In: Latifi, S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558. Springer, Cham. https://doi.org/10.1007/978-3-319-54978-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54978-1_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54977-4

  • Online ISBN: 978-3-319-54978-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics