Design & Development of Secure Smart Metering Systems

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): Musaab Hasan & Arwa Ibrahim
Year: 2020

Language: English
Pages: 52

Abstract ................................................................................................................. 8
I. Introduction ................................................................................................... 9
II. Literature Review ........................................................................................ 11
III. Smart Meter Threats ................................................................................. 16
A. Energy Theft ............................................................................................ 17
B. Identity Spoofing ...................................................................................... 17
C. Denial of Service (DoS) ........................................................................... 18
D. Sniffing and Traffic Analysis ................................................................... 18
E. Malware Spreading .................................................................................. 19
IV. Proposed System Design & Prototype Implementation .......................... 20
Layer 1: Electronic Sensors ............................................................................ 23
Layer 2: Development Board .......................................................................... 25
Layer 3: Power Consumption Logging ........................................................... 26
Layer 4: Client Side Web-based Portal .......................................................... 28
Layer 5: logging to Power Utility ................................................................... 32
V. System Hardening ....................................................................................... 35
Removing unnecessary tools and software packages ..................................... 36
Configuring User Administration ................................................................... 37
Implementing Encryption ............................................................................... 37
Auditing and Logging ..................................................................................... 38
Implementing Networking Precautions .......................................................... 38
Disabling USB Devices .................................................................................. 38
VI. System Security and Features Evaluation ................................................ 39
VII. Conclusions & Future Work .................................................................... 44
References .......................................................................................................... 45