Page 102 - From Smart Grid to Internet of Energy
P. 102

Smart metering and smart monitoring systems Chapter  2 87


                Authorization enables users, customers and devices to get right to access
             specific resources and applications. The authorization control ensures pre-
             vention of intentional attacks targeting system security and unauthorized
             intrusions to the system. The authorization process is accomplished by
             assigning specified roles to user types, devices, and several different privi-
             leges are set. The AMI infrastructure will be exposed to violating attacks in
             case of authorization control lacks. The digital certificates, PKI, and AES
             algorithms can be used for authorizing users and devices through AMI sys-
             tem [5, 18, 19].
                The major vulnerabilities of AMI system are listed as unencrypted area net-
             work traffic, bus sniffing, tampering, improper cryptography, denial-of-service
             (DoS) attacks, and authentication weakness.


             2.4.2.2  Security threats of AMI networks
             The security threats targeting AMI networks are investigated regarding to each
             network layer in seven-layer OSI model as a communication network. There-
             fore, the layer attacks are listed as physical layer attacks, link layer attacks, net-
             work layer attacks, transport layer attacks, application layer attacks besides IP
             based and other specific attacks. PHY attacks include tampering, damaging or
             breaking down of metering device and AMI infrastructure. These threats can be
             coped with tamper resistant and damage-free devices transmitting alerts and
             alarms during intrusion detection.
                The link layer enables multicasting by allowing nodes to connect and dis-
             connect to network, and security is enhanced by this way. MAC protocols
             are in charge for channel allocating and deploying available resources to nodes.
             The MAC layer attacks and intrusions are prevented by specified protocols that
             are operating identification filtering. The network layer attacks mostly target
             traffic flow by changing routing tables that are required to deliver transmitted
             message to destinations. The attacker changes routing table to change original
             traffic flow to a specific route and then generates modified message or informa-
             tion to cause traffic jam. The major network layer attacks include DoS attacks,
             routing black holes, and wormholes. The DoS attacks aim to cause disturbances
             on network traffic and eavesdropping on transmitted data. The routing black
             holes are based on hacking a single node and then directing all network traffic
             to hacked node. The wormholes target to create tunneling to change network
             direction to enable attacker to monitor network traffic. The IP is responsible
             to sustain confidentiality and authorization in smart grid communication net-
             works. Therefore, cyber-attacks against confidentiality target IP stacks for
             spoofing, convergence and spying. Transport layer attacks are like IP attacks
             since it is managed by TCP and UDP protocols. The security of AMI networks
             can be ensured by use of data encryption methods as discussed earlier. The data
             encryption is performed by using symmetric or asymmetric key cryptography
             that transmitter and receiver uses the same key in symmetric cryptography
   97   98   99   100   101   102   103   104   105   106   107