<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Security analysis of Smart Grids</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Joaquín</forename><surname>Márquez</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universidad de la República</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gabriel</forename><surname>Rodríguez</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universidad de la República</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gustavo</forename><surname>Betarte</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universidad de la República</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Juan</forename><surname>Diego</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universidad de la República</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Campo</forename><forename type="middle">Eduardo</forename><surname>Grampín</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Universidad de la República</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Security analysis of Smart Grids</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">A2436EDCB5FADC089F39717E3E90BA8F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:01+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The benefits of Smart Grids are beyond doubt. However, thinking of a future where Smart Meters are ubiquitous raises a lot of concerns regarding security and privacy. Some of these concerns include the disclosure of the personal information of consumers, the provision of false consumption data to the utility, or even concerns of national security such as attacks to attempt to bring down parts of the grid or even the whole grid. The goal of our investigation is to identify and develop methodological proceedings and technical tools which aid in providing guarantees of the correctness of the adopted solutions for the design and implementation of a Smart Grid, in particular in relation with the security properties which must be guaranteed by those solutions.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The deployment of Smart Grids has become a matter of great interest throughout the world, with some countries heavily investing in research regarding this topic due to all the benefits they could potentially provide to both Electric Utility Companies and their customers. The key feature of this type of system is the provision of near real-time information regarding the energy consumption in order to help in balancing its generation and distribution according to the demand and also to help the customers in dynamically adapting their consumption behavior.</p><p>Our investigation is framed within a collaboration between the Engineering School of the Universidad de la República(UdelaR) and UTE, the public electric utility company of Uruguay. This collaboration aims to identify and develop methodological proceedings and technical tools which aid in providing guarantees of the correctness of the adopted solutions for the design and implementation of a Smart Grid, in particular in relation with the security properties which must be guaranteed by those solutions. In this context our investigation aims mainly to contribute in the development of a threat model and in defining preventive and reactive measures to diminish the impact of the exploitation of those vulnerabilities.</p><p>We are still in an early stage of the investigation, studying the state of the art of Smart Grids and Smart Meters, with an emphasis on investigating the security issues in the context of an Advanced Metering Infrastructure (AMI).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Advanced Metering Infrastructure (AMI)</head><p>Usually, the network of transmission lines, substations, transformers and more that deliver electricity is known as the electric grid. An smart grid is the result of the integration between a grid and digital technology in order to provide the grid with more capabilities that optimize its operations.</p><p>In this context, an Advanced Metering Infrastructure is a crucial component of a smart grid, which handles the two way communication between smart meters and data management systems, allowing to send, receive and process consumption data of the clients, and also additional operations over the network. 3 Security Concerns in Advance Metering Infrastructures</p><p>As with any communication network there are many security concerns that must be taken into consideration. Some of the possible attacks include[Ur-Reh15]:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Eavesdropping</head><p>Resulting in the disclosure of personal information from costumers. It has been shown that a very accurate user profile can be extrapolated from the collected data <ref type="bibr" target="#b1">[Mol10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Denial of Service attacks</head><p>With the purpose of shutting down parts of the grid or even the whole grid.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Packet injection attacks</head><p>For example providing false billing information, generating costs for the customers or the utilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Malware injection attacks</head><p>Affecting the communication between devices with the goal of compromising the billing and reporting process, disrupting the Demand/Consumption information affecting the load on the grid.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Remote Connect/ Disconnect</head><p>Potentially leaving users without access to the service.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Firmware manipulation</head><p>For example with the intention of manipulating the metering functionality to report false consumption data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Man-in-the-middle attacks</head><p>With the goal of providing false consumption information to the gateway or to send commands to the Smart Meters, potentially bringing down the whole grid.</p><p>The consequences of such attacks range from the disclosure of information affecting the privacy of customers, which can have legal consequences to utilities, to concerns of national security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Security Countermeasures</head><p>Different countermeasures can be used to address the concerns presented in the previous section. Many of them may be familiar to the reader, as they are commonly used in general purpose networks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Encrypted Communication</head><p>Dual encryption is recommended, encrypting at the application layer to ensure end-to-end encryption and at the transport layer using existing protocols such as TLS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Integrity Protection</head><p>Integrity protection, such as using message authentication codes (MAC) to assure the integrity of the transmitted consumption data, is vital in the context of smart grids.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Authenticity Verification</head><p>Standard approaches can be used, such as digital signatures.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Gateway based Approach</head><p>This is a novel approach, proposed by European countries, such as Germany and the UK. It consists of having a Smart Metering Gateway to act as an intermediary in the communication between the Smart Meters installed in the customer's premises and the utility. The gateway receives the consumption measurements from the meters and communicates periodically, after a set interval, with the utility servers to send this data, being responsible of ensuring the privacy of the customer. Also, the gateway receives commands from the utility servers, such as instructions to act based on the load on the grid.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Intrusion Detection and Prevention Systems</head><p>This type of systems help in the identification of intrusions, detection of rogue nodes and source of attacks and exclusion of these nodes from further communication in the network.</p><p>Apart from the presented countermeasures a security by design approach is worth taking into account[Ur-Reh15].</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>An introduction to our investigation was presented in this summary. Initial considerations on AMI and security were described as starting points on our research. This topic has been proven of great importance nowadays, especially when security threats could have a wide range of unwanted consequences, where even national security is at risk. We plan to continue this path, analyzing the security concerns in depth, reviewing the protocols involved and trying to propose security countermeasures specifically designed for the particular needs of UTE.</p><p>6 References</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>Figure 1: Example of AMI architecture [Pop14]</figDesc><graphic coords="2,64.80,449.25,233.99,165.89" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Advanced Metering Infrastructure in the context of Smart Grids</title>
		<author>
			<persName><forename type="first">;</forename><forename type="middle">O</forename><surname>Ur-Reh15</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Ur-Rehman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zivic</surname></persName>
		</author>
		<author>
			<persName><surname>Ruland</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Popovic</surname></persName>
		</author>
		<author>
			<persName><surname>Cackovic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Smart Energy Grid Engineering (SEGE)</title>
				<meeting><address><addrLine>Oshawa, ON; Cavtat</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2015. 2015. 2014</date>
			<biblScope unit="page" from="1509" to="1514" />
		</imprint>
	</monogr>
	<note>2014 IEEE International Energy Conference (ENERGYCON)</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Private memoirs of a smartmeter</title>
		<author>
			<persName><forename type="first">A</forename><surname>Molina-Markham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Shenoy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Fu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Cecchet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Irwin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building</title>
				<meeting>the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building<address><addrLine>Zurich</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
