Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision

被引:18
|
作者
Shokry, Mostafa [1 ]
Awad, Ali Ismail [2 ,3 ,4 ,5 ]
Abd-Ellah, Mahmoud Khaled [6 ]
Khalaf, Ashraf A. M. [7 ]
机构
[1] Minist Elect & Renewable Energy, Dept Infrastruct & Informat Secur, Cairo, Egypt
[2] United Arab Emirates Univ, Coll Informat Technol, POB 17551, Al Ain, U Arab Emirates
[3] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
[4] Al Azhar Univ, Fac Engn, POB 83513, Qena, Egypt
[5] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, England
[6] Egyptian Russian Univ, Cairo 11829, Egypt
[7] Minia Univ, Fac Engn, Dept Elect Engn, Al Minya 61519, Egypt
关键词
Advancedmeteringinfrastructure; Ssmartgrid; Cybersecurity; Securityvulnerability; Securitythreat; Securityattack; Countermeasure; INTRUSION DETECTION SYSTEM; DATA INJECTION ATTACK; SMART GRID SURVEY; KEY MANAGEMENT; CYBER-SECURITY; BIG DATA; AMI; COMMUNICATION; AUTHENTICATION; ARCHITECTURE;
D O I
10.1016/j.future.2022.06.013
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There is a paradigm shift from traditional power distribution systems to smart grids (SGs) due to advances in information and communication technology. An advanced metering infrastructure (AMI) is one of the main components in an SG. Its relevance comes from its ability to collect, process, and transfer data through the internet. Although the advances in AMI and SG techniques have brought new operational benefits, they introduce new security and privacy challenges. Security has emerged as an imperative requirement to protect an AMI from attack. Currently, ensuring security is a major challenge in the design and deployment of an AMI. This study provides a systematic survey of the security of AMI systems from diverse perspectives. It focuses on attacks, mitigation approaches, and future visions. The contributions of this article are fourfold: First, the vulnerabilities that may exist in all components of an AMI are described and analyzed. Second, it considers attacks that exploit these vulnerabilities and the impact they can have on the performance of individual components and the overall AMI system. Third, it discusses various countermeasures that can protect an AMI system. Fourth, it presents the open challenges relating to AMI security as well as future research directions. The uniqueness of this review is its comprehensive coverage of AMI components with respect to their security vulnerabilities, attacks, and countermeasures. The future vision is described at the end.
引用
收藏
页码:358 / 377
页数:20
相关论文
共 50 条
  • [1] A simulation Model for the Analysis of Security Attacks in Advanced Metering Infrastructure
    Kondoro, Aron
    Ben Dhaou, Imed
    Rwegasira, Diana
    Kelati, Amleset
    Tenhunen, Hannu
    Mvungi, Nerey
    [J]. 2018 IEEE PES/IAS POWERAFRICA CONFERENCE, 2018, : 533 - 538
  • [2] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [3] Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey
    Jaitly, Sunakshi
    Malhotra, Harshit
    Bhushan, Bharat
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 559 - 564
  • [4] Attacks and their Defenses for Advanced Metering Infrastructure
    Lighari, Sheeraz Niaz
    Hussain, Dil Muhammad Akbar
    Jensen, Birgitte Bak
    Shaikh, Asad Ali
    [J]. 2014 6TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2014, : 148 - 151
  • [5] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [6] LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation
    Hessel, Frank
    Almon, Lars
    Hollick, Matthias
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [7] Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks
    Abdullah, Muhammad Daniel Hafiz
    Hanapi, Zurina Mohd
    Zukarnain, Zuriati Ahmad
    Mohamed, Mohamad Afendee
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (04): : 1493 - 1515
  • [8] A survey on Advanced Metering Infrastructure
    Mohassel, Ramyar Rashed
    Fung, Alan
    Mohammadi, Farah
    Raahemifar, Kaamran
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2014, 63 : 473 - 484
  • [9] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Jean-Paul A. Yaacoub
    Hassan N. Noura
    Ola Salman
    Ali Chehab
    [J]. International Journal of Information Security, 2022, 21 : 115 - 158
  • [10] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 115 - 158