Light-weight Security and Blockchain Based Provenance for Advanced Metering Infrastructure

2019 
The protection of smart meters (SMs) from cyberattacks is of utmost importance because SMs in advanced metering infrastructure (AMI) are physically unprotected and produce a large amount of sensitive data. Due to scalability, the SMs are small-sized and low-cost devices having low computational capabilities. The algorithms that are designed to complete the security requirements of SMs should be lightweight. To address this issue, this paper proposes a lightweight security solution to address the man-in-the-middle attack, data tempering, and blockchain-based data provenance. Received signal strength indicator (RSSI) is used to generate link fingerprints, which are used along with pseudo-random nonce to secure AMI. The proposed algorithm detects the involvement of adversarial node or meter tempering by computing other values along with 0 and 1 as the average of consecutive RSSI and difference between the RSSI of connected static SMs. Pearson correlation coefficient ( $\rho $ ) of 0.9102 is achieved when no adversarial node is present in between the connected SMs having mobility in one or both SMs. Negative or approximately equal to zero values of $\rho $ are computed when the adversary is present in the AMI or any of the SM in the AMI is forged. For blockchain-based data provenance, all the hash values of the packet header are 100% matched with the hash functions present at the data concentrator unit (DCU), which shows no adversary’s involvement in AMI. For cases when the adversary is in the AMI, hash functions show no match with the hash values present at the DCU.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    31
    References
    23
    Citations
    NaN
    KQI
    []