DocumentCode :
3062152
Title :
Specification-Based Intrusion Detection for Advanced Metering Infrastructures
Author :
Berthier, Robin ; Sanders, William H.
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear :
2011
fDate :
12-14 Dec. 2011
Firstpage :
184
Lastpage :
193
Abstract :
It is critical to develop an effective way to monitor advanced metering infrastructures (AMI). To ensure the security and reliability of a modernized power grid, the current deployment of millions of smart meters requires the development of innovative situational awareness solutions to prevent compromised devices from impacting the stability of the grid and the reliability of the energy distribution infrastructure. To address this issue, we introduce a specification-based intrusion detection sensor that can be deployed in the field to identify security threats in real time. This sensor monitors the traffic among meters and access points at the network, transport, and application layers to ensure that devices are running in a secure state and their operations respect a specified security policy. It does this by implementing a set of constraints on transmissions made using the C12.22 standard protocol that ensure that all violations of the specified security policy will be detected. The soundness of these constraints was verified using a formal framework, and a prototype implementation of the sensor was evaluated with realistic AMI network traffic.
Keywords :
automatic meter reading; computer network security; formal specification; power distribution reliability; power meters; power system measurement; power system security; sensors; smart power grids; transport protocols; AMI network traffic; C12.22 standard protocol; access points; advanced metering infrastructure; energy distribution infrastructure reliability; innovative situational awareness solutions; modernized power grid security; security policy; security threat identify; sensor; smart meters; specification based intrusion detection; traffic monitoring; Authentication; Intrusion detection; Monitoring; Protocols; Reliability; Timing; AMI; formal method; intrusion detection; specification-based security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Computing (PRDC), 2011 IEEE 17th Pacific Rim International Symposium on
Conference_Location :
Pasadena, CA
Print_ISBN :
978-1-4577-2005-5
Electronic_ISBN :
978-0-7695-4590-5
Type :
conf
DOI :
10.1109/PRDC.2011.30
Filename :
6133080
Link To Document :
بازگشت