Zohaib Sajid and Duaa Shoukat from the Institute of Computing at Bahauddin Zakariya University in Multan, Pakistan presented on energy theft in Advanced Metering Infrastructure (AMI). AMI allows two-way communication between smart meters and utilities to provide real-time energy usage data. However, AMI introduces security challenges as the distributed smart meters could be targets for energy theft. The presentation defined AMI, outlined methods for attempting theft, discussed protections against attacks, and concluded that digital metering may be more vulnerable to theft than analog predecessors due to increased attack surfaces.
this slide shows what is smart grid ,its comparison between the electromechanical grids . smart meters and devises for the smart grid . benefit of smart grid . and a conclution
Published in 2011, this paper explains the importance of advanced Metering Infrastructure Energy Industry. The need for communicable and possibly smart meters with open communication protocol with smart communication infrastructure and scalable head end system has attained significance. Lets identifies some of the essential requirements for building DLMS based scalable, flexible and open end to end Smart metering systemlarge scale AMI system.
this slide shows what is smart grid ,its comparison between the electromechanical grids . smart meters and devises for the smart grid . benefit of smart grid . and a conclution
Published in 2011, this paper explains the importance of advanced Metering Infrastructure Energy Industry. The need for communicable and possibly smart meters with open communication protocol with smart communication infrastructure and scalable head end system has attained significance. Lets identifies some of the essential requirements for building DLMS based scalable, flexible and open end to end Smart metering systemlarge scale AMI system.
Smart Meter's are a part of Smart Grid,which display the consumption of electricity to end use customer as well as communicate to the utility side for demand side management.
SMART METERS are used for accurate billing and meter readings and sending energy consumption directly to the energy supplier.
In early days, the M2M apps were mostly centered on the automotive and transport sectors and were commercial in nature. As the technology developed, applications in other sectors, such as health, agriculture and energy, also became prominent. However, their usage was more concentrated in the developed nations.
In time to come, M2M apps will dominate all sectors and include banking and real estate.
Smart Grid is an automated, widely distributed energy delivery network characterized by a two-way flow of electricity and information, capable of monitoring and responding to changes in everything from power plants to customer preferences to individual appliances.
A power point presentation on smart grid : transforming the traditional grid including difference with traditonal grid ,components , advantage , disadvantages.
An advanced meters which performs smart functions to simplify the billing procedure and to modernize the grids which can be very helpful to the electricity providers and consumers in future. These meters simplifies the tampering and other non technical problems and also offers accurate electricity bills to consumers which avoids paying of high electricity bills.
A smart meter is an electronic device
that records information such as
consumption of electric energy, voltage
levels, current, and power factor. Smart
meters communicate the information to
the consumer for greater clarity of
consumption behavior, and electricity
suppliers for system monitoring and
customer billing.
Smart Meter's are a part of Smart Grid,which display the consumption of electricity to end use customer as well as communicate to the utility side for demand side management.
SMART METERS are used for accurate billing and meter readings and sending energy consumption directly to the energy supplier.
In early days, the M2M apps were mostly centered on the automotive and transport sectors and were commercial in nature. As the technology developed, applications in other sectors, such as health, agriculture and energy, also became prominent. However, their usage was more concentrated in the developed nations.
In time to come, M2M apps will dominate all sectors and include banking and real estate.
Smart Grid is an automated, widely distributed energy delivery network characterized by a two-way flow of electricity and information, capable of monitoring and responding to changes in everything from power plants to customer preferences to individual appliances.
A power point presentation on smart grid : transforming the traditional grid including difference with traditonal grid ,components , advantage , disadvantages.
An advanced meters which performs smart functions to simplify the billing procedure and to modernize the grids which can be very helpful to the electricity providers and consumers in future. These meters simplifies the tampering and other non technical problems and also offers accurate electricity bills to consumers which avoids paying of high electricity bills.
A smart meter is an electronic device
that records information such as
consumption of electric energy, voltage
levels, current, and power factor. Smart
meters communicate the information to
the consumer for greater clarity of
consumption behavior, and electricity
suppliers for system monitoring and
customer billing.
Smart Grid technology,traditional grid losses,implementation of smart grid leads to change in electrical system of a country, increases economy,decreases losses, a solution for problems faced by traditional grid system.
PC Based Industrial Automation With AVR Atmega 16 - Project ReportRobo India
Robo India Presents A project Report on PC Based Industrial Automation using AVR family's Atmel Atmega 16 microcontroller.
It uses Serial communication technology to communicate between PC and embedded system.
You will learn following aspects-
1. serial communication
2. Input output programming
3. Embedded system
4. AVR atmega 16
6. Controlling
This report also contains complete codding of the project.
Automation or automatic control is the use of various control systems for operating equipment such as machinery, processes in factories, boilers and heat treating ovens, switching in telephone networks, steering and stabilization of ships, aircraft and other applications with minimal or reduced human intervention. Some processes have been completely automated.
The biggest benefit of automation is that it saves labour, however, it is also used to save energy and materials and to improve quality, accuracy and precision.
Please share your views and queries, we are found at-
Website- http://roboindia.com
mail- info@roboindia.com
Project Report on HOME AUTOMATION USING DTMF.
The Project “Home Automation using mobile communication” has different sections such as:
1.Microcontroller
2.DTMF decoder
3. Relays
. This project we propose a unique System for Home automation utilizing Dual Tone Multi Frequency (DTMF) that is paired with a wireless module to provide seamless wireless control over many devices in a house. This user console has many keys, each corresponding to the device that needs to be activated. The encoder encodes the user choice and sends via a GSM transmitter. The GSM receiver receives the modulated signal and demodulates it and the user choice is determined by the DTMF decoder. Based upon this the required appliance is triggered.
NEW STATCOM CONTROL SCHEME FOR POWER QUALITY IMPROVEMENT IN WIND FARM.sannuthi yaramapu
Now a days we are facing so many problems with power quality issues. So in order to mitigate these problems and to improve the power quality we are using new STATCOM control scheme in wind farm.
SINGLE PHASING, PHASE REVERSAL, OVERVOLTAGE, UNDER VOLTAGE AND OVERHEATING PR...Michael George
This paper tends to develop for protection of three phase induction motor from single phasing, phase reversal, over voltage and under voltage. Due to this electrical fault the winding of motor get heated which lead to insulation failure and thus reduce the life time of motor. This fault is generated in induction motor due to variation in induction motor parameters. When three phase induction motor runs continuously, it is necessary to protect the motor from these anticipated faults. Three phase induction motor generally directly connected through the supply, if the supply voltage has sag and swell due to fault the performance of motor is affected and in some cases winding is burned out. When phase sequence (RYB) is reversed due to wrong connection then motor start rotating in another direction, if supply system has only one phase and other phase is disconnected then it is single phasing problem.
Recent simulation for Reactive power compensation using STATCOM that is Static Syncronous compensator on MATLAB software. It having lots of advantages over other conventional methods.
AC Induction motor (IM) are used as actuators in many industrial processes. Although IMs are reliable, they are subjected to some undesirable stresses, causing faults resulting in failure. Monitoring of an IM is a fast emerging technology for the detection of initial faults. It avoids unexpected failure of an industrial process. Monitoring techniques can be classified as the conventional and the digital techniques.
1.1 PROTECTION SCHEME OF INDUCTION MOTOR
Classical monitoring techniques for three-phase IMs are generally provided by some combination of mechanical and electrical monitoring equipment. Mechanical forms of motor sensing are also limited in ability to detect electrical faults, such as stator insulation failures. In addition, the mechanical parts of the equipment can cause problems in the course of operation and can reduce the life and efficiency of a system.
It is well known that IM monitoring has been studied by many researchers and reviewed in a number of works. Reviews about various stator faults and their causes, and detection techniques, latest trends, and diagnosis methods supported by the artificial intelligence, the microprocessor, the computer and other techniques in monitoring unbalanced voltage inter turn faults, stator winding temperature and microcontroller based digital protectors have been recently studied subjects. In these, while one or two variables were considered together to protect the IMs, the variables of the motor were not considered altogether. Measurements of the voltages, currents, temperatures, and speed were achieved and transferred to the computer for final protection decision.
A programmable integrated circuit (PIC) based protection system has been introduced using Microprocessors and the solutions of various faults of the phase currents, the phase voltages, the speed, and the winding temperatures of an IM occurring in operation have been achieved with the help of the microcontroller, but these electrical parameters have not been displayed on a screen.
Nowadays, the most widely used area of programmable logic controller (PLC) is the control circuits of industrial automation systems. The PLC systems are equipped with special I/O units appropriate for direct usage in industrial automation systems. The input components, such as the pressure, the level, and the temperature sensors, can be directly connected to the input. The driver components of the control circuit such as contactors and solenoid valves can directly be connected to the output.
advanced metering infrastructure, advanced meter reading, internet of Things, WiMax, LTE, smart meter analytics, smart meter communication technologies, LTE advanced, WiFi, smart meter architectural blueprint
More details: (blog: http://sandyclassic.wordpress.com ,
linkedin: ie.linkedin.com/in/sandepsharma/)
In this system, we've got to implement within
attack in sub-network mistreatment camera. Whenever
the external person redirects into server that point server
can find so apprize to admin regarding within attack
.False information injection attacks from associate degree
individual’s purpose of read associate degreed displayed
what it takes for an adversary to launch a made attack
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...chennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
Design of a Smart Meter for the Indian Energy ScenarioIJERA Editor
Accurate metering, detection of energy theft and implementation of proper tariff as well as billing system are vital in wise energy management. These objectives can be achieved by using Smart Meters. This article introduces a microcontroller based Smart Meter using wireless communication and LabVIEW suitable for the Indian Energy Scenario. The Smart Meter and Time Of Day (TOD) tariff pricing make the consumers an active part of energy management, thereby energy deficit during peak hours can be alleviated indirectly.
Design of a Smart Meter for the Indian Energy Scenario
AMI-Presentation
1. Zohaib Sajid, Duaa Shoukat
Institute of Computing
Bahauddin Zakariya University
Multan, Punjab, 60,000
Pakistan
Email: zohaibsajid18@gmail.com,
Duaam.shoukat@gmail.com
www.bzu.edu.pk
Energy theft in Advanced Metering
Infrastructure
6th May 2015
2. Zohaib Sajid, Duaa Shoukat
Presentation Overview
What is AMI
AMI Background
Methods for attempting theft
Protections against attacks
Assumptions
conclusion
2
3. Zohaib Sajid, Duaa Shoukat
AMI
- An architecture for automated two way communication
between smart utility meter and utility company with an
IP address.
- An integrated system of smart meters, communication
networks & data management systems
Goal
- To provides utility companies with real-time data about
power consumption.
- Allow customers to make informed choices about energy
usage based on price at the time of use
What is AMI?
3
4. Zohaib Sajid, Duaa Shoukat
AMI Offers efficient, lower cost and sound
energy management system.
It consist of computer based sensor
systems for managing itself.
AMI provide services such as:
--Fine Grained Pricing
--Automatic meter reading
--Demand control
--Power quality management
4
Introduction to AMI
5. Zohaib Sajid, Duaa Shoukat
AMI introduces some security challenges as it consists
of many unfaithful service devices present in the
unsecure places which are providing the cause of
“Energy theft”
AMI Statistics
- Annual Losses in United States are about $6 billion
- Data theft from records when it is given to the utilities
- Attack through software (require less expert attacking group)
- Criminal groups always monitors the attacking statistics and then
attack
- Descrambler boxes cause $4 billion in cable theft per year
5
Introduction to AMI
6. Zohaib Sajid, Duaa Shoukat
AMI is the sensor network of Smart grid
Provides information about energy usage
It enables parties to make decisions about
reducing costs and excessive demand on
interconnected networks, for delivering
electricity, during peak demand
Information about demand is combined
with energy distribution (which is collected by electronic
devices that records the consumption of electric energy e.g., smart meters)
6
AMI Background
7. Zohaib Sajid, Duaa Shoukat
Components of metering infrastructure
providing AMI services are:
- Smart meters
- Communication networks
Four basic functions performed by Smart
meters
- It monitors and records the demand of user
- The outages of power
- Provide delivery information of usage
- And the process of delivering and receiving control messages
7
AMI Background
8. Zohaib Sajid, Duaa Shoukat
AMI gives number of services related to
demand measurement and billing by AMR
(Automatic Meter Reading) facility to
report the demand to utilities via
communication networks.
8
AMI Background
9. Zohaib Sajid, Duaa Shoukat
AMI uses security modeling technology for
energy theft known as “attack tree”
Attack Tree:
- Is a technique in which the goals are divided into sub-goals until the
number of possible attacks are known
- Root node is first node shows the single goal of all possible attacks
- Below root node number of sub-goals shows different approaches
towards root goal
- Leaf node is the last node that shows the specific path which is
followed to achieve the goal
- AND & OR operations are used
9
Energy Theft in AMI
10. Zohaib Sajid, Duaa Shoukat
Who are the attackers
- Before describing the attack tree we’ve to define about the types of
attackers that are motivated to commit theft
Following are the types of attackers:
- Customers (energy is stolen through customers by using different
techniques)
- Organized crime (crime groups are involved for the attack & uses many
techniques such as monitoring sites of attacks)
- Utility insiders (are trusted to be honest in case of analogue meters and
AMI)
- Nation state (may use vulnerabilities discovered in smart meters for denial
of service attacks)
10
Energy Theft in AMI
11. Zohaib Sajid, Duaa Shoukat
Three classes of attacks are defined for theft in attack
tree
1-Interrupt Measurement (Before meter makes
demand measurement)
2-Tamper stored demand (Before storing the demand
values in meter)
3-Modify in Network (After measurement and logs have
left in transmission to utility)
These classes are labeled by attack they are leading to
10
Energy Theft Attack tree
13. Zohaib Sajid, Duaa Shoukat
The only requirement for energy theft is
the management of demand data. There
are three ways to tamper the demand
data. when:
- the data is recorded.
- the data is at relaxation in meter.
- the data in the airlift across the network.
13
Energy Theft Attack tree
14. Zohaib Sajid, Duaa Shoukat
Interrupt measurement:
This class leads two forms of attacks:
Disconnect Meter & Meter Inversion
- The aim of this class is to provide prevention from accurately
measuring the demand and is also existed for analogue meters.
- In AMI, the execution of this class is difficult by logging sensor data
that fixes when power is cut off.
- For undetected execution of attacks like Disconnect meter and
Meter Inversion, the deletion of logged events is compulsory before
the recovery process
14
Classes of Attacks
15. Zohaib Sajid, Duaa Shoukat
Tamper Stored Demand
Leading attacks:
Erase logged events & Tamper Storage
- This class of attacks is limited to the AMR and AMI
- Tamper storage attack provide ability to tamper with the storage of
time-of-use pricing, logs of physical events and executed
commands
- This attack refers to the overwriting of meter’s firmware and is
limited to members of organized crime
- Items of interest: audit logs and record of total demand
- These values can be accessed by administrative interfaces that
requires password
15
Classes of Attacks
16. Zohaib Sajid, Duaa Shoukat
Modify in Network
leads attacks:
Intercept Communication & Inject traffic
- It involves injecting forged values into communication b/w meters
and utilities
- Man in the middle or spoof meter technique is used to inject traffic
- Meter spoofing attack refers to the replacement of meter by a
common device and is sufficient when flaws are present b/w
integrity protocols of meter and utility
- Interposition of attacker is needed on backhaul network for
capturing the protocol from the path between meters and utilities
16
Classes of Attacks
17. Zohaib Sajid, Duaa Shoukat
Environment and tools used for smart
meter security analysis are:
- Reverse Engineering
- Attacking meter communication Protocols
- details about the capabilities of meters
17
System Under Study
18. Zohaib Sajid, Duaa Shoukat
Security analysis shows the design flaws which causes energy theft.
This can be protected by using different techniques.
Physical tampering
Physical based tampering is same as the analogue meter tamper
detection. It identifies attacks such as:
- Disconnect meter
- Meter inversion
- Extract meter password
- Tamper in flight
Tamper evident seal is the mean of detecting only the opening of meter
enclosure.
AMI Security Analysis
18
19. Zohaib Sajid, Duaa Shoukat
Password Extraction
- To protect from overwriting, the password should be hidden or
removed.
- The physical tampering can be achieved through optical port
snooping.
- Optical port protocol is used to communicate with meter and also
found that password is not tampered and transferred to the clear.
Meter Spoofing
- Spoofing attack is used to launch attack against the network host by
placing an unsecure device in the network.
- For authentication of meters and utilities standard ANSI protocol is
used.
- Utility software calculates MAC in which password is being hashed
AMI Security Analysis
19
20. Zohaib Sajid, Duaa Shoukat
Attack
Description
Vulnerability Design
Assumptions
Measurement
interruption
Insufficient physical tamper
protections
a. Physical limitations
Password
extraction
Optical communication is
unsecured.
b. Near field security
Meter storage
tampering
Firmware integrity protection is not
present
c. Physical integrity of meter
Communication
Interception
Intrusion detection is insufficient d. Trusted backhaul nodes
Communication
tampering
Failure to check for replay e. Trusted endpoint node
AMI Security Analysis
20
Table-1. This table shows the summary of vulnerabilities and name of attacks that can be enabled
through them and also the design assumptions along them.
21. Zohaib Sajid, Duaa Shoukat
As the attacks leads to energy theft are defined or handled and
vulnerabilities are shown. So, now we have to understand the design
assumptions also shown in table-1.
Physical Limitations
-Physical security of a meter is limited.
-Existing firmware protections are not linked to the physical attachment
of meter.
Near Field Security
-Insecure communication
-Cooperated meter
-Password can be achieved through special equipment and payment
would be doubled by using that password.
Assumptions
21
22. Zohaib Sajid, Duaa Shoukat
Physical Integrity of meter
- Extension of opposite effort.
- Possibility to tampered with meter’s stored firmware have simple
ability to steal power.
1- hardness in detection of alteration/modification.
2- uploading of malicious software is easy for customers
Trusted backhaul nodes
- Use of encryption & authentication is unsuccessful
- Expected due to confusion of security requirements
Trusted endpoint node
- provides the ability to easily substitute another device for a meter that
encourages the making and delivery of meter spoofing software which
allows theft without leaving any evidence.
Assumptions
22
23. Zohaib Sajid, Duaa Shoukat
We concluded that it is dangerous to use digital
metering system as compared to analogue
predecessors.
Some of the reasons are:
- Amplification of efforts
- Division of labor
- Extended attack surface
Conclusion
23