“…Furthermore, Dhanesh Menon et al [70] focussed on utilizing the microcontroller present in smart meters which calculates the power output and tariff rates. These data get stored via communication networks and are monitored by some artificial neural network (ANN) protocols to prevent any type of intrusion or attack targeted at it.…”
Section: Past Work Done On Ami Network Securitymentioning
The traditional electrical grid has to be digitally improved as digitalization and effective integration of renewable energy bring better efficiency, intelligence, and safety into the grid; hence, the transition from the traditional grid to a smart grid. A smart grid is a modernized and digitalized standard electrical infrastructure that has a key component known as the advanced metering infrastructure (AMI). AMI, also known as smart metering, is a key technological enabler of the smart grid that allows automatic collection and reporting of power-consumed data via two-way communication networks. However, the collected power consumption data is confidential; hence, its privacy must be maintained. Similarly, for the benefit of the smart grid to be consistently maximized, the AMI data and network security must always be intact despite the evolving threats and attacks targeted at it.This paper provides a comprehensive review of the existing vulnerabilities/attacks, security and privacy challenges associated with the smart metering data and network system, its open issues, and future direction. The major contributions of this review paper lie in the AMI vulnerabilities, AMI state-of-the-art security schemes with their pros and cons, its communication protocols analysis, and its emerging security measures. This gave enumerated recommendations for the efficiency improvement of AMI security in terms of its latency reduction while implementing efficient security measures in its future work.
“…Furthermore, Dhanesh Menon et al [70] focussed on utilizing the microcontroller present in smart meters which calculates the power output and tariff rates. These data get stored via communication networks and are monitored by some artificial neural network (ANN) protocols to prevent any type of intrusion or attack targeted at it.…”
Section: Past Work Done On Ami Network Securitymentioning
The traditional electrical grid has to be digitally improved as digitalization and effective integration of renewable energy bring better efficiency, intelligence, and safety into the grid; hence, the transition from the traditional grid to a smart grid. A smart grid is a modernized and digitalized standard electrical infrastructure that has a key component known as the advanced metering infrastructure (AMI). AMI, also known as smart metering, is a key technological enabler of the smart grid that allows automatic collection and reporting of power-consumed data via two-way communication networks. However, the collected power consumption data is confidential; hence, its privacy must be maintained. Similarly, for the benefit of the smart grid to be consistently maximized, the AMI data and network security must always be intact despite the evolving threats and attacks targeted at it.This paper provides a comprehensive review of the existing vulnerabilities/attacks, security and privacy challenges associated with the smart metering data and network system, its open issues, and future direction. The major contributions of this review paper lie in the AMI vulnerabilities, AMI state-of-the-art security schemes with their pros and cons, its communication protocols analysis, and its emerging security measures. This gave enumerated recommendations for the efficiency improvement of AMI security in terms of its latency reduction while implementing efficient security measures in its future work.
“…These attacks can result in significant loss of revenues, and they can adversely impact the overall power grid operation. Many surveys related work [11], [12], [13], [14], [15] are available in literature detailing various attack scenarios on smart meters and AMIs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Similarly, work in [12], [13], [14], and [15] presented a general theoretical survey of common vulnerabilities in smart meters and AMIs that can be exploited by attackers in launching cyber security attacks on smart meters, AMIs and they provided potential solutions that can be applied for smart grid metering network. Different types of cyber security attacks have been discussed in prior work [16], [17], [18], [19] against smart meters in AMI and Smart Grid environment and they are elaborated below:…”
Section: Literature Reviewmentioning
confidence: 99%
“…Prior work mentioned in the literature above [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], and [24] raised many concerns related to different attack scenarios and potential solutions, most of these works were theoretical in nature, some of them used network simulation techniques or mathematical modelling of the network, however most of these attack scenarios or the proposed remedy techniques were not implemented or tested on real smart meters.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.