Short Communication Volume 4 Issue 4
CPA Global, Patent Research Specialist, India
Correspondence: Nitin Gupta, CPA Global, Patent Research Specialist, India
Received: December 24, 2017 | Published: July 25, 2018
Citation: Gupta N. Security issues in AMI network. Int Rob Auto J. 2018;4(4):259-261. DOI: 10.15406/iratj.2018.04.00133
Smart Grid is now the need of homes, utilities, and the customers because digitization of the grid system provides significant benefits like rich information at lower cost, greener energy, increased efficiency etc. Metering infrastructure plays an important role in the smart grid and acts as an important interface between utilities and its consumers. A metering network comprises a large number of different types of energy meters like advanced meters and legacy meters. To achieve the vision of smart grid, above said metering networks are integrated for exchanging the usage data and taking necessary control actions. Therefore, making grid digitization introduces lot of concerns about their security. To understand various security issues, this article discusses plurality of threats involved at different stages in the AMI system.
Keywords: AMI, energy meter, data collector, head-end
Data sent by AMI components/modules can be called as a stream of packets, wherein data is sequentially continuous and larger in size than the device’s memory, and most importantly mining algorithm can trace data for a very limited number of times.1 For this reason, the nature of data in each component of AMI has been characterized in the Table 1. Figure 1 which shows that there exists plurality of entry points to enter any AMI network that need to be protected from vulnerability and thwarting attempts from insider and outsider users. At present, industrial meters have very limited amount of memory for necessary updates.2 Therefore a smart meter’s memory and processing capacity should be enhanced in order to provide it with enough security and protection (as well as other analytical capabilities). The security of AMI network is very essential because it is responsible for remote access of various smart home appliances, providing real-time pricing, energy usage recording etc. Apart from the advantages gained by integrating smart devices and applications of metering infrastructure as discussed in the previous sections, certain security threats3−7 are always involved if such metering networks are operated without proper security measures. Specifically, there is always a fear in utility's and user's mind with following notions:
Energy meter |
Data collector |
AMI head-end application |
Meters installed in consumer premises produce data in small amount. |
Data collector/concentrator receives data from hundreds or thousands of energy meters and is comparatively of high volume. |
AMI head-end application, at top level, receives data from various data concentrators and being a top hierarchical node, the application process data of million energy meters. |
Most of the energy meters comprise memory in the range of kilobytes with limited processing capacity. |
Memory capacity of data collector is high and is in the range of Megabytes with more data processing capabilities. |
The applications run on servers and possess high computation resources with a huge amount of memory. |
Data speed is low because the generation of amount of data packets follows poisson distribution or data is polled non-frequently by concentrators. |
Data speed is high as it aggregates data from hundreds or thousands of energy meters. |
Data speed is comparatively very high as it handles energy meter data, commands, events etc. |
Table 1 Characteristics of energy meter, data collector, and head-end application
Therefore, to provide a secured AMI architecture, it is necessary to understand various types of threats/actors involved that may cause the failure of entire AMI system and vision of the smart grid. Figure 2 & Table 1 summarize the possible attacks in the AMI network with respect to the type of security and the level of threat.
AMI provides ability to measure power consumption of users in real-time and on the basis of this information, it enables utilities to promote and involve the users in demand response program, provide them real-time pricing information, detect theft and lot of many other features. All such features are provided by use of remote internet network which in turn causes/invites inherent security risks for the utilities. Security measures are essential for any service provider. For achieving the vision of smart grid, such measures need proper attentions for providing significant benefits like secured rich information at lower cost, greener energy, increased efficiency etc. This article describes various security threats that can be associated at different stages of the AMI network and have been summarized in Figure 1 & Figure 2 and Table 1 & Table 2. This can help AMI solution providers and utilities in integrating the metering infrastructures securely.
Issue |
Description |
Security type |
Level of threat |
|
Listening/Sniffing |
Unauthorized users monitor the AMI Network communication by: Eavesdropping, Packet analysis, |
Confidentiality |
High |
|
Modification/Data Alteration |
Unauthorized modification of captured AMI data by intercepting the data packets. This is called repudiation. |
Integrity |
High |
|
Interactions |
Interaction and interfacing of AMI with other systems invite unauthorized users to access to AMI components, modify data, DoS attack, and Non-repudiation. |
Confidentiality, Integrity, Availability, and Accountability |
High |
|
Injecting code in AMI System |
A malicious code/program injected in the AMI system invites unauthorized users to access to AMI components, modify data, DoS attack, and Non-repudiation. |
Confidentiality, Integrity, Availability, and Accountability |
High |
|
Insider Attack |
The insider attack take advantage of access to systems at the opposite end of the AMI system from the consumer endpoint. |
Confidentiality, Integrity, Availability, and Accountability |
Low-High |
Table 2 Quick glance at various threats in AMI system
None
The author declares there is no conflict of interest.
©2018 Gupta. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.