Abstract

At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were taken into account. Plaintext is used in the protocol for data transmission, as a result, attackers can easily sniff the information and cause information leakage. In this paper, man-in-the-middle attack was used to verify that the smart meter data acquisition process was vulnerable when facing third-party attacks, and this can result in data eavesdropping. In order to resist such risks and prevent information being eavesdropped, a real ammeter communication experimental environment was built, it realized two-way identity authentication between data acquisition center and ammeter data center. At the same time, RSA (Rivest-Shamir-Adleman) was used to encrypt the meter data, which encrypted the collection, storage process of meter data and ensured the confidentiality and integrity of the meter data transmission. Compared with other methods, this method had obvious advantages. The analysis showed that this method can effectively prevent the data of smart meters from being eavesdropped.

Highlights

  • In December 2015, due to the malicious software attacks in Ukrainian State Grid by hackers, the power grid in many regions was attacked by hacker and 225 thousand people lost power supply [1] [2] [3], it caused great financial loss

  • Man-in-the-middle attack was used to verify that the smart meter data acquisition process was vulnerable when facing third-party attacks, and this can result in data eavesdropping

  • The analysis showed that this method can effectively prevent the data of smart meters from being eavesdropped

Read more

Summary

Introduction

In December 2015, due to the malicious software attacks in Ukrainian State Grid by hackers, the power grid in many regions was attacked by hacker and 225 thousand people lost power supply [1] [2] [3], it caused great financial loss. Wei Yong [7] et al proposed an effective integration method between smart terminals and GIS/PMS systems in order to ensure efficient collection of grid data resources, but it is not effective for solutions against man-in-the-middle attacks and replay attacks. Based on the above background, this paper successfully implemented ARP spoofing by building a real experimental environment to attack the process of meter data acquisition It proved that the process of meter data acquisition was vulnerable to man-in-the-middle attack, which made communication data eavesdropped. To solve this problem, this paper presents a method of data security acquisition for smart meters based on RSA algorithm and bidirectional authentication and encryption. Its security depends entirely on the security of asymmetric algorithm, so this scheme has good expansibility

Safety Problems in Data Acquisition of Electric Meter
Anti-Middleman Attack Method
Two-Way Authentication Scheme
Data Protection of Meter Feedback
Experimental Results and Security Analysis
Data Acquisition Part Testing
Safety Analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.