Colormap memory example in the PUF-based security mechanism.

Colormap memory example in the PUF-based security mechanism.

Source publication
Article
Full-text available
This paper presents a security strategy to protect smart meters against attacks that compromise critical electronic components. Many of these attacks consist of stealing energy by manipulating smart meters’ measurements. For example, a malicious entity can replace or tamper with components that execute measuring procedures and store sensitive param...

Context in source publication

Context 1
... each bit's most common expected value is determined (i.e., whether the evaluated position shall be 0 or 1). Figure 4 uses a colormap to illustrate how the content of the memory maps from Mega A determines the stable bits. The colormap represents the changing probability of the bits positions in a respective region in the memory. ...

Citations

... PUF-based techniques present an intriguing approach utilized in smart metering and grid applications [22]. Numerous PUF-based protocols have been developed for SG/SM, such as the Gope and Sikdar scheme-a key agreement method with privacyaware authentication protocol to improve security in these kinds of applications [23]. ...
Article
Full-text available
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smart meters—as connected devices—introduce new security challenges. To overcome this significant obstacle to grid modernization, safeguarding privacy has emerged as a paramount concern. In this paper, we begin by evaluating the security levels of recently proposed authentication methods for smart meters. Subsequently, we introduce an enhanced protocol named PPSG, designed for smart grids, which incorporates physical unclonable functions (PUF) and an elliptic curve cryptography (ECC) module to address the vulnerabilities identified in previous approaches. Our security analysis, utilizing a real-or-random (RoR) model, demonstrates that PPSG effectively mitigates the weaknesses found in prior methods. To assess the practicality of PPSG, we conduct simulations using an Arduino UNO board, measuring computation, communication, and energy costs. Our results, including a processing time of 153 ms, a communication cost of 1376 bits, and an energy consumption of 13.468 mJ, align with the requirements of resource-constrained devices within smart grids.
... References [13][14][15] are other ECCbased protocols for smart meters that have tried to present a secure infrastructure but in terms of efficiency have some issues that will be discussed in greater detail in Sect. 6. PUF-based schemes are another interesting technique applied in smart metering/ grid applications because physical properties can provide valuable information to detect tampering [16]. There are several numbers of PUF-based protocols oriented to SG/SM. ...
Article
Full-text available
Over the last decade, technological advances in smart grids have permitted the modernization of legacy electricity networks. As Internet of Things (IoT)-based smart grids are becoming an efficient response to managing changing electric demand, the heterogeneous network of equipment required to make these Cyber-Physical Systems a reality poses some security threats. This paper proposes a novel mutual authentication and key agreement scheme to ensure communications security and protect users’ privacy in smart grid applications. In the proposed scheme (named EPSG), an elliptic curve cryptography (ECC) module and a physical unclonable function (PUF) are used simultaneously to provide acceptable confidentiality and integrity levels. The security analysis demonstrates that the EPSG has a robust security posture regarding transferred messages on the communication channel and physical attacks. In addition, EPSG is resistant to modeling attacks as one of the main vulnerabilities of PUF modules. Furthermore, by implementing the EPSG on an Arduino UNO microcontroller, a comparative performance evaluation (e.g., Time 156 ms, Communication cost 1408 bits, and Energy consumption 13.728 mJ) demonstrates the efficiency of the proposed EPSG.
... PUF-based schemes are another interesting technique applied in smart metering/grid applications because physical properties can provide valuable information to detect tampering [16]. There are several numbers of PUF-based protocols oriented to SG/SM. ...
Preprint
Full-text available
Over the last decade, technological advances in smart grids have permitted the modernization of legacy electricity networks. As Internet of Things(IoT)-based smart grids are becoming an efficient response to managing changing electric demand, the heterogeneous network of equipment required to make these Cyber-Physical Systems a reality poses some security threats. This paper proposes a novel mutual authentication and key agreement scheme to ensure communications security and protect users’ privacy in smart grid applications. In the proposed scheme (named EPSG), an Elliptic Curve Cryptography (ECC) module and a Physical Unclonable Function (PUF) are used simultaneously to provide acceptable confidentiality and integrity levels. The security analysis demonstrates that the EPSG has a robust security posture regarding transferred messages on the communication channel and physical attacks. In addition, EPSG is resistant to modeling attacks as one of the main vulnerabilities of PUF modules. Furthermore, 1 by implementing the EPSG on an Arduino UNO microcontroller, a comparative performance evaluation in terms of computational complexity, communication overhead, and power consumption demonstrates the efficiency of the proposed EPSG.
... PUF-based schemes are another interesting technique applied in smart metering/grid applications because physical properties can provide valuable information to detect tampering [16]. There are several numbers of PUF based protocols oriented to SG/SM. ...
Preprint
Full-text available
Over the last decade, technological advances in smart grids have permitted the modernization of legacy electricity networks. As Internet of Things(IoT)-based smart grids are becoming an efficient response to managing changing electric demand, the heterogeneous network of equipment required to make these Cyber-Physical Systems a reality poses some security threats. This paper proposes a novel mutual authentication and key agreement scheme to ensure communications security and protect users' privacy in smart grid applications. In the proposed scheme (named EPSG), an Elliptic Curve Cryptography (ECC) module and a Physical Unclonable Function (PUF) are used simultaneously to provide acceptable confidentiality and integrity levels. The security analysis demonstrates that the EPSG has a robust security posture regarding transferred messages on the communication channel and physical attacks. In addition, EPSG is resistant to modeling attacks as one of the main vulnerabilities of PUF modules. Furthermore, by implementing the EPSG on an Arduino UNO microcontroller, a comparative performance evaluation in terms of computational complexity, communication overhead, and power consumption demonstrates the efficiency of the proposed EPSG.
... Besides, one of the project's goals is the adequate protection of its mechanisms against failures and cyber-attacks. Cybersecurity has become a growing concern in virtually all areas related to new digital technologies [3]- [5]. In the SHM context, data security and reliability impose the need for trustworthy systems, ensuring information integrity and authenticity [2]. ...
Conference Paper
Full-text available
Monitoring systems that capture information from the physical world are becoming increasingly essential nowadays. These systems can integrate diverse technologies such as sensor networks, IoT devices, Big Data analysis, machine learning classifiers and predictors, and other tools that can help protect critical infrastructures, mainly their physical assets. However, limitations regarding hardware and edge computing resources can challenge the suitable implementation of these systems. Furthermore, cybersecurity has become a serious concern since one needs to ensure system availability and the integrity and authenticity of large data amounts. This paper proposes the thoughtful employment of cloud computing resources to address the abovementioned problems, applying microservices and cloud computing for validating blockchain security and monitoring the protection of physical environments. Our contributions focus on two main aspects: a microservices-based architecture to deal with data receiving, analysis, and storage while enhancing availability; and the integration of blockchains as a security mechanism to verify data integrity and authenticity using smart contracts. Moreover, our proposal also discusses the challenges involving blockchains in a Big Data scenario and appropriate mechanisms to deal with scalability and performance constraints. Finally, we present a complete implementation of our architecture using the AWS cloud environment and Hyperledger Fabric platform. Our tests demonstrate how microservices can help increase blockchain throughput. We argue that our architecture proposal and its implementation constitute a suitable solution for modern monitoring systems and serve as a reference model for future works.
... This involves a combination of security utilities, networks, embedded systems, operating systems and intrusion detection and protection systems designed for general purposes. [30][31][32][33][34][35]. ...
Chapter
The considerable increment in power consumption and the quick enhancement of renewables such as wind power and solar power have presented enormous challenges in terms of energy security and the ecosystem, which in the meantime are encouraging the advancement of energy networks in a smarter direction. An advanced grid integrated with two-way power flow ability, inter-device communication, cybersecurity, physical safety, autonomous fault detection, self-healing, and incorporation of renewable energy resources to improve energy efficiency, reliability, quality, and network security can be a potential solution for smarter direction and such type of system is regarded as smart grid (SG). Smart meter is among the key instruments used in the intelligent network. The smart meter is an integrated energy meter that collects data from the load devices of end users and monitors customer energy usage and provides information to the utility provider and/or system controller. A variety of sensors and controls are used in a smart meter, assisted by a specific communication infrastructure. In this context, this paper describes in detail the architecture of the smart meter network, smart meter evolution, various functionalities, and its associated benefits. In addition, it also discusses some security problems and its solution with smart meters.KeywordsAdvanced metering infrastructureMeter data management systemSmart gridSmart meterSecurity issues
... However, one of the project goals regards the proper protection of the SHM mechanisms against failures and cyberattacks. Indeed, cybersecurity has become an increasing concern in practically all the areas related to new digital technologies [1], [7], [16]. Thus in the SHM context, data security and reliability challenges impose the need for trusted systems, ensuring the integrity and authenticity of the information [9]. ...
... When discussing reliability and cybersecurity policies, the correct assignment of identities (also called identifiers or credentials) constitutes an essential requirement [16]. Since identifiers are supposed to be unique [14], they enable the correct identification of entities in a system. ...
... Also, identification is the first step for other elementary security mechanisms as authentication and access control [1], [11], [18]. In most solutions, identification processes rely on cryptographic directives that employ secret keys, public-key signatures, and digital certificates [16]. However, when we consider very simple devices as sensors and low-cost meters, these solutions can become expensive and complex for managing. ...
Conference Paper
Full-text available
This paper presents a comprehensive approach to getting sensors' fingerprints (i.e., identifiers based on physical properties) using machine learning classifiers. The object of study is a dam's structure health monitoring system, which constitutes a suitable tool to protect these critical infrastructures against hazard events. Since cybersecurity is a vital requirement in these systems, the correct identification of each component (including sensors) constitutes a basic premise to provide security mechanisms such as authentication and access control. We develop our study in both theoretical and practical aspects. After presenting the conjectures that basis our strategy, we implement an experiment that simulates conditions observed in a real dam's structure health monitoring system. We evaluate our experiment by testing four different machine learning classifiers. Our contribution portrays the hypothesis that the physical characteristics of piezoelectric sensors and the environment in which they are inserted are propagated through the captured signal. The results indicate an accuracy of over 90\% in the correct sensors identification and attest our approach as a promising cybersecurity solution alternative.
... We conclude that blockchains can be an essential tool to accelerate legal metrology's digital transformation, leading its activities to a new technological level. when measurements and legally relevant information are targets of cyberattacks by malicious entities [6], [17], [18]. ...
... Another aspect is the fast digital transformation in legal metrology [7], increasing the demand for new disruptive technologies to reduce uncertainty and enhance the protection of measuring instruments [4], [6]. As discussed above, blockchain is one of these technologies, and it is difficult to disagree with this claim. ...
... Regrettably, fraud in measurements is a disseminated practice, and the problem occurs mainly due to the profitable income that malicious entities can earn [6], [26]. Many times, fraud is very sophisticated in terms of technological resources and surreptitious behavior [17]. ...
Presentation
Full-text available
Blockchains are an emerging technology with a huge potential to accelerate the digital transformation of different segments. In the context of legal metrology, blockchains can impact many applications and activities related to information management, workflow automation , and reliability of measuring instruments and systems. Further, blockchains depend on oracle devices, which feed the system with information from the external world. When one considers physical assets, smart meters will become these oracles and, consequently, blockchains will require specific legal metrology activities and regulations. In this paper we discuss this mutual interdependency, describing potential applications and research results already published. These topics are key to making scientists and metrologists aware of the implications of blockchain technology and how it will impact legal metrology over the coming years. Published on OIML Bulletin, volume LXII, number 3, pages 10-20.
... Currently, measuring instruments are devices that present high integration and connectivity with different technologies. One can mention smart meters (which constitute examples of IoT devices), distributed measuring systems (which usually involve sensor networks), and other smart components with complex software features [2,[4][5][6]. Although these novel functionalities enhance efficiency and reduce costs, they also increase the attack surface on these systems and devices, introducing vulnerabilities and flaws. ...
Article
Full-text available
The growing demand for solutions related to measurement (e.g., digital sensors, smart meters, distributed measuring systems) imposes several concerns about information and process reliability. In this context, blockchain can play a crucial role as a platform to implement applications and activities in the context of legal metrology. In most countries, the National Metrology Institutes (NMIs) are responsible for promoting these initiatives. Thus, in this paper, we present a functional architecture to integrate NMIs in a collaborative blockchain network. We discuss the main aspects and features that an inter-NMI blockchain network must deliver. Furthermore, we implement our proposal using the Hyperledger Fabric platform. We connect peers from Physikalisch-Technische Bundesanstalt (PTB) (German NMI) and the National Institute of Metrology, Quality, and Technology (Inmetro) (Brazilian NMI) in a useful application that consists of a blockchain-based public-key infrastructure to identify and authenticate smart meters. Our preliminary results demonstrate that the proposed architecture meets the main requirements imposed by applications involving measurements. Furthermore, it opens the opportunity to integrate NMIs from other countries into the project, constituting an important global initiative in the metrology field.
Article
High security and high reliability identification methods are desired in UAV swarms. An identification method for unmanned aerial vehicles (UAVs) based on optical spectrum modulation is proposed by using narrow-linewidth CdSe/ZnS quantum dots. By generating an environmental-information-based key-generation algorithm, UAV <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sub> is capable to promptly produce a key optical spectrum, which conceals its identity codes of UAV <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sub> . When the key optical spectrum transmits to the photodetector of UAV <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> , UAV <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> can decode the key optical spectrum and gain the identity of UAV <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sub> . Solutions are proposed to improve the success rate of identification for UAV <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> , as well as to avoid the problem of spectral floating during the flighting process of UAVs. Success rate of 100% is predicted when the identification system supports no more than 27 types of UAV identities in a group under conditions of a) the digital numbers of all identity codes are within the range of 1 to 3, b) the floating percentage of the optical spectrum is not higher than 14%. The proposed method possesses high simplicity, high success rate, and high confidentiality in identification. It is potential to be applied as a secure communication method in largescale UAV swarms.