Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
read more
Citations
Cyber-security on smart grid: Threats and potential solutions
Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research
Blockchain for Future Smart Grid: A Comprehensive Survey
Electrical Load Forecasting Using Edge Computing and Federated Learning
A Survey on Home Energy Management
References
On the security of public key protocols
Modern Electric, Hybrid Electric, and Fuel Cell Vehicles
Demand response and smart grids—A survey
The AVISPA tool for the automated validation of internet security protocols and applications
Survey Cyber security in the Smart Grid: Survey and challenges
Related Papers (5)
Frequently Asked Questions (17)
Q2. What future works have the authors mentioned in the paper "Smart grid metering networks: a survey on security, privacy and open research issues" ?
In this section, the authors summarize a list of open research issues, and discuss them in terms of research problem, existing preliminary solutions, and the future research work.
Q3. What protocol is used to verify the authenticity of the wireless mesh nodes?
To verify the mesh node (i.e., smart meter) authenticity, the authors utilized built-in (i.e., IEEE 802.11s) authentication protocol called “simultaneous authentication of equals (SAE)”.
Q4. What is a logical method for proving the legitimacy of an entity?
Authentication or identification is a logical method for proving the legitimacy and identification of an entity, such as enduser, meter, etc.
Q5. What platforms have been used to demonstrate the performance of the TRE?
In addition, utilizing the TPM and embed Transport Layer Security (TLS) cryptography library, performance evaluations have been demonstrated on different platforms, e.g., Intel TPM, Linux-TPM, VM-vTPM, etc.
Q6. What is the need to investigate the potential impacts of DoS attacks in each part of the networks?
As the SG metering networks are complex engineering marvels, and are distributed in nature, there is an immense need to investigate the potential impacts and countermeasures of DoS attacks in each part of the networks.
Q7. What are the main services for end-to-end communications in smart metering?
Routing and message forwarding, therefore, are paramount services for end-to-end communications in smart metering, system monitoring and controlling, etc.
Q8. How does the server validate the message?
Upon receiving the message, the server validates the message by comparing its hashing and verifying the correctness of signcryption.
Q9. What are the proposed solutions for detecting packet flooding?
These proposed solutions mainly use two types of countermeasures, such as, cryptographic-based (e.g., [99], [133], [140], [141]) and networking-based (e.g., [134], [144]).
Q10. What are the main drawbacks of the jOSEF framework?
the jOSEF framework has the following drawbacks: (i) it does not support remote administration; (ii) it does not provide protection to the meter data that can raise privacy issues; and (iii) the jOSEF is implemented with only few security properties, such as password-based user authentication.
Q11. How can the key hierarchy be updated?
With the proposed strategy, the keys (including master session key) can be updated regularly (e.g., a week, a month or six months) before the master key expiration.
Q12. What is the common way to check the legitimacy of an entity on the network and system?
credentials check the legitimacy of identity of an entity on the network and system, and then let that entity access communication network, such as, VPN, access point, communication module/meter and operation and management system [76].
Q13. What is the main reason why the authors mentioned the possibility of ARP cache poisoning?
As the authors mentioned during the process of piggybacking of the ARP packets, it is very likely that a PREQ packet may be exposed to the possible ARP cache poisoning attacks.
Q14. What is the main reason why the SG metering network is vulnerable to anomalous activity?
Such anomalous activity can disrupt or mislead the communication modules at the utility to meet the varying demand of the end-users(i.e., house, factory, and so on) without being detected.
Q15. What type of attack can a remote attacker use to reach out solar panels and smart meters?
The research reported that a remote attacker with low skill can not only exploit a (PHP) vulnerability to reach out solar panels and smart meters but he/she can spoof the network configurations and meter’s parameters out.
Q16. What can be used to achieve metering intelligence?
These tools can be used to achieve metering intelligence, and to support stakeholder applications, e.g., consumer profiling and load forecasting.
Q17. What is the main reason why the proposed schemes are not practical?
Since the proposed solutions are mathematical concepts, it is not clear which scheme can provide the best practical solution against such energy theft and/or compromised/default smart meters.