Skip to main content

2012 | OriginalPaper | Buchkapitel

SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory

verfasst von : Haemin Park, Dongwon Seo, Heejo Lee, Adrian Perrig

Erschienen in: Computer Science and its Applications

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A smart grid is verging on a promising technology for reforming global electrical grids. Currently, attackers compromise security and privacy by maliciously modifying the memory of smart grid devices. To thwart such attacks, software-based attestation protocols ensure the absence of malicious changes. A verifier and a target device locally generate their own checksums by memory traversal, and the verifier attests the target device by comparing the checksums. For smart grids, however, two challenges are arise in practically deploying the attestation protocol: verification overhead for large-scale networks and evasion of attestation by memory replication. To address these challenges, we propose a novel software-based attestation technique, termed SMATT (Smart Meter ATTestation), to address the aforementioned two challenges by leveraging multiple target selection and copy-proof memory. A verifier randomly selects multiple smart meters, and receives checksums. The verifier only compares the checksums instead of performing memory traversal, thereby remarkably reducing the computational overhead. To prevent memory replication, we design a customized copy-proof memory mechanism. The smart meter outputs garbage values when copy-proof memory sections are being accessed, and thus, attackers cannot replicate the memory. Furthermore, we define an SI epidemic model considering two attestation parameters, the number of infectious smart meters and the number of selected smart meters by a verifier, to enhance the malware detection accuracy of SMATT. In our experimental environments, SMATT takes only 20 s for a verifier to attest millions of smart meters. In addition, SMATT detects malware with over 90 % probability, when the malware tampers with 5 % of the memory.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat McDaniel, P.D., McLaughlin, S.E.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3), 75–77 (2009)CrossRef McDaniel, P.D., McLaughlin, S.E.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3), 75–77 (2009)CrossRef
2.
Zurück zum Zitat Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-grid security issues. IEEE Secur. Priv. 8(1), 81–85 (2010)CrossRef Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-grid security issues. IEEE Secur. Priv. 8(1), 81–85 (2010)CrossRef
4.
Zurück zum Zitat McLaughlin, S.E., Podkuiko, D., McDaniel, P.: Energy theft in the advanced metering infrastructure. In: CRITIS, pp. 176–187 (2009) McLaughlin, S.E., Podkuiko, D., McDaniel, P.: Energy theft in the advanced metering infrastructure. In: CRITIS, pp. 176–187 (2009)
5.
Zurück zum Zitat Mo, Y., Kim, T.H., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-physical security of a smart grid infrastructure. In Proceedings of the IEEE (2011) Mo, Y., Kim, T.H., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-physical security of a smart grid infrastructure. In Proceedings of the IEEE (2011)
6.
Zurück zum Zitat Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.K.: SWATT: Software-based attestation for embedded devices. In: IEEE Symposium on Security and Privacy. (2004) Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.K.: SWATT: Software-based attestation for embedded devices. In: IEEE Symposium on Security and Privacy. (2004)
7.
Zurück zum Zitat AbuHmed, T., Nyamaa, N., Nyang, D.: Software-based remote code attestation in wireless sensor network. In: GLOBECOM, pp. 1–8 (2009) AbuHmed, T., Nyamaa, N., Nyang, D.: Software-based remote code attestation in wireless sensor network. In: GLOBECOM, pp. 1–8 (2009)
8.
Zurück zum Zitat Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: ACM Conference on CCS, pp. 400–409 (2009) Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: ACM Conference on CCS, pp. 400–409 (2009)
9.
Zurück zum Zitat Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: ARES (2008) Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: ARES (2008)
10.
Zurück zum Zitat Khelil, A., Becker, C., Tian, J., Rothermel, K.: An epidemic model for information diffusion in MANETs. In: Proceedings of the 5th ACM international workshop, MSWiM ‘02, pp. 54–60 (2002) Khelil, A., Becker, C., Tian, J., Rothermel, K.: An epidemic model for information diffusion in MANETs. In: Proceedings of the 5th ACM international workshop, MSWiM ‘02, pp. 54–60 (2002)
11.
Zurück zum Zitat Song, K., Seo, D., Park, H., Lee, H., Perrig, A.: OMAP: One-way memory attestation protocol for smart meters. In: EEE ISPA Workshop SGSC, pp. 111–118 (2011) Song, K., Seo, D., Park, H., Lee, H., Perrig, A.: OMAP: One-way memory attestation protocol for smart meters. In: EEE ISPA Workshop SGSC, pp. 111–118 (2011)
12.
Zurück zum Zitat Himayat, N., Johnsson, K., Talwar, S., Wang, X.: Functional requirements for network entry and random access by large number of devices. Technical Report IEEE802.16ppc-10/0049r1, IEEE 802.16 Broadband Wireless Access Working Group (2010) Himayat, N., Johnsson, K., Talwar, S., Wang, X.: Functional requirements for network entry and random access by large number of devices. Technical Report IEEE802.16ppc-10/0049r1, IEEE 802.16 Broadband Wireless Access Working Group (2010)
13.
Zurück zum Zitat Himayat, N., Talwar, S., Johnsson, K.: Smart grid requirements for IEEE 802.16 M2MNetwork. Technical Report IEEE C802.16ppc-10/0042r2, IEEE (2010) Himayat, N., Talwar, S., Johnsson, K.: Smart grid requirements for IEEE 802.16 M2MNetwork. Technical Report IEEE C802.16ppc-10/0042r2, IEEE (2010)
14.
Zurück zum Zitat Mitzenmacher, M., Upfal, E.: Probability and Computing—Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, Cambridge (2005) Mitzenmacher, M., Upfal, E.: Probability and Computing—Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, Cambridge (2005)
17.
Zurück zum Zitat Zhu, Z., Cao, G., Zhu, S., Ranjan, S., Nucci, A.: A social network based patching scheme for worm containment in cellular networks. In: IEEE INFOCOM (2009) Zhu, Z., Cao, G., Zhu, S., Ranjan, S., Nucci, A.: A social network based patching scheme for worm containment in cellular networks. In: IEEE INFOCOM (2009)
Metadaten
Titel
SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory
verfasst von
Haemin Park
Dongwon Seo
Heejo Lee
Adrian Perrig
Copyright-Jahr
2012
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-5699-1_90

Premium Partner