Team for Research in
Ubiquitous Secure Technology

Decreased time delay and security enhancement recommendations for AMI smart meter networks
Coalton Bennett, Stephen Wicker

Citation
Coalton Bennett, Stephen Wicker. "Decreased time delay and security enhancement recommendations for AMI smart meter networks". IEEE Xplore Innovative Smart Grid Technologies (ISGT), 2010, 6, 19, January, 2010.

Abstract
In this paper we consider a variety of real world AMI smart meter networking scenarios. We examine the network performance as a function the following parameters: the size of the network, node scheduling, and polling interval (period) under normal conditions. Then we introduce malevolent agents to the network to demonstrate the effects of their actions. Although there are several inherent security related issues involving wireless network the most relevant and attacks to launch against the de facto networking protocols used by AMI smart meters is a black hole attack. Focusing on the black hole attack we demonstrate, through simulations, how to avoid these attacks by creating dedicated paths between the source (smart meter) and the sink collecting the information (access point). In addition to this, we simulate a network of nodes that use a hybrid routing protocol when time sensitive data is needed in order to ensure that outages do not occur due to excess demand.

Electronic downloads

Citation formats  
  • HTML
    Coalton Bennett, Stephen Wicker. <a
    href="http://www.truststc.org/pubs/666.html"
    >Decreased time delay and security enhancement
    recommendations for AMI smart meter networks</a>, IEEE
    Xplore Innovative Smart Grid Technologies (ISGT), 2010, 6,
    19, January, 2010.
  • Plain text
    Coalton Bennett, Stephen Wicker. "Decreased time delay
    and security enhancement recommendations for AMI smart meter
    networks". IEEE Xplore Innovative Smart Grid
    Technologies (ISGT), 2010, 6, 19, January, 2010.
  • BibTeX
    @inproceedings{BennettWicker10_DecreasedTimeDelaySecurityEnhancementRecommendations,
        author = {Coalton Bennett and Stephen Wicker},
        title = {Decreased time delay and security enhancement
                  recommendations for AMI smart meter networks},
        booktitle = {IEEE Xplore Innovative Smart Grid Technologies
                  (ISGT), 2010},
        pages = {6},
        day = {19},
        month = {January},
        year = {2010},
        abstract = {In this paper we consider a variety of real world
                  AMI smart meter networking scenarios. We examine
                  the network performance as a function the
                  following parameters: the size of the network,
                  node scheduling, and polling interval (period)
                  under normal conditions. Then we introduce
                  malevolent agents to the network to demonstrate
                  the effects of their actions. Although there are
                  several inherent security related issues involving
                  wireless network the most relevant and attacks to
                  launch against the de facto networking protocols
                  used by AMI smart meters is a black hole attack.
                  Focusing on the black hole attack we demonstrate,
                  through simulations, how to avoid these attacks by
                  creating dedicated paths between the source (smart
                  meter) and the sink collecting the information
                  (access point). In addition to this, we simulate a
                  network of nodes that use a hybrid routing
                  protocol when time sensitive data is needed in
                  order to ensure that outages do not occur due to
                  excess demand.},
        URL = {http://www.truststc.org/pubs/666.html}
    }
    

Posted by Coalton Bennett on 29 Mar 2010.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.