Skip to main content
Erschienen in: Wireless Personal Communications 3/2015

01.08.2015

Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure

verfasst von: Satin Asri, Bernardi Pranggono

Erschienen in: Wireless Personal Communications | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The age of Internet of Things has brought in new challenges specifically in areas such as security. The evolution of classic power grids to smart grids is a prime example of how everything is now being connected to the Internet. With the power grid becoming smart, the information and communication systems supporting it is subject to both classical and emerging cyber-attacks. The article investigates the vulnerabilities caused by a distributed denial-of-service (DDoS) attack on the smart grid advanced metering infrastructure. Attack simulations have been conducted on a realistic electrical grid topology. The simulated network consisted of smart meters, power plant and utility server. Finally, the impact of large scale DDoS attacks on the distribution system’s reliability is discussed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Farquharson, J., Wang, A., & Howard, J. (2012) Smart grid cyber security and substation network security. In Innovative smart grid technologies (ISGT), 2012 IEEE PES, (pp. 1–5). Farquharson, J., Wang, A., & Howard, J. (2012) Smart grid cyber security and substation network security. In Innovative smart grid technologies (ISGT), 2012 IEEE PES, (pp. 1–5).
2.
Zurück zum Zitat Chinnow, J. et al. (2011) A simulation framework for smart meter security evaluation. In 2011 IEEE international conference on smart measurements for future grids (SMFG) (pp. 1–9). Chinnow, J. et al. (2011) A simulation framework for smart meter security evaluation. In 2011 IEEE international conference on smart measurements for future grids (SMFG) (pp. 1–9).
3.
Zurück zum Zitat Dong, W. et al. (2011) Protecting smart grid automation systems against cyber attacks. In IEEE transactions on, smart grid (Vol. 2, pp. 782–795). Dong, W. et al. (2011) Protecting smart grid automation systems against cyber attacks. In IEEE transactions on, smart grid (Vol. 2, pp. 782–795).
4.
Zurück zum Zitat Schmidt, S., et al. (2010). Application-level simulation for network security. Simulation, 86, 311–330.CrossRef Schmidt, S., et al. (2010). Application-level simulation for network security. Simulation, 86, 311–330.CrossRef
5.
Zurück zum Zitat Pearson, I. L. G. (2011). Smart grid cyber security for Europe. Energy Policy, 39, 5211–5218.CrossRef Pearson, I. L. G. (2011). Smart grid cyber security for Europe. Energy Policy, 39, 5211–5218.CrossRef
6.
Zurück zum Zitat Dollen, D. V. (2009). Report to NIST on smart grid interoperability standards roadmap. Palo Alto, CA: Electric Power Research Institute (EPRI). Dollen, D. V. (2009). Report to NIST on smart grid interoperability standards roadmap. Palo Alto, CA: Electric Power Research Institute (EPRI).
7.
Zurück zum Zitat Wang, J., & Leung, V. C. M. (2011). A survey of technical requirements and consumer application standards for IP-based smart grid AMI network. In 2011 International conference on, information networking (ICOIN) (pp. 114–119). Wang, J., & Leung, V. C. M. (2011). A survey of technical requirements and consumer application standards for IP-based smart grid AMI network. In 2011 International conference on, information networking (ICOIN) (pp. 114–119).
8.
Zurück zum Zitat De Craemer, K., & Deconinck, G. (2010). Analysis of state-of-the-art smart metering communication standards. In Proceedings of the 5th young researchers symposium. De Craemer, K., & Deconinck, G. (2010). Analysis of state-of-the-art smart metering communication standards. In Proceedings of the 5th young researchers symposium.
9.
Zurück zum Zitat EC. (2009). Directive 2009/72/EC of the European Parliament and of the Council of 13 July 2009 concerning common rule for the internal market in electricity. Journal of the European Union 2009. EC. (2009). Directive 2009/72/EC of the European Parliament and of the Council of 13 July 2009 concerning common rule for the internal market in electricity. Journal of the European Union 2009.
10.
Zurück zum Zitat Efthymiou, C., Kalogridis, G. (2010) Smart grid privacy via anonymization of smart metering data. In 2010 First IEEE international conference on, smart grid communications (SmartGridComm) (pp. 238–243). Efthymiou, C., Kalogridis, G. (2010) Smart grid privacy via anonymization of smart metering data. In 2010 First IEEE international conference on, smart grid communications (SmartGridComm) (pp. 238–243).
11.
Zurück zum Zitat Baker, S., Filipiak, N., & Timlin, K. (2011, April). In the dark: Crucial industries confront cyber-attacks. In McAfee 2nd annual critical infrastructure protection report. http://www.mcafee.com/cip. Baker, S., Filipiak, N., & Timlin, K. (2011, April). In the dark: Crucial industries confront cyber-attacks. In McAfee 2nd annual critical infrastructure protection report. http://​www.​mcafee.​com/​cip.
12.
Zurück zum Zitat Siddiqui, F et al. (2012) Smart grid privacy: Issues and solutions. In 2012 21st international conference on, computer communications and networks (ICCCN) (pp. 1–5). Siddiqui, F et al. (2012) Smart grid privacy: Issues and solutions. In 2012 21st international conference on, computer communications and networks (ICCCN) (pp. 1–5).
13.
Zurück zum Zitat Zeadally, S., et al. (2013). Towards privacy protection in smart grid. Wireless Personal Communications, 73, 23–50.CrossRef Zeadally, S., et al. (2013). Towards privacy protection in smart grid. Wireless Personal Communications, 73, 23–50.CrossRef
14.
Zurück zum Zitat Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Computer Communication Review, 34, 39–53.CrossRef Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Computer Communication Review, 34, 39–53.CrossRef
15.
Zurück zum Zitat Rajab, M. A. et al. (2007) My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In Proceedings of the 1st USENIX workshop on hot topics in understanding botnets. Cambridge. Rajab, M. A. et al. (2007) My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In Proceedings of the 1st USENIX workshop on hot topics in understanding botnets. Cambridge.
16.
Zurück zum Zitat Carl, G., et al. (2006). Denial-of-service attack-detection techniques. Internet Computing, IEEE, 10, 82–89.CrossRef Carl, G., et al. (2006). Denial-of-service attack-detection techniques. Internet Computing, IEEE, 10, 82–89.CrossRef
19.
Zurück zum Zitat Riley, G., & Henderson, T. (2010). The ns-3 network simulator. In K. Wehrle, et al. (Eds.), Modeling and tools for network simulation (pp. 15–34). Berlin: Springer.CrossRef Riley, G., & Henderson, T. (2010). The ns-3 network simulator. In K. Wehrle, et al. (Eds.), Modeling and tools for network simulation (pp. 15–34). Berlin: Springer.CrossRef
20.
Zurück zum Zitat Varga, A., & Hornig, R. (2008) An overview of the OMNeT++ simulation environment. In 1st international conference on simulation tools and techniques for communications, networks and systems and workshops (pp. 1–10). Marseille. Varga, A., & Hornig, R. (2008) An overview of the OMNeT++ simulation environment. In 1st international conference on simulation tools and techniques for communications, networks and systems and workshops (pp. 1–10). Marseille.
21.
Zurück zum Zitat Hirsch, B., Konnerth, T., & Heßler, A. (2009) Merging agents and services: The JIAC agent platform. In Multi-agent programming (pp. 159–185). Springer: Berlin. Hirsch, B., Konnerth, T., & Heßler, A. (2009) Merging agents and services: The JIAC agent platform. In Multi-agent programming (pp. 159–185). Springer: Berlin.
22.
Zurück zum Zitat Glinkowski, M., Hou, J., & Rackliffe, G. (2011). Advances in wind energy technologies in the context of smart grid. Proceedings of the IEEE, 99, 1083–1097.CrossRef Glinkowski, M., Hou, J., & Rackliffe, G. (2011). Advances in wind energy technologies in the context of smart grid. Proceedings of the IEEE, 99, 1083–1097.CrossRef
Metadaten
Titel
Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure
verfasst von
Satin Asri
Bernardi Pranggono
Publikationsdatum
01.08.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2510-3

Weitere Artikel der Ausgabe 3/2015

Wireless Personal Communications 3/2015 Zur Ausgabe

Neuer Inhalt