<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://projectswiki.eleceng.adelaide.edu.au/projects/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=A1660770</id>
	<title>Projects - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://projectswiki.eleceng.adelaide.edu.au/projects/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=A1660770"/>
	<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php/Special:Contributions/A1660770"/>
	<updated>2026-05-15T11:44:58Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.4</generator>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167c_Smart_Grid_Security&amp;diff=8997</id>
		<title>Projects:2017s1-167c Smart Grid Security</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167c_Smart_Grid_Security&amp;diff=8997"/>
		<updated>2017-10-28T13:24:15Z</updated>

		<summary type="html">&lt;p&gt;A1660770: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Project Team ==&lt;br /&gt;
Juin Hao Yau&lt;br /&gt;
&lt;br /&gt;
== Supervisor ==&lt;br /&gt;
Dr Matthew Sorell&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
As our technology advances forward at a rapid rate, the current power grid use today has&lt;br /&gt;
not been significantly modified or improved. The current power grid is not reliable and has&lt;br /&gt;
been causing blackouts, voltage sags and other numerous problems over the years. A similar&lt;br /&gt;
but better electric grid called smart grids are replacing the standard electric infrastructure&lt;br /&gt;
but at a very slow pace. What differs from a smart grid and the standard electric grid&lt;br /&gt;
is that a smart grid is more reliable, manageable, scalable, cost efficient and has two-way&lt;br /&gt;
communication between the utility operator and the consumer.&lt;br /&gt;
&lt;br /&gt;
A smart grid consists of different entities connected by multiple systems. Advanced metering&lt;br /&gt;
infrastructure (AMI) is a system component within the smart grid which connects&lt;br /&gt;
smart meters from the consumers to the operators and vice versa. However, smart grids are&lt;br /&gt;
vulnerable to cyber security attacks because of its large use of communication technology.&lt;br /&gt;
This cyber security issues are also present in the AMI. If the cyber security issues are not&lt;br /&gt;
addressed well, it could cause the AMI to be vulnerable to cyber threats and have serious&lt;br /&gt;
consequences.&lt;br /&gt;
AMI system plays an important role in the smart grid and with its weak cyber security protocols,&lt;br /&gt;
it naturally becomes attackers first target. This research will cover the issues of cyber&lt;br /&gt;
security in AMI, determine the requirements to mitigate the issues, discuss about the cyber&lt;br /&gt;
threats resulting from the issues and to finally draw a conclusion by giving recommendations.&lt;br /&gt;
&lt;br /&gt;
== Motivation ==&lt;br /&gt;
South Australia has been recently facing with energy crisis. Approximately 50% of South&lt;br /&gt;
Australias energy comes from gas, 45% from wind energy and the remaining from solar, diesel&lt;br /&gt;
and brown coal from Victoria. Wind energy has been proved to be not very reliable during&lt;br /&gt;
the blackout on September 2016 and due to the closure of a few coal plants in Victoria, the&lt;br /&gt;
demand for gas energy increases. One solution proposed was to use battery storage as a&lt;br /&gt;
short-term fix. However, the upfront cost for battery storage is too expensive and is not as&lt;br /&gt;
efficient compared to other methods.&lt;br /&gt;
&lt;br /&gt;
A long-term solution for the energy crisis is to convert the traditional standard grid into a&lt;br /&gt;
smart grid. By doing so, the operators and consumers are able to communicate with each&lt;br /&gt;
other and control the energy flow during high demand. AMI plays an important role in&lt;br /&gt;
assisting the smart grid to connect the operators and consumers. Other than that, a smart&lt;br /&gt;
grid can recover from a blackout by rerouting another transmission line.&lt;br /&gt;
&lt;br /&gt;
Furthermore, smart grids can help reduce energy cost for the consumers as the smart meters&lt;br /&gt;
installed at the end user allows the consumer to monitor energy prices in near real time.&lt;br /&gt;
With the AMI implemented, the utility provider no longer needs to send out the meter man&lt;br /&gt;
to measure the energy usage once every few months, instead they can bill the consumers&lt;br /&gt;
directly and more efficiently. For the utility provider, this saves cost on fuel for sending out&lt;br /&gt;
a meter man, and for the consumer, they no longer need to worry about estimated billing&lt;br /&gt;
when the meter man has no access to the meter.&lt;br /&gt;
&lt;br /&gt;
== Purpose of the project ==&lt;br /&gt;
The purpose of this project is to carry out an extensive research, discuss and provide an&lt;br /&gt;
overall view on the Cyber Security Issues in AMI and can then be used as a general reference&lt;br /&gt;
for future work. The aim is to first identify the current issues and causes from past&lt;br /&gt;
research, discuss about the issues, list out the regulatory requirements and the cyber security&lt;br /&gt;
requirements. This research will also include ways an attacker can exploit the AMI and the&lt;br /&gt;
recommended resolutions.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
=== What is a Smart Grid? ===&lt;br /&gt;
Over the years the term smart grid has went through numerous changes, but in general it&lt;br /&gt;
is used to describe power grids with enhanced communication and sensing system which&lt;br /&gt;
improves the overall reliability. According to Liu et al. a smart grid is capable of analysing&lt;br /&gt;
power usage information in real time [1]. What makes a smart grid more reliable than the&lt;br /&gt;
standard power grid is that any outage in an area due to bad weather can be automatically&lt;br /&gt;
rerouted from another working distribution line. This feature is called distribution intelligence.&lt;br /&gt;
A smart grid is also capable of integrating different energy sources. This allows&lt;br /&gt;
renewable and non-renewable energy to work well together.&lt;br /&gt;
&lt;br /&gt;
One important feature of a smart grid is the two-way communication between the consumer&lt;br /&gt;
and the operator unlike the standard grid which only flows one way. What this means is&lt;br /&gt;
that electricity is not only flowing from the operator to the consumer but information from&lt;br /&gt;
the consumer is also flowing back to the operator. This two-way communication allows the&lt;br /&gt;
operator to adjust the energy according to the consumer needs.&lt;br /&gt;
&lt;br /&gt;
=== What is Advanced Metering Infrastructure (AMI)? ===&lt;br /&gt;
AMI is one of the major system within the smart grid which is used to connect the consumer&lt;br /&gt;
and the operator with a two way communication link. Its main purpose is to measure,&lt;br /&gt;
collect and analyse power usage data of consumers. The AMI is composed of different&lt;br /&gt;
technologies such as smart meters, Meter Data Management System (MDMS) and consumers&lt;br /&gt;
area network (HAN). Through AMI, operators are able to obtain electricity price in real time&lt;br /&gt;
while the consumers will be able to have control on their power usage and are able to see&lt;br /&gt;
real-time electricity prices [1].&lt;br /&gt;
&lt;br /&gt;
=== What is a Smart Meter? ===&lt;br /&gt;
A Smart Meter is an electronic meter installed at the consumer’s end which is able to monitor&lt;br /&gt;
and collect energy information of the consumer and then send it to the operator periodically,&lt;br /&gt;
around every 30 minutes or less. Different from a electromechanical meter a smart meter&lt;br /&gt;
contains bi-directional communication between the consumer and the utility provider which&lt;br /&gt;
sends usage information back to the utility. The smart meter is a main component in the&lt;br /&gt;
AMI.&lt;br /&gt;
&lt;br /&gt;
=== What is Home Area Network (HAN)? ===&lt;br /&gt;
The HAN works as a network to connect the consumers appliances together. Such appliances&lt;br /&gt;
include, computers, smart televisions, lights, security systems, etc. This allows the appliances&lt;br /&gt;
to communicate with each other.&lt;br /&gt;
&lt;br /&gt;
=== What is Meter Data Management System (MDMS)? ===&lt;br /&gt;
The Meter Data Management System is located and integrated at the consumer end. Information&lt;br /&gt;
and data obtained from the consumer via smart meters are stored and managed in&lt;br /&gt;
the MDMS software. It also provides report statistics and validation.&lt;br /&gt;
&lt;br /&gt;
== Cyber Security Issues ==&lt;br /&gt;
This introduction of the communication technology to the architecture caused&lt;br /&gt;
cyber security vulnerabilities in the AMI. Hence this section aims to address cyber security issues in AMI from previous research.&lt;br /&gt;
&lt;br /&gt;
=== Privacy Issues ===&lt;br /&gt;
There are many concerns on privacy with the installation of a smart meter. If the AMI&lt;br /&gt;
was to be attacked or hacked, two main issues of privacy can occur; real time spying and&lt;br /&gt;
burglary, and identity theft [16].&lt;br /&gt;
&lt;br /&gt;
==== Real time spying and burglary ====&lt;br /&gt;
According to Mohassel et al., the smart meter is able to collect energy consumption data&lt;br /&gt;
in a shorter interval of around 20 mins average compared to the traditional meter which&lt;br /&gt;
is only done during the billing period. These shorter readings from the smart meter can&lt;br /&gt;
then be used to generate a profile of the consumer which for example can include number of&lt;br /&gt;
occupant and type of alarm system [6, 10]. This is backed up by Saputro and Akkaya where&lt;br /&gt;
they mentioned that from the amount of information the Smart Meter obtains, it can show&lt;br /&gt;
more than just the power usage of the consumer. The energy consumption information can&lt;br /&gt;
show if the consumer is at home or not by load monitoring.&lt;br /&gt;
&lt;br /&gt;
Moreover, the operating time of an appliance can also be determined from the smart meter.&lt;br /&gt;
Additionally, if the energy consumption data is analysed over a period, a detailed graph can&lt;br /&gt;
be produced [7].&lt;br /&gt;
&lt;br /&gt;
Attackers are able to know what appliances were used on what&lt;br /&gt;
specific time of the day and the consumers daily routine can then be figured out. The graph&lt;br /&gt;
can be use as a surveillance on the consumer and can even be use to coordinate a burglary.&lt;br /&gt;
A burglar can know when to attack based on the graph, for example, the graph will have&lt;br /&gt;
no spike if the occupant went for a holiday. Other than that, this information can now be&lt;br /&gt;
obtained remotely without the need to be present at the target’s property.&lt;br /&gt;
&lt;br /&gt;
==== Identity theft ====&lt;br /&gt;
&lt;br /&gt;
Identity theft is an issue whereby the attacker uses the consumer’s identity to gain benefit&lt;br /&gt;
financially. A smart meter obtains more than just the energy consumption information from&lt;br /&gt;
a consumer compared to the traditional meter. The list of personal information obtained&lt;br /&gt;
by the smart meter and stored in the grid according to Liu et al. is as follows: consumers&lt;br /&gt;
name, phone number, home address, transaction history, meter reading, HAN, meter IP and&lt;br /&gt;
service provider [1]. This can cause serious privacy issues if the data in the Smart Meter&lt;br /&gt;
falls into the wrong hands.&lt;br /&gt;
&lt;br /&gt;
Based on Saputro and Akkaya there are two ways an attacker can obtain the energy consumption information. Firstly, an attack can occur when transmitting the data from the&lt;br /&gt;
consumer to the utility. Secondly, it can either be done at the utility site or the consumer&lt;br /&gt;
site where the smart meter is present [7]. Privacy issue may not be a serious problem for&lt;br /&gt;
some people but a surprisingly large amount of people are concern on privacy which has led&lt;br /&gt;
to activist being formed to stop the installation of smart meters. To ensure that the public&lt;br /&gt;
are comfortable with smart meters and trust the utility, the data in the smart meter needs&lt;br /&gt;
to be protected via cyber security measures [8].&lt;br /&gt;
&lt;br /&gt;
===  Denial-of-Service issues ===&lt;br /&gt;
Another form of threat which is fairly common is a Denial-of-Service attack. Based on Mo&lt;br /&gt;
et al. a DoS attack is when the attackers send false request to the network to cause a&lt;br /&gt;
disruption or to temporarily make the service unavailable [15]. A successful DoS attack can&lt;br /&gt;
cause an issue at the consumer site. From Cleveland, the consumer can get delayed pricing&lt;br /&gt;
information on their smart meters which can cause financial problems [2]. Another major&lt;br /&gt;
problem from a DoS attack is when there is an outage in an area, the grid is unable to&lt;br /&gt;
restore power to it on time via the AMI [2]. &lt;br /&gt;
&lt;br /&gt;
Based on Asri and Pranggono there are three&lt;br /&gt;
ways of executing a DoS attack, flooding attacks, vulnerability attacks and a new way of&lt;br /&gt;
attack called puppet attack introduced by Yi et al. [16, 17]. Flooding attack is a form of&lt;br /&gt;
Distributed Denial-of-Service attack (DDoS) where the attacker sends several SYN packet&lt;br /&gt;
to an invalid address an causes an error in the system [16]. Vulnerability attacks are done&lt;br /&gt;
by exploiting exposed software at the target which result in overuse of the CPU memory.&lt;br /&gt;
Puppet attack on the other hand is similar to the flooding attack, however puppet attacks&lt;br /&gt;
are less likely to be detected [17].&lt;br /&gt;
&lt;br /&gt;
===  Unauthorized access and modification issues ===&lt;br /&gt;
Another major threat in the AMI is when attackers issue their own commands into the&lt;br /&gt;
AMI or modify it. The types of different attacks can be classified into five different threats;&lt;br /&gt;
masquerade, firmware modification, buffer overflow, man-in-the-middle attack, and energy&lt;br /&gt;
theft.&lt;br /&gt;
&lt;br /&gt;
==== Masquerade ====&lt;br /&gt;
From previous research, masquerade is shown as a threat where attackers impersonate the&lt;br /&gt;
control centre at the AMI headend [11]. As mentioned by Parks, the attackers can issue a&lt;br /&gt;
shutdown on multiple Smart Meters causing a high power without demand from the power&lt;br /&gt;
company. The power company will then lower the power and when the smart meters are&lt;br /&gt;
15&lt;br /&gt;
turned back on, the lack of power can cause a blackout [12]. Masquerade can be done through&lt;br /&gt;
authentication bypass. Another possible masquerade threat is at the consumers site where&lt;br /&gt;
the attackers can send false alarms from multiple smart meters to the control centre. The&lt;br /&gt;
result of this is the control centre will send maintenance team to those smart meters and&lt;br /&gt;
can cause performance and delay issues [11]. &lt;br /&gt;
&lt;br /&gt;
Other than small threats, masquerade can be&lt;br /&gt;
used as a large-scale attack and can cause havoc nationwide as mentioned by Parks [12]. An&lt;br /&gt;
example of a large-scale attack is terrorist can cause power instability or blackout during&lt;br /&gt;
their own bombing attack.&lt;br /&gt;
&lt;br /&gt;
==== Firmware modification ====&lt;br /&gt;
A threat also mentioned in the research of Adak et al. is firmware modification. This threat&lt;br /&gt;
is a major concern because attackers can modify the firmware remotely and once modified,&lt;br /&gt;
the AMI meter can function however the attacker wants. Although modifying the firmware&lt;br /&gt;
of the AMI is not an easy task and requires a certain amount of expertise, it should not be&lt;br /&gt;
taken lightly as it can have serious consequences [11].&lt;br /&gt;
&lt;br /&gt;
==== Firmware modification ====&lt;br /&gt;
A threat also mentioned in the research of Adak et al. is firmware modification. This threat&lt;br /&gt;
is a major concern because attackers can modify the firmware remotely and once modified,&lt;br /&gt;
the AMI meter can function however the attacker wants. Although modifying the firmware&lt;br /&gt;
of the AMI is not an easy task and requires a certain amount of expertise, it should not be&lt;br /&gt;
taken lightly as it can have serious consequences [11].&lt;br /&gt;
&lt;br /&gt;
==== Buffer overflow ====&lt;br /&gt;
According to Adak et al., buffer overflow is a very common type of attack these days. As the&lt;br /&gt;
name implies, the attacker can overflow the buffer in the AMI meter and can cause damage&lt;br /&gt;
to the data within the AMI or leak them [11]. The memory addresses gets modified during&lt;br /&gt;
a buffer attack which can cause system freeze.&lt;br /&gt;
&lt;br /&gt;
==== Man-in-the-middle Attack ====&lt;br /&gt;
Man-in-the-middle attack is also a common cyber threat towards the AMI. This can be done&lt;br /&gt;
during the transmitting of data over the network. The attackers can implant false information&lt;br /&gt;
in the network from any node. The backhaul link is one way where the attackers can interfere&lt;br /&gt;
and also obtain the cryptographic key. [6] A few consequences of a man-in-the-middle attack&lt;br /&gt;
based on Liu et al. are modification of the billing data, financial loss, equipment damage&lt;br /&gt;
and human risks.&lt;br /&gt;
&lt;br /&gt;
==== Energy theft ====&lt;br /&gt;
Lastly, energy theft has always been around since the first standard grids are introduced&lt;br /&gt;
and are still present in Smart Grids. According to McLaughlin et al. there are 2 types of&lt;br /&gt;
attackers; consumers and organized crime [13]. Customers are the main attackers to try&lt;br /&gt;
and steal energy via tampering the meter. Stealing energy by tampering the smart meter is&lt;br /&gt;
harder compared to the traditional meter, however due to the advancement of AMI, ways on&lt;br /&gt;
how to steal energy from smart meters can be easily obtained online [14]. Organized crime&lt;br /&gt;
is another culprit of energy theft. As mentioned by McLaughlin, these organizations are&lt;br /&gt;
professional hackers who take advantage of the AMI system to steal large amount of energy&lt;br /&gt;
[13].&lt;br /&gt;
&lt;br /&gt;
== Regulatory Requirements ==&lt;br /&gt;
The cyber security issues in the AMI can be minimised by introducing regulatory requirements&lt;br /&gt;
and/or legislations which creates certain restrictions on the AMI for example the&lt;br /&gt;
handling of consumer’s data [18]. This section covers the current regulatory requirements&lt;br /&gt;
used in the AMI system and will also include suggested new laws to improve the cyber&lt;br /&gt;
security of the AMI.&lt;br /&gt;
&lt;br /&gt;
=== Policy for privacy ===&lt;br /&gt;
A smart meter records the energy consumption of the consumer every 30 minutes or less.&lt;br /&gt;
Hence, the information obtained by a smart meter can be very detailed and can show the&lt;br /&gt;
lifestyle of the consumer. There are rising privacy concerns among the consumers if the&lt;br /&gt;
information happens to fall onto the wrong hands or misused by the utility provider. Privacy&lt;br /&gt;
is a major issue which directly involves the consumer and hence need to be enforced. Based&lt;br /&gt;
on Australian law, the federal privacy act 1988 ensures that the consumer’s information&lt;br /&gt;
(name, signature, address, bank details, telephone number and date of birth) is protected.&lt;br /&gt;
This applies to the AMI system for example, when the smart meter collects the consumer’s&lt;br /&gt;
personal information, the utility provider is not allowed to share it to other third parties&lt;br /&gt;
without having the consent from the consumer. Other than that, the utility provider will&lt;br /&gt;
always ensure that the third party complies with the federal privacy act when the third party&lt;br /&gt;
request to obtain the consumer’s information.&lt;br /&gt;
&lt;br /&gt;
Moreover, the utility provider need to ensure the authenticity of the obtained consumer’s&lt;br /&gt;
personal information by ensuring the consumer updates their information regularly. On the&lt;br /&gt;
other hand, the information collected from the smart meter and kept by the utility provider&lt;br /&gt;
must be protected from unauthorised access. Another requirement to strengthen the privacy&lt;br /&gt;
of the consumer is the utility provider must conduct cyber security training for their staffs&lt;br /&gt;
and ensure frequent audits.&lt;br /&gt;
&lt;br /&gt;
Additionally, the federal privacy act contains the Australian Privacy Principles (APP), also&lt;br /&gt;
formerly known as National Privacy and Principles. APP explains the use and storage of&lt;br /&gt;
personal information and set restrains for organisations with 3 million Australian dollars or&lt;br /&gt;
more annual turnover [20]. There are additional protection on the installation and data of&lt;br /&gt;
the smart meter as stated in the National Electricity Rules.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Policy for unauthorized access and DoS ===&lt;br /&gt;
Aside from policy regarding privacy issues, law enforcing the cyber security to prevent unauthorized&lt;br /&gt;
access issues should also be prioritized. The AMI is responsible on the measurement&lt;br /&gt;
and collection of energy usage of the consumers, and is done through network transmission.&lt;br /&gt;
Hence, the AMI is exposed and can be vulnerable to cyber attacks if there are no regulations&lt;br /&gt;
on the cyber security.&lt;br /&gt;
&lt;br /&gt;
A few policies can be introduced to minimise cyber security issues within the AMI. For&lt;br /&gt;
example, a policy where the encryption of the information and cyber security protection of&lt;br /&gt;
the AMI and grid has to exceed a certain level of security. If such policy exists, this can&lt;br /&gt;
ensure that when the AMI is implemented, the design engineers follows a specific set of rules&lt;br /&gt;
and ensures that the cyber security is not easily penetrated.&lt;br /&gt;
&lt;br /&gt;
Additionally, the policy can also defend against unauthorized access by making sure meter&lt;br /&gt;
protocols are implemented and for each stage of the data transmission process between the&lt;br /&gt;
consumer and utility provider there contains encryption. Other ways to enforce the cyber&lt;br /&gt;
security in the AMI includes implementing passwords in the smart meters according to the&lt;br /&gt;
appropriate standards and the addition of firewalls to separate the AMI network from the&lt;br /&gt;
internet [19].&lt;br /&gt;
&lt;br /&gt;
==  Cyber Security Requirements ==&lt;br /&gt;
Cleveland mentioned that each cyber security issue can be grouped into their appropriate&lt;br /&gt;
security requirements. This bond between the security requirements and threats means&lt;br /&gt;
that solutions to the cyber security issues can be implemented easier instead of solving on&lt;br /&gt;
each individual threat. Below are four different technical security requirements and their&lt;br /&gt;
corresponding descriptions [2].&lt;br /&gt;
&lt;br /&gt;
=== Confidentiality ===&lt;br /&gt;
Cleveland mentioned that in AMI, confidentiality means that consumer’s information and&lt;br /&gt;
data is only available to the authorized operator. This is important as a consumer because&lt;br /&gt;
of privacy issues. Without confidentiality, attackers can obtain detailed information of the&lt;br /&gt;
consumers for example energy usage patterns. This energy usage pattern is able to give&lt;br /&gt;
attackers information on whether the consumer is at home or not and their daily routine.&lt;br /&gt;
To keep the consumer’s data confidential, either the AMI network needs to be encrypted&lt;br /&gt;
so that attackers cannot easily hack or the utility provider needs to ensure the data is not&lt;br /&gt;
shared to other third parties [2].&lt;br /&gt;
&lt;br /&gt;
=== Integrity ===&lt;br /&gt;
According to Cleveland, integrity is to ensure the information and data received by the&lt;br /&gt;
operator is from the correct consumer. This means that the data collected by the smart&lt;br /&gt;
meter must not be altered or modified without authorised permission. Attackers can hack&lt;br /&gt;
and pose as the consumers and give false information to the operator. An example is when&lt;br /&gt;
the attackers increases the electricity demand of multiple consumers and if the generator is&lt;br /&gt;
unable to supply that amount of power, a blackout can occur [2].&lt;br /&gt;
&lt;br /&gt;
=== Availability ===&lt;br /&gt;
Based on Cleveland, availability is to ensure that the consumer’s information and data is&lt;br /&gt;
always available to the authorized operator. This is especially important for smart meters&lt;br /&gt;
as compared to the traditional meters, because the traditional meters allows estimate billing&lt;br /&gt;
while the smart meters are not able to do that. Attackers can cause a Denial-of-Service in&lt;br /&gt;
the AMI where the operator can not access the consumers’ information when needed. This&lt;br /&gt;
can cause delayed information and affecting the service for the consumers. At the consumer’s&lt;br /&gt;
site, it can cause delay to pricing and can affect consumer financially [2].&lt;br /&gt;
&lt;br /&gt;
=== Accountability ===&lt;br /&gt;
Another important security requirement is accountability as noted by Mohassel et al. accountability&lt;br /&gt;
is when the entities do not deny receiving information or when the entity did&lt;br /&gt;
not receive information but say otherwise. The AMI is a large network and does not own&lt;br /&gt;
by an entity, instead it consists of different individuals. This means that it is crucial to&lt;br /&gt;
have synchronized timestamps for the data in the network by each entity. Weak focus on&lt;br /&gt;
accountability can result in financial issues because one entity can declare that the data has&lt;br /&gt;
been sent and accuse that it has been lost in the network [2, 6].&lt;br /&gt;
&lt;br /&gt;
== Human Factor Requirements ==&lt;br /&gt;
The cyber security issues in AMI cannot be solved with just technical and regulatory requirements.&lt;br /&gt;
As the AMI obtains information from the consumer, the community has to be&lt;br /&gt;
involved in reducing the issues. Additionally, requirement for personnel involved in the AMI&lt;br /&gt;
is also necessary and will be discussed.&lt;br /&gt;
&lt;br /&gt;
=== Awareness on cyber security ===&lt;br /&gt;
The publics knowledge on the importance of cyber security in the AMI is limited. Hence, the&lt;br /&gt;
government and organisations involved in smart grid program should educate the public and&lt;br /&gt;
promote awareness. If the issues of cyber security in AMI is spread out and known to the&lt;br /&gt;
public, additional steps can be taken to reduce the vulnerability of a cyber attack. The public&lt;br /&gt;
can take precautions, for example installing a CCTV near a smart meter. Furthermore, the&lt;br /&gt;
government should also emphasise on the law on tampering the smart meter. This can&lt;br /&gt;
reduce the potential attackers towards the AMI.&lt;br /&gt;
&lt;br /&gt;
Other than raising awareness among the public, it is also important that personnel involved&lt;br /&gt;
in the smart grid are familiar with the cyber security issues in AMI. This is because the personnel&lt;br /&gt;
are involved in manufacturing, installing and maintaining the AMI and an awareness&lt;br /&gt;
on cyber security could improve the overall cyber security in the AMI. Additionally, this can&lt;br /&gt;
result in cyber security being prioritise when operating and implementing the smart grid&lt;br /&gt;
[24].&lt;br /&gt;
&lt;br /&gt;
=== Personnel training ===&lt;br /&gt;
To create awareness among personnel as stated in the above section, training programs need&lt;br /&gt;
to be introduced. This training program should cover awareness on cyber security issues,&lt;br /&gt;
cyber security requirements, and the appropriate actions when a cyber attack occurs [24].&lt;br /&gt;
A utility provider with cyber security in mind could minimise cyber security issues in AMI.&lt;br /&gt;
Apart from that, personnel with the appropriate training will know the necessary steps to&lt;br /&gt;
take if a cyber attack occurs to avoid further damages.&lt;br /&gt;
&lt;br /&gt;
== Cyber Threats in the AMI ==&lt;br /&gt;
There are many cyber security loopholes in the AMI as discussed in the above sections.&lt;br /&gt;
Hence, attackers will find many ways to exploit the AMI based on those loopholes. Most&lt;br /&gt;
of these attacks are mainly to gain financial benefit. Other cases of non-financial benefit&lt;br /&gt;
attacks are usually unlikely and not practical to occur but will still be discussed. This&lt;br /&gt;
section will cover the different ways an attacker can exploit the AMI and can be categorised&lt;br /&gt;
into four groups; tampering on energy usage, billing others, insider threat, attempt burglary&lt;br /&gt;
and nation state attack.&lt;br /&gt;
&lt;br /&gt;
=== Tampering on energy usage ===&lt;br /&gt;
&lt;br /&gt;
One reason for the deployment of the smart grid was to resolve the issue with energy theft.&lt;br /&gt;
Although smart meters were able to eliminate the standard ways to steal energy from the&lt;br /&gt;
traditional meter, it introduces new hacking methods via the network. With the right tools&lt;br /&gt;
and resources, the data in the smart meter can be tampered. There are various approaches&lt;br /&gt;
for an attacker to alter the energy usage, they include: administrative access, modifying&lt;br /&gt;
smart meter firmware, intercepting the data transmission link.&lt;br /&gt;
&lt;br /&gt;
==== Administrative access ====&lt;br /&gt;
&lt;br /&gt;
Similar to the traditional meter, the smart meter stores the total energy consumption used&lt;br /&gt;
by the household. This data can be hacked and modified via obtaining the smart meter&lt;br /&gt;
password to grant administrative rights. Obtaining the smart meter password does not&lt;br /&gt;
require much work for the attackers as once the smart meter is physically tampered, a&lt;br /&gt;
device for monitoring is able to capture the passwords [13]. These passwords according to&lt;br /&gt;
McLaughlin et al. is transmitted into the open without much security protection.&lt;br /&gt;
&lt;br /&gt;
Once the attacker gained administrative rights on the smart meters, they are able to modify&lt;br /&gt;
the total energy consumption data which then affects the electric bill. This allows the&lt;br /&gt;
attacker to use more energy than they are actually paying. Additionally, with the administrative&lt;br /&gt;
rights, attackers can also alter the audit logs stored in the smart meter. Audit logs&lt;br /&gt;
are a record of timestamps when the smart meter is being accessed via administrative rights.&lt;br /&gt;
Modifying audit logs need to be done in conjunction with total energy consumption data as&lt;br /&gt;
it erases evidence on tampering.&lt;br /&gt;
&lt;br /&gt;
==== Modifying smart meter firmware ====&lt;br /&gt;
Modifying the total energy consumption data using administrative access only provides a&lt;br /&gt;
limited control over the smart meter. Hence, some attackers would choose to reverse engineer&lt;br /&gt;
the firmware on the smart meter directly instead. When the smart meters firmware is&lt;br /&gt;
modified, the attacker has full access on tariffs for Time of Use (TOU) pricing, event logs,&lt;br /&gt;
received and executed commands [6, 13]. The smart meter can then be reprogramed to&lt;br /&gt;
report fake data.&lt;br /&gt;
&lt;br /&gt;
==== Intercepting the data transmission link ====&lt;br /&gt;
Apart from tampering on the energy usage at the smart meter end, the introduction of AMI&lt;br /&gt;
also enables attackers to attack during the transmission of data from the consumers smart&lt;br /&gt;
meter to the utility provider. When the data is being transmitted, it passes through several&lt;br /&gt;
nodes, these nodes can then be targeted by the attackers if the security protocols are weak.&lt;br /&gt;
The attackers can inject their own data into the transmitting data when it passes a node.&lt;br /&gt;
&lt;br /&gt;
Before injecting false data into the network, the attackers need to first intercept the communication&lt;br /&gt;
which is on the backhaul link. Attackers can tap a line near the first backhaul&lt;br /&gt;
link [13]. Once this is done, the attackers are ready to inject false data by removing the&lt;br /&gt;
original data being transmitted. However, as the AMI contains encryption in the network,&lt;br /&gt;
the attackers are required to retrieve the encryption key which can be found in the smart&lt;br /&gt;
meter. Instead of the smart meter accepting the data from the utility provider, the attackers&lt;br /&gt;
can now accept via their devices and send false data. This leads to an attack technique called&lt;br /&gt;
spoofing or masquerade as discussed previously. Additionally, attackers can attack when the&lt;br /&gt;
utility provider and smart meter has already connected. This involves a man-in-the-middle&lt;br /&gt;
attack at the node.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Billing others ===&lt;br /&gt;
Another method to steal energy is to bill the electricity to others instead. In order to do&lt;br /&gt;
this, the attacker would first need to select a target (most often the targets have to be living&lt;br /&gt;
nearby). After selecting a target, the attackers will hack into the targets smart meter to&lt;br /&gt;
obtain identity information for example the meter IP. The attacker will then modify the data&lt;br /&gt;
of their own smart meter to the targets meter IP. The attacker can also modify the targets&lt;br /&gt;
smart meter to avoid the utility provider from detecting duplicate meters. This is often&lt;br /&gt;
used by organised crime who are dealing with illegal businesses such as marijuana/cannabis&lt;br /&gt;
farming. To maintain these farms, a large amount of electricity usage is needed, hence the&lt;br /&gt;
attackers will resort to stealing energy to increase business revenue.&lt;br /&gt;
&lt;br /&gt;
Besides billing others for financial gain, attackers can tamper the smart meter of a specific&lt;br /&gt;
household so that the target household gets billed higher than their energy usage. For&lt;br /&gt;
example, the target will get charged twice the cost per kWh. The attackers usually has no&lt;br /&gt;
real motives other than to cause disturbance or for revenge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Insider threat ===&lt;br /&gt;
The AMI system can also be exploited from within the utility provider. This can be a&lt;br /&gt;
problem as it is not easy to detect abnormality within the utility. Insiders can either work&lt;br /&gt;
for their own financial benefit or can be planted by the power generation provider. These&lt;br /&gt;
insiders can either modify the pricing or the peak usage in the AMI system.&lt;br /&gt;
&lt;br /&gt;
==== Pricing modification ====&lt;br /&gt;
An insider can modify the system at the AMI head end or the consumers end so that the&lt;br /&gt;
pricing of electricity can then be altered to suit them. The insider can reduce the price&lt;br /&gt;
of the electricity in an area (most likely the place the insider resides) so that the insiders&lt;br /&gt;
electricity bill will be lower than the usual price. Furthermore, the insider will also increase&lt;br /&gt;
the price of the electricity in another area to balance out the utilitys revenue to avoid any&lt;br /&gt;
suspicion. This pricing modification by the insider can be done either via administrative&lt;br /&gt;
access or physical hacking access.&lt;br /&gt;
&lt;br /&gt;
Administrative access is usually done by insiders who are working in that particular department,&lt;br /&gt;
in this case, the department which is involved in getting pricing information. They&lt;br /&gt;
can then alter the price virtually without having to physically access the AMI head end&lt;br /&gt;
system [12]. Physical hacking access on the other hand requires an insider who has a decent&lt;br /&gt;
level of hacking and knowledge of the protocols involved. This is essential because they do&lt;br /&gt;
not have administrative access and would need to bypass certain security measures.&lt;br /&gt;
&lt;br /&gt;
==== Peak usage modification ====&lt;br /&gt;
The insider can also modify peak usage to gain financial benefit for the organization the&lt;br /&gt;
insider is working for. Modifying peak usage is useful for power generation providers because&lt;br /&gt;
the insider can increase the peak usage and price to produce a false electricity demand&lt;br /&gt;
information. When the utility provider noticed that the demand for electricity increased&lt;br /&gt;
they will then require to buy more electricity from the power generation provider. This could&lt;br /&gt;
cause the utility provider to lose revenue and the power generation provider to increase in&lt;br /&gt;
revenue. The possible scenario for this to happen can be when a power generation provider&lt;br /&gt;
offers money to a personnel who desperately needs financial help to modify the data. The&lt;br /&gt;
methods to modify peak usage is similar to modifying pricing [12].&lt;br /&gt;
&lt;br /&gt;
=== Attempt burglary ===&lt;br /&gt;
Apart from energy theft, attackers can make money by exploiting the AMI to gain information&lt;br /&gt;
on a target so that they can attempt a burglary. As mentioned previously, the data&lt;br /&gt;
obtained by a smart meter specifically the energy consumption data can be used to monitor&lt;br /&gt;
or spy on a particular household. The information once hacked tells the attacker if there is&lt;br /&gt;
anyone home at that time. It can also be plotted on to a graph and analysed to learn about&lt;br /&gt;
the household’s daily routine or show if the household is on vacation.&lt;br /&gt;
The target chosen has to be someone who is wealthy as the effort put into this method for&lt;br /&gt;
attempting burglary may not be the most efficient. One way to be able to identify a wealthy&lt;br /&gt;
household as oppose to a not so wealthy household is to also monitor the energy consumption&lt;br /&gt;
data. If a particular household uses more energy than an average household, means that&lt;br /&gt;
money is not an issue for that household. Moreover, the graph also shows the number of&lt;br /&gt;
appliances available in that household. Different peaks of the graph show different types of&lt;br /&gt;
appliances. All of this can be done by just obtaining the energy consumption data.&lt;br /&gt;
&lt;br /&gt;
=== Nation state attack ===&lt;br /&gt;
The AMI can also be exploited by large criminal enterprises whose goal may not just be the&lt;br /&gt;
AMI system but to cause harm or disturbance to the surrounding. These organisations could&lt;br /&gt;
plan to cause a disturbance in the power grid so that their final motives could succeed. The&lt;br /&gt;
terrorist can hack via the consumers end and slowly work their way up to the AMI head end&lt;br /&gt;
by hacking wireless communication links [12]. Furthermore, the terrorists can also exploit&lt;br /&gt;
the weak security for AMI connectivity. The motives of this terrorists could be broken down&lt;br /&gt;
into two groups; terror attack and manipulating the society.&lt;br /&gt;
&lt;br /&gt;
==== Terror attack ====&lt;br /&gt;
Terrorists can target the power generation through the AMI system to cause a blackout so&lt;br /&gt;
that their planned bombings could take place. The AMI system allows the utility provider&lt;br /&gt;
to switch off any flow of electricity to a household if the electric bill is overdue. This feature&lt;br /&gt;
also known as disconnect commands can be taken advantage by the terrorists where once&lt;br /&gt;
hacked into the AMI head end, they can send an off command to any large area. Once a&lt;br /&gt;
blackout occurs and the terrorist attack, the emergency response could be slow. The police and fire department along with the ambulance would be busy dealing with the blackout and&lt;br /&gt;
could have a shortage of emergency forces to respond to an attack later.&lt;br /&gt;
&lt;br /&gt;
==== Manipulating the society ====&lt;br /&gt;
An attack which involves manipulating the society may not seem reliable but the effects&lt;br /&gt;
of it could cause emotional distress, behaviour changes and internal conflicts between the&lt;br /&gt;
public and the government. The AMI system can be hacked by the terrorist and can modify&lt;br /&gt;
the billing information of the consumers. This can cause economic issues among the public&lt;br /&gt;
whereby the poor get poorer and people working in the electricity field get richer. When&lt;br /&gt;
the public are pressured by issues regarding financial and economic instability, they tend to&lt;br /&gt;
blame it on the government, and when the government does not appeal to the public, protest&lt;br /&gt;
or even civil unrest could occur. This gives the attacker control on the lives of the society&lt;br /&gt;
and must be prevented. Furthermore, the attacker can use this as a political tool to shift&lt;br /&gt;
the tide to favour a political party during an election campaign for example.&lt;br /&gt;
&lt;br /&gt;
== Recommendations ==&lt;br /&gt;
This section aims to introduce a few important recommendations that could help mitigate&lt;br /&gt;
the cyber security issues present in the AMI system and to reduce the practicality of exploiting&lt;br /&gt;
the AMI system. Based on the practicality and severity analysis of the exploits, it is&lt;br /&gt;
important to first address and provide recommendations to the issue which has the highest&lt;br /&gt;
average of both practicality and severity.&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for tampering attacks ===&lt;br /&gt;
Tampering issues need to be addressed first because it is the base of all other threats hence,&lt;br /&gt;
solving tamper issues can slow down and mitigate other cyber threats in the AMI. It is crucial&lt;br /&gt;
for the public and personnel to be aware and fully understand the vulnerability of the AMI&lt;br /&gt;
system. Creating awareness is the first step towards mitigating cyber security threats. The&lt;br /&gt;
public and personnel need to be properly educated so that necessary precautions can be&lt;br /&gt;
taken. For example, an educated consumer will notice any abnormality when monitoring&lt;br /&gt;
their energy usage and will report it to the utility provider for investigation. Similarly, a welleducated&lt;br /&gt;
personnel will understand the importance of cyber security and knows which part&lt;br /&gt;
of the AMI system needs attention so that necessary security protocols can be implemented&lt;br /&gt;
or strengthen.&lt;br /&gt;
&lt;br /&gt;
For petty thefts and small groups of attackers, their main target would be the smart meter.&lt;br /&gt;
Hence, enforcing the security at the smart meter would be the first priority. There are several&lt;br /&gt;
recommendations to lower the threat level for tampering, one way is to strengthen the password&lt;br /&gt;
which is used to access the smart meter. However, the password can also be obtained&lt;br /&gt;
via monitoring the open as mentioned previously. Thus, proper security protection on the&lt;br /&gt;
password is essential. Furthermore, although modifying the firmware of the smart meter&lt;br /&gt;
requires a certain amount of expertise from the attacker, if the attacker is able to tamper&lt;br /&gt;
with the firmware, the results could be severe. Thus, it is recommended to design lockable&lt;br /&gt;
microcontrollers to prevent reinstallation of the firmware [11]. It is also recommended to&lt;br /&gt;
encrypt the firmware in the smart meter.&lt;br /&gt;
&lt;br /&gt;
The AMI communication network contains many nodes which when hacked can be used to&lt;br /&gt;
connect all other nodes, hence, all the nodes should be encrypted. Although encrypting&lt;br /&gt;
every node of the AMI network may seem sufficient, a stronger encryption is also needed to&lt;br /&gt;
avoid unnecessary cyber security threat. Stronger encryption would slow down the hacking&lt;br /&gt;
process of the attacker. The AMI network functions by constantly having to send and&lt;br /&gt;
receive signals thus attackers can take advantage of this feature. One way to discourage&lt;br /&gt;
attackers from launching a man-in-the-middle attack is to have all signals authenticated regardless of whether the signal is coming from the consumer or going out of the utility&lt;br /&gt;
provider. To reinforce this method, the authentication can be made stronger for example,&lt;br /&gt;
more complicated passwords or even biometrics.&lt;br /&gt;
&lt;br /&gt;
Despite all the enforcing of the security protocols, not all utility provider would follow the&lt;br /&gt;
same level of security measures, hence it is essential to have certain standards introduced.&lt;br /&gt;
For example, a standard on having a stronger security protocol could help the AMI system&lt;br /&gt;
mitigate small threats. These standards ensure that the AMI system has a minimum level of&lt;br /&gt;
cyber security measures. However, a problem arises because the standards need to satisfy all&lt;br /&gt;
the relevant stakeholders. This means that the stakeholders need to agree upon a common&lt;br /&gt;
protocol and the level of cyber security. It is not as straightforward as it is for all the&lt;br /&gt;
stakeholders to come to terms, as each stakeholder has a different view and requirement on&lt;br /&gt;
the issue and only look to benefit themselves.&lt;br /&gt;
&lt;br /&gt;
Additionally, legislations are important as it forces the implementers to take necessary cyber&lt;br /&gt;
security precautions when designing the AMI system. These standards can then be implemented&lt;br /&gt;
in one of the legislations to make it mandatory for the AMI system. Legislations&lt;br /&gt;
can be used to solve the problem regarding different stakeholders requirement. When the&lt;br /&gt;
government is more involved in regulating the cyber security in AMI, it forces all other&lt;br /&gt;
stakeholders to take the same cyber security precautions.&lt;br /&gt;
&lt;br /&gt;
===  Recommendations for insider attacks ===&lt;br /&gt;
Utility provider who take insider attacks for granted could face serious financial consequences.&lt;br /&gt;
To prevent this, it is essential to create a certain level of awareness within the utility provider.&lt;br /&gt;
The awareness could include educating personnel regarding insider threats and to mention&lt;br /&gt;
the possibility of one to occur. Most of the problem with insider threats are that when&lt;br /&gt;
the issue has finally been found, it is already too late. Thus, when personnel are aware&lt;br /&gt;
of such threats, any suspicious activity or mismatch pricing information will be reported&lt;br /&gt;
immediately.&lt;br /&gt;
Moreover, the utility provider could perform frequent audit check ups or software integrity&lt;br /&gt;
testing on the system. This allows, any modified data internally to be detected and actions&lt;br /&gt;
can be taken. In addition to audit check ups, engineers at the AMI head end should also carry&lt;br /&gt;
out regular cyber security tests to keep the cyber security protocols up to date. As the AMI&lt;br /&gt;
system is constantly evolving, new technologies will be integrated, and the cyber security will&lt;br /&gt;
contain more loopholes and susceptible to attacks. These tests can help address this issue&lt;br /&gt;
because when the engineer runs the security tests on the system and it does not perform&lt;br /&gt;
well, it will then be notified so that a better cyber security protocol can be implemented.&lt;br /&gt;
Similar to the recommendation for tampering issue, the commands present in the utility provider needs to be authenticated and with a stronger authentication. Insiders can issue&lt;br /&gt;
their own commands when they have gotten in to the communication network of the AMI&lt;br /&gt;
system. By authenticating the commands, the insider would require bypassing the authentication&lt;br /&gt;
which means it is less efficient to hack.&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for billing others and burglary ===&lt;br /&gt;
The cyber-attack of billing others and burglary involved in first obtaining the information&lt;br /&gt;
of the consumer. Hence as mentioned previously, one recommendation is to anonymise the&lt;br /&gt;
data of the consumer. When the consumers information is anonymous, it is harder for the&lt;br /&gt;
hacker to track back the information hacked from the network to the original consumer. For&lt;br /&gt;
the case of billing others, extra recommendations are required and are similar to tampering&lt;br /&gt;
which is enforcing the security protocols at the smart meter and at the nodes throughout&lt;br /&gt;
the network. Additionally, the meter IP of each household should also not be exposed to&lt;br /&gt;
the open.&lt;br /&gt;
&lt;br /&gt;
=== Recommendations for nation state attack ===&lt;br /&gt;
Nation state attack is probably the hardest threat to mitigate given the commitment and&lt;br /&gt;
resources of the attacker. Nevertheless, there are a few recommendations to slow down such&lt;br /&gt;
attacks or reduce the practicality of the attack so that the AMI system is a less tempting target.&lt;br /&gt;
The utility provider could implement firewalls within the AMI network to help prevent&lt;br /&gt;
the attackers from using consumer end to attack. A combination of the recommendations&lt;br /&gt;
mentioned above and the recommendations here will be able to mitigate if not slow down a&lt;br /&gt;
terrorist attack from occurring.&lt;br /&gt;
&lt;br /&gt;
The nation state attack which involved manipulating of behaviour can be mitigated with&lt;br /&gt;
awareness similar to the recommendation in tampering attacks. Educating the public and&lt;br /&gt;
personnel on the possibility of such an attack would not only make the public more vigilant,&lt;br /&gt;
but actions can be taken if such an event occurs.&lt;br /&gt;
&lt;br /&gt;
== Conclusions ==&lt;br /&gt;
&lt;br /&gt;
The current standard grid is slowly reaching its lifetime with many problems including&lt;br /&gt;
blackouts, this calls for a need to transition into a smart grid. South Australia which is&lt;br /&gt;
currently facing with energy crisis is an example which could benefit from a smart grid. The&lt;br /&gt;
purpose of this research project is to identify the cyber security issues present in the AMI,&lt;br /&gt;
determine the requirements to reduce the cyber security issues, analyse the impact of the&lt;br /&gt;
issues on the AMI, and to provide recommendations to the cyber threats.&lt;br /&gt;
The introduction of communication networks within the AMI architecture has caused several&lt;br /&gt;
cyber security issues. These cyber security issues are first identified and explained so that a&lt;br /&gt;
list of possible attacks on the AMI can be determined. Each cyber security issue is associated&lt;br /&gt;
with a type of attacker. It is essential to address the types of attacker so that necessary&lt;br /&gt;
precautions can be taken towards them.&lt;br /&gt;
&lt;br /&gt;
The cyber security issues can be minimised to an extent by following certain requirements.&lt;br /&gt;
The regulatory requirements are essential in keeping the design of cyber security in the&lt;br /&gt;
AMI up to date and works in conjunction with standards. Additionally, cyber security&lt;br /&gt;
requirements can be used when implementing new security measures to minimise cyber&lt;br /&gt;
security issues. It allows cyber security issues to be grouped up in to specific category&lt;br /&gt;
of security requirements so that design engineers can easily implement security measures.&lt;br /&gt;
Educating the public and personnel is one requirement not to be overlooked as the effect&lt;br /&gt;
of such requirement can greatly impact the AMI system. It helps provide awareness among&lt;br /&gt;
the public and personnel so that necessary precautions can be taken before the need for it&lt;br /&gt;
arises.&lt;br /&gt;
&lt;br /&gt;
This research explores the consequences of cyber security issues which is the exploitation&lt;br /&gt;
of the AMI. There are many cyber threats that could or could not occur depending on the&lt;br /&gt;
practicality of the attacks which will be analysed and given a grade. The AMI is particularly&lt;br /&gt;
vulnerable to tampering attacks and insider threat while billing others and burglary are less&lt;br /&gt;
likely to occur. The possibility for a nation state attack to occur on the other hand varies&lt;br /&gt;
depending on the situation and motives of the attacker. However, it should not be taken&lt;br /&gt;
lightly as the impact on a nation state attack is severe.&lt;br /&gt;
&lt;br /&gt;
Several recommendations have been made in order to reduce the cyber threats and to ensure&lt;br /&gt;
the AMI is less vulnerable to cyber attacks. It is mentioned that tampering attacks represent&lt;br /&gt;
the base of all other threats, hence a proper mitigation method for tampering attacks can&lt;br /&gt;
be used as a reference point to implement other recommendations. It is crucial to address&lt;br /&gt;
the cyber security issues present in the AMI at an early stage of the design process as the&lt;br /&gt;
consequences of a cyber attack is not to be taken lightly. As for existing AMI infrastructures,&lt;br /&gt;
this project can help create certain awareness so that the necessary precautions can be taken.&lt;br /&gt;
&lt;br /&gt;
As the concept of a smart grid is still fairly new to many countries, this research project&lt;br /&gt;
can also shed some light on the cyber security issues in AMI. This project hopes to provide&lt;br /&gt;
engineers and personnel a general reference and guide when implementing cyber security of&lt;br /&gt;
an AMI system.&lt;br /&gt;
&lt;br /&gt;
== Reference ==&lt;br /&gt;
[1] J. Liu, Y. Xiao, S. Li, W. Liang and C. Chen, “Cyber Security and Privacy Issues in&lt;br /&gt;
Smart Grids,” in IEEE Communications Surveys &amp;amp; Tutorials, vol. 14, no. 4, Fourth&lt;br /&gt;
Quarter 2012.&lt;br /&gt;
[2] F. M. Cleveland, “Cyber Security Issues for Advanced Metering Infrastructure (AMI),”&lt;br /&gt;
Proceedings of the IEEE Power and Energy Society General Meeting: Conversion and&lt;br /&gt;
Delivery of Electrical Energy in the 21st Century, pp. 15, 2008&lt;br /&gt;
[3] N.Liu, J.Chen, L.Zhu, J.Zhang and Y.He, “A Key Management Scheme for Secure Communications&lt;br /&gt;
of Advanced Metering Infrastructure in Smart Grid,” in IEEE Transactions&lt;br /&gt;
on Industrial Electronics, vol. 60, no. 10, October 2013.&lt;br /&gt;
[4] R. Berthier, W. H. Sanders and H. Khurana, “Intrusion Detection for Advanced Metering&lt;br /&gt;
Infrastructures: Requirements and Architectural Directions,” 2010 First IEEE&lt;br /&gt;
International Conference on Smart Grid Communications, Gaithersburg, MD, 2010, pp.&lt;br /&gt;
350-355.&lt;br /&gt;
[5] Y.Yan, Y.Qian and H.Sharif, “A Secure and Reliable In-network Collaborative Communication&lt;br /&gt;
Scheme for Advanced Metering Infrastructure in Smart Grid,” in IEEE WCNC&lt;br /&gt;
2011.&lt;br /&gt;
[6] R. R. Mohassel, A. S. Fung, F. Mohammadi and K. Raahemifar, “A survey on advanced&lt;br /&gt;
metering infrastructure and its application in Smart Grids,” in IEEE 27th Canadian&lt;br /&gt;
Conference on Electrical and Computer Engineering (CCECE), Toronto, ON, 2014, pp.&lt;br /&gt;
1-8.&lt;br /&gt;
[7] N. Saputro and K. Akkaya, “On preserving user privacy in Smart Grid advanced metering&lt;br /&gt;
infrastructure applications,” Security and Communication Networks, vol. 7, no.&lt;br /&gt;
1, pp. 206-220, 2013.&lt;br /&gt;
[8] P. Deng and L. Yang, “A secure and privacy-preserving communication scheme for Advanced&lt;br /&gt;
Metering Infrastructure,” 2012 IEEE PES Innovative Smart Grid Technologies&lt;br /&gt;
(ISGT), Washington, DC, 2012, pp. 1-5&lt;br /&gt;
[9] R. Berthier, W. H. Sanders and H. Khurana, “Intrusion Detection for Advanced Metering&lt;br /&gt;
Infrastructures: Requirements and Architectural Directions,” 2010 First IEEE&lt;br /&gt;
International Conference on Smart Grid Communications, Gaithersburg, MD, 2010, pp.&lt;br /&gt;
350-355.&lt;br /&gt;
[10] R. Shein, “Security Measures for Advanced Metering Infrastructure Components,” 2010&lt;br /&gt;
Asia-Pacific Power and Energy Engineering Conference, Chengdu, 2010, pp. 1-3.&lt;br /&gt;
[11] K. Adak, J. Mohamed and S. H. Darapuneni, “Advanced Metering Infrastructure Security,”&lt;br /&gt;
A Capstone Paper, University of Colorado, Boulder, 2010.&lt;br /&gt;
[12] R. C. Parks, “Advanced Metering Infrastructure Security Considerations,” Sandia Report,&lt;br /&gt;
Sandia National Laboratories, 2007&lt;br /&gt;
[13] S. McLaughlin, D. Podkuiko, and P. McDaniel, “Energy theft in the advanced metering&lt;br /&gt;
infrastructure,” in Proc. the 4th International Conference on Critical Information&lt;br /&gt;
Infrastructures Security, Springer, 2010, pp. 176-187&lt;br /&gt;
[14] R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen and X. S. Shen, “Energy-theft detection&lt;br /&gt;
issues for advanced metering infrastructure in smart grid,” in Tsinghua Science and&lt;br /&gt;
Technology, vol. 19, no. 2, pp. 105-120, April 2014.&lt;br /&gt;
[15] Y. Mo, T. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig and B. Sinopoli, “CyberPhysical&lt;br /&gt;
Security of a Smart Grid Infrastructure,” in Proceedings of the IEEE, vol. 100,&lt;br /&gt;
no. 1, pp. 195-209, Jan. 2012.&lt;br /&gt;
[16] S. Asri and B. Pranggono, “Impact of Distributed Denial-of-Service Attack on Advanced&lt;br /&gt;
Metering Infrastructure,” Wireless Personal Communications, vol. 83, no. 3, pp. 2211-&lt;br /&gt;
2223, 2015.&lt;br /&gt;
[17] P. Yi, T. Zhu, Q. Zhang, Y. Wu and L. Pan, “Puppet attack: A denial of service&lt;br /&gt;
attack in advanced metering infrastructure network,” Journal of Network and Computer&lt;br /&gt;
Applications, vol. 59, pp. 325-332, 2016.&lt;br /&gt;
[18] K. Curtis, in Speech to Thinkfuture Smart Infrastructure Conference 2010 on smart&lt;br /&gt;
infrastructure and privacy, Parliament House, Canberra, 2010.&lt;br /&gt;
[19] U.S. Department of Energy, “Smart Grid Legislative and Regulatory Policies and Case&lt;br /&gt;
Studies”, U.S. Energy Information Administration, Washington, D.C., 2011.&lt;br /&gt;
[20] “Australian Privacy Principles— Office of the Australian Information Commissioner&lt;br /&gt;
- OAIC”, Oaic.gov.au, 2017. [Online]. Available: https://www.oaic.gov.au/privacylaw/privacy-act/australian-privacy-principles.&lt;br /&gt;
[Accessed: 10- Sep- 2017].&lt;br /&gt;
[21] Australian Privacy Principles, fact sheet 17. Australia: Office of the Australian Information&lt;br /&gt;
Commissioner, 2014.&lt;br /&gt;
[22] Australian Privacy Principles - a summary for APP entities. Australia: Office of the&lt;br /&gt;
Australian Information Commissioner, 2014.&lt;br /&gt;
[23] J. Lazar and M. McKenzie, “Australian Standards for Smart Grids Standards&lt;br /&gt;
Roadmap”, Standards Australia, pp. 1-36, 2012.&lt;br /&gt;
[24] E. Egozcue, D. Rodrguez, J. Ortiz, V. Villar and L. Tarrafeta, “Smart Grid Security”,&lt;br /&gt;
European Network and Information Security Agency, 2012.&lt;br /&gt;
[25] “Stop Smart Meters Australia”, Stop Smart Meters Australia, 2017. [Online]. Available:&lt;br /&gt;
https://stopsmartmeters.com.au/. [Accessed: 29- Sep- 2017].&lt;br /&gt;
[26] “Cyber Security — Energy Networks Australia”, Energynetworks.com.au, 2017. [Online].&lt;br /&gt;
Available: http://www.energynetworks.com.au/cyber-security. [Accessed: 18-&lt;br /&gt;
Sep- 2017].&lt;br /&gt;
[27] B. Murrill, E. Liu and R. Thompson II, “Smart Meter Data: Privacy and Cybersecurity”,&lt;br /&gt;
Congressional Research Service, 2012.&lt;br /&gt;
[28] “Smart Meters - Advanced Metering Infrastructure Cost Benefit&lt;br /&gt;
Analysis”, Smartmeters.vic.gov.au, 2017. [Online]. Available:&lt;br /&gt;
http://www.smartmeters.vic.gov.au/about-smart-meters/reports-andconsultations/advanced-metering-infrastructure-cost-benefit-analysis.&lt;br /&gt;
[Accessed:&lt;br /&gt;
29- Sep- 2017].&lt;br /&gt;
[29] C.King, “Advanced Metering Infrastructure (AMI), Overview of System Features and&lt;br /&gt;
Capabilities”, 2004&lt;/div&gt;</summary>
		<author><name>A1660770</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167c_Smart_Grid_Security&amp;diff=8965</id>
		<title>Projects:2017s1-167c Smart Grid Security</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167c_Smart_Grid_Security&amp;diff=8965"/>
		<updated>2017-10-28T09:06:35Z</updated>

		<summary type="html">&lt;p&gt;A1660770: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Project Team ==&lt;br /&gt;
Juin Hao Yau&lt;br /&gt;
&lt;br /&gt;
== Supervisor ==&lt;br /&gt;
Dr Matthew Sorell&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
As our technology advances forward at a rapid rate, the current power grid use today has&lt;br /&gt;
not been significantly modified or improved. The current power grid is not reliable and has&lt;br /&gt;
been causing blackouts, voltage sags and other numerous problems over the years. A similar&lt;br /&gt;
but better electric grid called smart grids are replacing the standard electric infrastructure&lt;br /&gt;
but at a very slow pace. What differs from a smart grid and the standard electric grid&lt;br /&gt;
is that a smart grid is more reliable, manageable, scalable, cost efficient and has two-way&lt;br /&gt;
communication between the utility operator and the consumer.&lt;br /&gt;
&lt;br /&gt;
A smart grid consists of different entities connected by multiple systems. Advanced metering&lt;br /&gt;
infrastructure (AMI) is a system component within the smart grid which connects&lt;br /&gt;
smart meters from the consumers to the operators and vice versa. However, smart grids are&lt;br /&gt;
vulnerable to cyber security attacks because of its large use of communication technology.&lt;br /&gt;
This cyber security issues are also present in the AMI. If the cyber security issues are not&lt;br /&gt;
addressed well, it could cause the AMI to be vulnerable to cyber threats and have serious&lt;br /&gt;
consequences.&lt;br /&gt;
AMI system plays an important role in the smart grid and with its weak cyber security protocols,&lt;br /&gt;
it naturally becomes attackers first target. This research will cover the issues of cyber&lt;br /&gt;
security in AMI, determine the requirements to mitigate the issues, discuss about the cyber&lt;br /&gt;
threats resulting from the issues and to finally draw a conclusion by giving recommendations.&lt;br /&gt;
&lt;br /&gt;
== Motivation ==&lt;br /&gt;
South Australia has been recently facing with energy crisis. Approximately 50% of South&lt;br /&gt;
Australias energy comes from gas, 45% from wind energy and the remaining from solar, diesel&lt;br /&gt;
and brown coal from Victoria. Wind energy has been proved to be not very reliable during&lt;br /&gt;
the blackout on September 2016 and due to the closure of a few coal plants in Victoria, the&lt;br /&gt;
demand for gas energy increases. One solution proposed was to use battery storage as a&lt;br /&gt;
short-term fix. However, the upfront cost for battery storage is too expensive and is not as&lt;br /&gt;
efficient compared to other methods.&lt;br /&gt;
&lt;br /&gt;
A long-term solution for the energy crisis is to convert the traditional standard grid into a&lt;br /&gt;
smart grid. By doing so, the operators and consumers are able to communicate with each&lt;br /&gt;
other and control the energy flow during high demand. AMI plays an important role in&lt;br /&gt;
assisting the smart grid to connect the operators and consumers. Other than that, a smart&lt;br /&gt;
grid can recover from a blackout by rerouting another transmission line.&lt;br /&gt;
&lt;br /&gt;
Furthermore, smart grids can help reduce energy cost for the consumers as the smart meters&lt;br /&gt;
installed at the end user allows the consumer to monitor energy prices in near real time.&lt;br /&gt;
With the AMI implemented, the utility provider no longer needs to send out the meter man&lt;br /&gt;
to measure the energy usage once every few months, instead they can bill the consumers&lt;br /&gt;
directly and more efficiently. For the utility provider, this saves cost on fuel for sending out&lt;br /&gt;
a meter man, and for the consumer, they no longer need to worry about estimated billing&lt;br /&gt;
when the meter man has no access to the meter.&lt;br /&gt;
&lt;br /&gt;
== Purpose of the project ==&lt;br /&gt;
The purpose of this project is to carry out an extensive research, discuss and provide an&lt;br /&gt;
overall view on the Cyber Security Issues in AMI and can then be used as a general reference&lt;br /&gt;
for future work. The aim is to first identify the current issues and causes from past&lt;br /&gt;
research, discuss about the issues, list out the regulatory requirements and the cyber security&lt;br /&gt;
requirements. This research will also include ways an attacker can exploit the AMI and the&lt;br /&gt;
recommended resolutions.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
=== What is a Smart Grid? ===&lt;br /&gt;
Over the years the term smart grid has went through numerous changes, but in general it&lt;br /&gt;
is used to describe power grids with enhanced communication and sensing system which&lt;br /&gt;
improves the overall reliability. According to Liu et al. a smart grid is capable of analysing&lt;br /&gt;
power usage information in real time [1]. What makes a smart grid more reliable than the&lt;br /&gt;
standard power grid is that any outage in an area due to bad weather can be automatically&lt;br /&gt;
rerouted from another working distribution line. This feature is called distribution intelligence.&lt;br /&gt;
A smart grid is also capable of integrating different energy sources. This allows&lt;br /&gt;
renewable and non-renewable energy to work well together.&lt;br /&gt;
&lt;br /&gt;
One important feature of a smart grid is the two-way communication between the consumer&lt;br /&gt;
and the operator unlike the standard grid which only flows one way. What this means is&lt;br /&gt;
that electricity is not only flowing from the operator to the consumer but information from&lt;br /&gt;
the consumer is also flowing back to the operator. This two-way communication allows the&lt;br /&gt;
operator to adjust the energy according to the consumer needs.&lt;br /&gt;
&lt;br /&gt;
=== What is Advanced Metering Infrastructure (AMI)? ===&lt;br /&gt;
AMI is one of the major system within the smart grid which is used to connect the consumer&lt;br /&gt;
and the operator with a two way communication link. Its main purpose is to measure,&lt;br /&gt;
collect and analyse power usage data of consumers. The AMI is composed of different&lt;br /&gt;
technologies such as smart meters, Meter Data Management System (MDMS) and consumers&lt;br /&gt;
area network (HAN). Through AMI, operators are able to obtain electricity price in real time&lt;br /&gt;
while the consumers will be able to have control on their power usage and are able to see&lt;br /&gt;
real-time electricity prices [1].&lt;br /&gt;
&lt;br /&gt;
=== What is a Smart Meter? ===&lt;br /&gt;
A Smart Meter is an electronic meter installed at the consumer’s end which is able to monitor&lt;br /&gt;
and collect energy information of the consumer and then send it to the operator periodically,&lt;br /&gt;
around every 30 minutes or less. Different from a electromechanical meter a smart meter&lt;br /&gt;
contains bi-directional communication between the consumer and the utility provider which&lt;br /&gt;
sends usage information back to the utility. The smart meter is a main component in the&lt;br /&gt;
AMI.&lt;br /&gt;
&lt;br /&gt;
=== What is Home Area Network (HAN)? ===&lt;br /&gt;
The HAN works as a network to connect the consumers appliances together. Such appliances&lt;br /&gt;
include, computers, smart televisions, lights, security systems, etc. This allows the appliances&lt;br /&gt;
to communicate with each other.&lt;br /&gt;
&lt;br /&gt;
=== What is Meter Data Management System (MDMS)? ===&lt;br /&gt;
The Meter Data Management System is located and integrated at the consumer end. Information&lt;br /&gt;
and data obtained from the consumer via smart meters are stored and managed in&lt;br /&gt;
the MDMS software. It also provides report statistics and validation.&lt;br /&gt;
&lt;br /&gt;
== Cyber Security Issues ==&lt;br /&gt;
This introduction of the communication technology to the architecture caused&lt;br /&gt;
cyber security vulnerabilities in the AMI. Hence this section aims to address cyber security issues in AMI from previous research.&lt;br /&gt;
&lt;br /&gt;
=== Privacy Issues ===&lt;br /&gt;
There are many concerns on privacy with the installation of a smart meter. If the AMI&lt;br /&gt;
was to be attacked or hacked, two main issues of privacy can occur; real time spying and&lt;br /&gt;
burglary, and identity theft [16].&lt;br /&gt;
&lt;br /&gt;
==== Real time spying and burglary ====&lt;br /&gt;
According to Mohassel et al., the smart meter is able to collect energy consumption data&lt;br /&gt;
in a shorter interval of around 20 mins average compared to the traditional meter which&lt;br /&gt;
is only done during the billing period. These shorter readings from the smart meter can&lt;br /&gt;
then be used to generate a profile of the consumer which for example can include number of&lt;br /&gt;
occupant and type of alarm system [6, 10]. This is backed up by Saputro and Akkaya where&lt;br /&gt;
they mentioned that from the amount of information the Smart Meter obtains, it can show&lt;br /&gt;
more than just the power usage of the consumer. The energy consumption information can&lt;br /&gt;
show if the consumer is at home or not by load monitoring.&lt;br /&gt;
&lt;br /&gt;
Moreover, the operating time of an appliance can also be determined from the smart meter.&lt;br /&gt;
Additionally, if the energy consumption data is analysed over a period, a detailed graph can&lt;br /&gt;
be produced [7].&lt;br /&gt;
&lt;br /&gt;
Attackers are able to know what appliances were used on what&lt;br /&gt;
specific time of the day and the consumers daily routine can then be figured out. The graph&lt;br /&gt;
can be use as a surveillance on the consumer and can even be use to coordinate a burglary.&lt;br /&gt;
A burglar can know when to attack based on the graph, for example, the graph will have&lt;br /&gt;
no spike if the occupant went for a holiday. Other than that, this information can now be&lt;br /&gt;
obtained remotely without the need to be present at the target’s property.&lt;br /&gt;
&lt;br /&gt;
==== Identity theft ====&lt;br /&gt;
&lt;br /&gt;
Identity theft is an issue whereby the attacker uses the consumer’s identity to gain benefit&lt;br /&gt;
financially. A smart meter obtains more than just the energy consumption information from&lt;br /&gt;
a consumer compared to the traditional meter. The list of personal information obtained&lt;br /&gt;
by the smart meter and stored in the grid according to Liu et al. is as follows: consumers&lt;br /&gt;
name, phone number, home address, transaction history, meter reading, HAN, meter IP and&lt;br /&gt;
service provider [1]. This can cause serious privacy issues if the data in the Smart Meter&lt;br /&gt;
falls into the wrong hands.&lt;br /&gt;
&lt;br /&gt;
Based on Saputro and Akkaya there are two ways an attacker can obtain the energy consumption information. Firstly, an attack can occur when transmitting the data from the&lt;br /&gt;
consumer to the utility. Secondly, it can either be done at the utility site or the consumer&lt;br /&gt;
site where the smart meter is present [7]. Privacy issue may not be a serious problem for&lt;br /&gt;
some people but a surprisingly large amount of people are concern on privacy which has led&lt;br /&gt;
to activist being formed to stop the installation of smart meters. To ensure that the public&lt;br /&gt;
are comfortable with smart meters and trust the utility, the data in the smart meter needs&lt;br /&gt;
to be protected via cyber security measures [8].&lt;br /&gt;
&lt;br /&gt;
===  Denial-of-Service issues ===&lt;br /&gt;
Another form of threat which is fairly common is a Denial-of-Service attack. Based on Mo&lt;br /&gt;
et al. a DoS attack is when the attackers send false request to the network to cause a&lt;br /&gt;
disruption or to temporarily make the service unavailable [15]. A successful DoS attack can&lt;br /&gt;
cause an issue at the consumer site. From Cleveland, the consumer can get delayed pricing&lt;br /&gt;
information on their smart meters which can cause financial problems [2]. Another major&lt;br /&gt;
problem from a DoS attack is when there is an outage in an area, the grid is unable to&lt;br /&gt;
restore power to it on time via the AMI [2]. &lt;br /&gt;
&lt;br /&gt;
Based on Asri and Pranggono there are three&lt;br /&gt;
ways of executing a DoS attack, flooding attacks, vulnerability attacks and a new way of&lt;br /&gt;
attack called puppet attack introduced by Yi et al. [16, 17]. Flooding attack is a form of&lt;br /&gt;
Distributed Denial-of-Service attack (DDoS) where the attacker sends several SYN packet&lt;br /&gt;
to an invalid address an causes an error in the system [16]. Vulnerability attacks are done&lt;br /&gt;
by exploiting exposed software at the target which result in overuse of the CPU memory.&lt;br /&gt;
Puppet attack on the other hand is similar to the flooding attack, however puppet attacks&lt;br /&gt;
are less likely to be detected [17].&lt;br /&gt;
&lt;br /&gt;
===  Unauthorized access and modification issues ===&lt;br /&gt;
Another major threat in the AMI is when attackers issue their own commands into the&lt;br /&gt;
AMI or modify it. The types of different attacks can be classified into five different threats;&lt;br /&gt;
masquerade, firmware modification, buffer overflow, man-in-the-middle attack, and energy&lt;br /&gt;
theft.&lt;br /&gt;
&lt;br /&gt;
==== Masquerade ====&lt;br /&gt;
From previous research, masquerade is shown as a threat where attackers impersonate the&lt;br /&gt;
control centre at the AMI headend [11]. As mentioned by Parks, the attackers can issue a&lt;br /&gt;
shutdown on multiple Smart Meters causing a high power without demand from the power&lt;br /&gt;
company. The power company will then lower the power and when the smart meters are&lt;br /&gt;
15&lt;br /&gt;
turned back on, the lack of power can cause a blackout [12]. Masquerade can be done through&lt;br /&gt;
authentication bypass. Another possible masquerade threat is at the consumers site where&lt;br /&gt;
the attackers can send false alarms from multiple smart meters to the control centre. The&lt;br /&gt;
result of this is the control centre will send maintenance team to those smart meters and&lt;br /&gt;
can cause performance and delay issues [11]. &lt;br /&gt;
&lt;br /&gt;
Other than small threats, masquerade can be&lt;br /&gt;
used as a large-scale attack and can cause havoc nationwide as mentioned by Parks [12]. An&lt;br /&gt;
example of a large-scale attack is terrorist can cause power instability or blackout during&lt;br /&gt;
their own bombing attack.&lt;br /&gt;
&lt;br /&gt;
==== Firmware modification ====&lt;br /&gt;
A threat also mentioned in the research of Adak et al. is firmware modification. This threat&lt;br /&gt;
is a major concern because attackers can modify the firmware remotely and once modified,&lt;br /&gt;
the AMI meter can function however the attacker wants. Although modifying the firmware&lt;br /&gt;
of the AMI is not an easy task and requires a certain amount of expertise, it should not be&lt;br /&gt;
taken lightly as it can have serious consequences [11].&lt;br /&gt;
&lt;br /&gt;
==== Firmware modification ====&lt;br /&gt;
A threat also mentioned in the research of Adak et al. is firmware modification. This threat&lt;br /&gt;
is a major concern because attackers can modify the firmware remotely and once modified,&lt;br /&gt;
the AMI meter can function however the attacker wants. Although modifying the firmware&lt;br /&gt;
of the AMI is not an easy task and requires a certain amount of expertise, it should not be&lt;br /&gt;
taken lightly as it can have serious consequences [11].&lt;br /&gt;
&lt;br /&gt;
==== Buffer overflow ====&lt;br /&gt;
According to Adak et al., buffer overflow is a very common type of attack these days. As the&lt;br /&gt;
name implies, the attacker can overflow the buffer in the AMI meter and can cause damage&lt;br /&gt;
to the data within the AMI or leak them [11]. The memory addresses gets modified during&lt;br /&gt;
a buffer attack which can cause system freeze.&lt;br /&gt;
&lt;br /&gt;
==== Man-in-the-middle Attack ====&lt;br /&gt;
Man-in-the-middle attack is also a common cyber threat towards the AMI. This can be done&lt;br /&gt;
during the transmitting of data over the network. The attackers can implant false information&lt;br /&gt;
in the network from any node. The backhaul link is one way where the attackers can interfere&lt;br /&gt;
and also obtain the cryptographic key. [6] A few consequences of a man-in-the-middle attack&lt;br /&gt;
based on Liu et al. are modification of the billing data, financial loss, equipment damage&lt;br /&gt;
and human risks.&lt;br /&gt;
&lt;br /&gt;
==== Energy theft ====&lt;br /&gt;
Lastly, energy theft has always been around since the first standard grids are introduced&lt;br /&gt;
and are still present in Smart Grids. According to McLaughlin et al. there are 2 types of&lt;br /&gt;
attackers; consumers and organized crime [13]. Customers are the main attackers to try&lt;br /&gt;
and steal energy via tampering the meter. Stealing energy by tampering the smart meter is&lt;br /&gt;
harder compared to the traditional meter, however due to the advancement of AMI, ways on&lt;br /&gt;
how to steal energy from smart meters can be easily obtained online [14]. Organized crime&lt;br /&gt;
is another culprit of energy theft. As mentioned by McLaughlin, these organizations are&lt;br /&gt;
professional hackers who take advantage of the AMI system to steal large amount of energy&lt;br /&gt;
[13].&lt;br /&gt;
&lt;br /&gt;
== Regulatory Requirements ==&lt;br /&gt;
The cyber security issues in the AMI can be minimised by introducing regulatory requirements&lt;br /&gt;
and/or legislations which creates certain restrictions on the AMI for example the&lt;br /&gt;
handling of consumer’s data [18]. This section covers the current regulatory requirements&lt;br /&gt;
used in the AMI system and will also include suggested new laws to improve the cyber&lt;br /&gt;
security of the AMI.&lt;br /&gt;
&lt;br /&gt;
=== Policy for privacy ===&lt;br /&gt;
A smart meter records the energy consumption of the consumer every 30 minutes or less.&lt;br /&gt;
Hence, the information obtained by a smart meter can be very detailed and can show the&lt;br /&gt;
lifestyle of the consumer. There are rising privacy concerns among the consumers if the&lt;br /&gt;
information happens to fall onto the wrong hands or misused by the utility provider. Privacy&lt;br /&gt;
is a major issue which directly involves the consumer and hence need to be enforced. Based&lt;br /&gt;
on Australian law, the federal privacy act 1988 ensures that the consumer’s information&lt;br /&gt;
(name, signature, address, bank details, telephone number and date of birth) is protected.&lt;br /&gt;
This applies to the AMI system for example, when the smart meter collects the consumer’s&lt;br /&gt;
personal information, the utility provider is not allowed to share it to other third parties&lt;br /&gt;
without having the consent from the consumer. Other than that, the utility provider will&lt;br /&gt;
always ensure that the third party complies with the federal privacy act when the third party&lt;br /&gt;
request to obtain the consumer’s information.&lt;br /&gt;
&lt;br /&gt;
Moreover, the utility provider need to ensure the authenticity of the obtained consumer’s&lt;br /&gt;
personal information by ensuring the consumer updates their information regularly. On the&lt;br /&gt;
other hand, the information collected from the smart meter and kept by the utility provider&lt;br /&gt;
must be protected from unauthorised access. Another requirement to strengthen the privacy&lt;br /&gt;
of the consumer is the utility provider must conduct cyber security training for their staffs&lt;br /&gt;
and ensure frequent audits.&lt;br /&gt;
&lt;br /&gt;
Additionally, the federal privacy act contains the Australian Privacy Principles (APP), also&lt;br /&gt;
formerly known as National Privacy and Principles. APP explains the use and storage of&lt;br /&gt;
personal information and set restrains for organisations with 3 million Australian dollars or&lt;br /&gt;
more annual turnover [20]. There are additional protection on the installation and data of&lt;br /&gt;
the smart meter as stated in the National Electricity Rules.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Policy for unauthorized access and DoS ===&lt;br /&gt;
Aside from policy regarding privacy issues, law enforcing the cyber security to prevent unauthorized&lt;br /&gt;
access issues should also be prioritized. The AMI is responsible on the measurement&lt;br /&gt;
and collection of energy usage of the consumers, and is done through network transmission.&lt;br /&gt;
Hence, the AMI is exposed and can be vulnerable to cyber attacks if there are no regulations&lt;br /&gt;
on the cyber security.&lt;br /&gt;
&lt;br /&gt;
A few policies can be introduced to minimise cyber security issues within the AMI. For&lt;br /&gt;
example, a policy where the encryption of the information and cyber security protection of&lt;br /&gt;
the AMI and grid has to exceed a certain level of security. If such policy exists, this can&lt;br /&gt;
ensure that when the AMI is implemented, the design engineers follows a specific set of rules&lt;br /&gt;
and ensures that the cyber security is not easily penetrated.&lt;br /&gt;
&lt;br /&gt;
Additionally, the policy can also defend against unauthorized access by making sure meter&lt;br /&gt;
protocols are implemented and for each stage of the data transmission process between the&lt;br /&gt;
consumer and utility provider there contains encryption. Other ways to enforce the cyber&lt;br /&gt;
security in the AMI includes implementing passwords in the smart meters according to the&lt;br /&gt;
appropriate standards and the addition of firewalls to separate the AMI network from the&lt;br /&gt;
internet [19].&lt;br /&gt;
&lt;br /&gt;
==  Cyber Security Requirements ==&lt;br /&gt;
Cleveland mentioned that each cyber security issue can be grouped into their appropriate&lt;br /&gt;
security requirements. This bond between the security requirements and threats means&lt;br /&gt;
that solutions to the cyber security issues can be implemented easier instead of solving on&lt;br /&gt;
each individual threat. Below are four different technical security requirements and their&lt;br /&gt;
corresponding descriptions [2].&lt;br /&gt;
&lt;br /&gt;
=== Confidentiality ===&lt;br /&gt;
Cleveland mentioned that in AMI, confidentiality means that consumer’s information and&lt;br /&gt;
data is only available to the authorized operator. This is important as a consumer because&lt;br /&gt;
of privacy issues. Without confidentiality, attackers can obtain detailed information of the&lt;br /&gt;
consumers for example energy usage patterns. This energy usage pattern is able to give&lt;br /&gt;
attackers information on whether the consumer is at home or not and their daily routine.&lt;br /&gt;
To keep the consumer’s data confidential, either the AMI network needs to be encrypted&lt;br /&gt;
so that attackers cannot easily hack or the utility provider needs to ensure the data is not&lt;br /&gt;
shared to other third parties [2].&lt;br /&gt;
&lt;br /&gt;
=== Integrity ===&lt;br /&gt;
According to Cleveland, integrity is to ensure the information and data received by the&lt;br /&gt;
operator is from the correct consumer. This means that the data collected by the smart&lt;br /&gt;
meter must not be altered or modified without authorised permission. Attackers can hack&lt;br /&gt;
and pose as the consumers and give false information to the operator. An example is when&lt;br /&gt;
the attackers increases the electricity demand of multiple consumers and if the generator is&lt;br /&gt;
unable to supply that amount of power, a blackout can occur [2].&lt;br /&gt;
&lt;br /&gt;
=== Availability ===&lt;br /&gt;
Based on Cleveland, availability is to ensure that the consumer’s information and data is&lt;br /&gt;
always available to the authorized operator. This is especially important for smart meters&lt;br /&gt;
as compared to the traditional meters, because the traditional meters allows estimate billing&lt;br /&gt;
while the smart meters are not able to do that. Attackers can cause a Denial-of-Service in&lt;br /&gt;
the AMI where the operator can not access the consumers’ information when needed. This&lt;br /&gt;
can cause delayed information and affecting the service for the consumers. At the consumer’s&lt;br /&gt;
site, it can cause delay to pricing and can affect consumer financially [2].&lt;br /&gt;
&lt;br /&gt;
=== Accountability ===&lt;br /&gt;
Another important security requirement is accountability as noted by Mohassel et al. accountability&lt;br /&gt;
is when the entities do not deny receiving information or when the entity did&lt;br /&gt;
not receive information but say otherwise. The AMI is a large network and does not own&lt;br /&gt;
by an entity, instead it consists of different individuals. This means that it is crucial to&lt;br /&gt;
have synchronized timestamps for the data in the network by each entity. Weak focus on&lt;br /&gt;
accountability can result in financial issues because one entity can declare that the data has&lt;br /&gt;
been sent and accuse that it has been lost in the network [2, 6].&lt;br /&gt;
&lt;br /&gt;
== Human Factor Requirements ==&lt;br /&gt;
The cyber security issues in AMI cannot be solved with just technical and regulatory requirements.&lt;br /&gt;
As the AMI obtains information from the consumer, the community has to be&lt;br /&gt;
involved in reducing the issues. Additionally, requirement for personnel involved in the AMI&lt;br /&gt;
is also necessary and will be discussed.&lt;/div&gt;</summary>
		<author><name>A1660770</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167c_Smart_Grid_Security&amp;diff=8963</id>
		<title>Projects:2017s1-167c Smart Grid Security</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167c_Smart_Grid_Security&amp;diff=8963"/>
		<updated>2017-10-28T08:33:45Z</updated>

		<summary type="html">&lt;p&gt;A1660770: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Project Team ==&lt;br /&gt;
Juin Hao Yau&lt;br /&gt;
&lt;br /&gt;
== Supervisor ==&lt;br /&gt;
Dr Matthew Sorell&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
As our technology advances forward at a rapid rate, the current power grid use today has&lt;br /&gt;
not been significantly modified or improved. The current power grid is not reliable and has&lt;br /&gt;
been causing blackouts, voltage sags and other numerous problems over the years. A similar&lt;br /&gt;
but better electric grid called smart grids are replacing the standard electric infrastructure&lt;br /&gt;
but at a very slow pace. What differs from a smart grid and the standard electric grid&lt;br /&gt;
is that a smart grid is more reliable, manageable, scalable, cost efficient and has two-way&lt;br /&gt;
communication between the utility operator and the consumer.&lt;br /&gt;
&lt;br /&gt;
A smart grid consists of different entities connected by multiple systems. Advanced metering&lt;br /&gt;
infrastructure (AMI) is a system component within the smart grid which connects&lt;br /&gt;
smart meters from the consumers to the operators and vice versa. However, smart grids are&lt;br /&gt;
vulnerable to cyber security attacks because of its large use of communication technology.&lt;br /&gt;
This cyber security issues are also present in the AMI. If the cyber security issues are not&lt;br /&gt;
addressed well, it could cause the AMI to be vulnerable to cyber threats and have serious&lt;br /&gt;
consequences.&lt;br /&gt;
AMI system plays an important role in the smart grid and with its weak cyber security protocols,&lt;br /&gt;
it naturally becomes attackers first target. This research will cover the issues of cyber&lt;br /&gt;
security in AMI, determine the requirements to mitigate the issues, discuss about the cyber&lt;br /&gt;
threats resulting from the issues and to finally draw a conclusion by giving recommendations.&lt;br /&gt;
&lt;br /&gt;
== Motivation ==&lt;br /&gt;
South Australia has been recently facing with energy crisis. Approximately 50% of South&lt;br /&gt;
Australias energy comes from gas, 45% from wind energy and the remaining from solar, diesel&lt;br /&gt;
and brown coal from Victoria. Wind energy has been proved to be not very reliable during&lt;br /&gt;
the blackout on September 2016 and due to the closure of a few coal plants in Victoria, the&lt;br /&gt;
demand for gas energy increases. One solution proposed was to use battery storage as a&lt;br /&gt;
short-term fix. However, the upfront cost for battery storage is too expensive and is not as&lt;br /&gt;
efficient compared to other methods.&lt;br /&gt;
&lt;br /&gt;
A long-term solution for the energy crisis is to convert the traditional standard grid into a&lt;br /&gt;
smart grid. By doing so, the operators and consumers are able to communicate with each&lt;br /&gt;
other and control the energy flow during high demand. AMI plays an important role in&lt;br /&gt;
assisting the smart grid to connect the operators and consumers. Other than that, a smart&lt;br /&gt;
grid can recover from a blackout by rerouting another transmission line.&lt;br /&gt;
&lt;br /&gt;
Furthermore, smart grids can help reduce energy cost for the consumers as the smart meters&lt;br /&gt;
installed at the end user allows the consumer to monitor energy prices in near real time.&lt;br /&gt;
With the AMI implemented, the utility provider no longer needs to send out the meter man&lt;br /&gt;
to measure the energy usage once every few months, instead they can bill the consumers&lt;br /&gt;
directly and more efficiently. For the utility provider, this saves cost on fuel for sending out&lt;br /&gt;
a meter man, and for the consumer, they no longer need to worry about estimated billing&lt;br /&gt;
when the meter man has no access to the meter.&lt;br /&gt;
&lt;br /&gt;
== Purpose of the project ==&lt;br /&gt;
The purpose of this project is to carry out an extensive research, discuss and provide an&lt;br /&gt;
overall view on the Cyber Security Issues in AMI and can then be used as a general reference&lt;br /&gt;
for future work. The aim is to first identify the current issues and causes from past&lt;br /&gt;
research, discuss about the issues, list out the regulatory requirements and the cyber security&lt;br /&gt;
requirements. This research will also include ways an attacker can exploit the AMI and the&lt;br /&gt;
recommended resolutions.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
=== What is a Smart Grid? ===&lt;br /&gt;
Over the years the term smart grid has went through numerous changes, but in general it&lt;br /&gt;
is used to describe power grids with enhanced communication and sensing system which&lt;br /&gt;
improves the overall reliability. According to Liu et al. a smart grid is capable of analysing&lt;br /&gt;
power usage information in real time [1]. What makes a smart grid more reliable than the&lt;br /&gt;
standard power grid is that any outage in an area due to bad weather can be automatically&lt;br /&gt;
rerouted from another working distribution line. This feature is called distribution intelligence.&lt;br /&gt;
A smart grid is also capable of integrating different energy sources. This allows&lt;br /&gt;
renewable and non-renewable energy to work well together.&lt;br /&gt;
&lt;br /&gt;
One important feature of a smart grid is the two-way communication between the consumer&lt;br /&gt;
and the operator unlike the standard grid which only flows one way. What this means is&lt;br /&gt;
that electricity is not only flowing from the operator to the consumer but information from&lt;br /&gt;
the consumer is also flowing back to the operator. This two-way communication allows the&lt;br /&gt;
operator to adjust the energy according to the consumer needs.&lt;/div&gt;</summary>
		<author><name>A1660770</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167c_Smart_Grid_Security&amp;diff=8423</id>
		<title>Projects:2017s1-167c Smart Grid Security</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167c_Smart_Grid_Security&amp;diff=8423"/>
		<updated>2017-09-10T07:45:56Z</updated>

		<summary type="html">&lt;p&gt;A1660770: Created page with &amp;quot;== Project Team == Juin Hao Yau  == Supervisors == Dr Matthew Sorell  == Introduction == Smart grids are the next generation of power grids which can improve the standard grid...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Project Team ==&lt;br /&gt;
Juin Hao Yau&lt;br /&gt;
&lt;br /&gt;
== Supervisors ==&lt;br /&gt;
Dr Matthew Sorell&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
Smart grids are the next generation of power grids which can improve the standard grid&lt;br /&gt;
in terms of efficiency, reliability, connectivity and is more cost efficient. Over the years,&lt;br /&gt;
the traditional grid has been facing with many power problems which lead to blackouts.&lt;br /&gt;
Because of this many countries are slowly replacing the traditional grid with smart grid and&lt;br /&gt;
other countries will soon adopt smart grids. A smart grid is composed of different systems&lt;br /&gt;
and a major system is the Advanced Metering Infrastructure (AMI). AMI is not a single&lt;br /&gt;
system by itself, but contains sub-systems like smart meters, Home Area Network (HAN)&lt;br /&gt;
and Meter Data Management System (MDMS) which connects the customer to the operator.&lt;br /&gt;
The AMI is able to provide two-way communication between the customer and operator as&lt;br /&gt;
the communication link not only provides electricity but also information. However, because&lt;br /&gt;
the smart grid is interconnected and contains communication systems, it is more susceptible&lt;br /&gt;
to cyber attacks. In order to ensure the safety of the smart grid in terms of cyber security,&lt;br /&gt;
it is important to first focus on the cyber security issues in AMI. The cyber security issues&lt;br /&gt;
in AMI can be categorized into three main parts; privacy issues, unauthorized command&lt;br /&gt;
and modification issues, and Denial-of-Service issues. It is also important to identify the&lt;br /&gt;
perpetrator involve in the cyber security issues. From previous research, attackers can range&lt;br /&gt;
from customers to terrorists. This research will first identify cyber security issues in AMI&lt;br /&gt;
and their appropriate causes then to discuss them. The aim of this research is to provide an&lt;br /&gt;
overall view of cyber security issues in AMI and to act as a reference and guide for future&lt;br /&gt;
AMI works.&lt;/div&gt;</summary>
		<author><name>A1660770</name></author>
		
	</entry>
</feed>