Author(s): Musaab Hasan & Arwa Ibrahim
Year: 2020
Language: English
Pages: 52
Abstract ................................................................................................................. 8
I. Introduction ................................................................................................... 9
II. Literature Review ........................................................................................ 11
III. Smart Meter Threats ................................................................................. 16
A. Energy Theft ............................................................................................ 17
B. Identity Spoofing ...................................................................................... 17
C. Denial of Service (DoS) ........................................................................... 18
D. Sniffing and Traffic Analysis ................................................................... 18
E. Malware Spreading .................................................................................. 19
IV. Proposed System Design & Prototype Implementation .......................... 20
Layer 1: Electronic Sensors ............................................................................ 23
Layer 2: Development Board .......................................................................... 25
Layer 3: Power Consumption Logging ........................................................... 26
Layer 4: Client Side Web-based Portal .......................................................... 28
Layer 5: logging to Power Utility ................................................................... 32
V. System Hardening ....................................................................................... 35
Removing unnecessary tools and software packages ..................................... 36
Configuring User Administration ................................................................... 37
Implementing Encryption ............................................................................... 37
Auditing and Logging ..................................................................................... 38
Implementing Networking Precautions .......................................................... 38
Disabling USB Devices .................................................................................. 38
VI. System Security and Features Evaluation ................................................ 39
VII. Conclusions & Future Work .................................................................... 44
References .......................................................................................................... 45