Smart Metering Communication Protocols and Performance Under Cybe
Smart Metering Communication Protocols and Performance Under Cybe
Smart Metering Communication Protocols and Performance Under Cybe
ScholarWorks @ UTRGV
12-2021
Recommended Citation
Alvarez, Oscar A., "Smart Metering Communication Protocols and Performance Under Cyber Security
Vulnerabilities" (2021). Theses and Dissertations. 607.
https://scholarworks.utrgv.edu/etd/607
This Thesis is brought to you for free and open access by ScholarWorks @ UTRGV. It has been accepted for
inclusion in Theses and Dissertations by an authorized administrator of ScholarWorks @ UTRGV. For more
information, please contact justin.white@utrgv.edu, william.flores01@utrgv.edu.
SMART METERING COMMUNICATION PROTOCOLS AND PERFORMANCE
A Thesis
by
OSCAR A. ALVAREZ
December 2021
SMART METERING COMMUNICATION PROTOCOLS AND PERFORMANCE
A Thesis
by
OSCAR A. ALVAREZ
COMMITTEE MEMBERS
December 2021
Copyright 2021 Oscar A. Alvarez
All Rights Reserved
ABSTRACT
Alvarez, Oscar A., Smart Metering Communication Protocols and Performance Under Cyber
Security Vulnerabilities. Master of Science in Engineering (MSE), December, 2021, 106 pp., 7
The communication process is the key that characterizes the modern concept of smart
systems and can be best represented through the smart meters. Hence, the goal of smart metering
communication is to ensure a secure and reliable transmission of information that can only be
accessed by end users and energy supplying companies. With the goal of improving the
information security in smart energy grids, the research presented in this work focused on
series of experiments performed on smart meters to evaluate their defenses against a set of
cybersecurity attacks. A small-scale simulation of a smart metering system was performed in the
University of Texas - Rio Grande Valley; and specialized software applications were developed
to retrieve data in real time. Our experimental results demonstrated that security attacks have a
considerable impact on the communication aspect of smart meters. This could help making smart
meter manufacturing companies aware of the dangers caused by cyber-attacks and develop
robust defenses against security attacks and enhance overall efficiency and reliability of the
iii
DEDICATION
The completion of my master studies would not have been possible without the love and
support of my family. My mother, Nancy Reyna, my father, Oscar Alvarez, my wife, Adelaeda
Barrera, and my brothers, Abraham Alvarez, and Ricardo Alvarez. I thank you for believing in
me and giving me all your support in the times of need, and happiness. I pray to God for your
success in life, as for me this is a big step that will lead me closer to thus goal.
iv
ACKNOWLEDGMENTS
First, and foremost, I would like to thank God who has given me the opportunity to work
for a master’s degree in electrical engineering, which I have been looking forward to achieving
since I graduated from college. He has helped me stand up in the most difficult times and has
granted me with wisdom to make life-important decisions throughout these years. Second, I
would like to acknowledge Dr. Sanjeev Kumar -a truly knowledgeable, approachable, and
patient mentor. You have demonstrated exceptional mentorship that has helped me grow
Lab colleagues, specially, Harsh Kumar, who generously helped with these studies. Third, I am
whole heartily thankful for the love and support of my family: my mother, Nancy M Reyna, my
father, Oscar A Alvarez, my brothers, Abraham A Alvarez, and Ricardo A Alvarez, and my wife,
Adelaeda Barrera. If there is anything I would never replace, it is the guidance of my mother, the
wisdom of my father, and the unconditional help of my brothers. To my wife, holding your hand
while walking through this path was the most exciting part of this journey. You were always
there for me, and you have proven to be my better half. I want to give special thanks to Gilberto
Mendez, who has also been a great mentor and friend, and taught me everything I know about
smart metering. Finally, to my friends, Miguel Ramirez, Misael Morales, and Jose Luis
Rodriguez whose support was essential during the early days of my career in engineering,
thanks. The support of this research is provided in part by the US National Science Foundation
under Grant No. 0421585, Benston Jr. Endowment Chair in Engineering Fellowship, and
Page
DEDICATION ........................................................................................................................... iv
ACKNOWLEDGMENTS ........................................................................................................... v
vi
2.2 AMI Protocols ........................................................................................................... 9
2.3.3 ANSI C12.19: Protocol for Utility End Device Tables ............................... 16
vii
4.1 Potential Cyber-Attacks on Smart Grid .................................................................... 53
CHAPTER V. RESULTS.......................................................................................................... 70
viii
5.1.2 System Under Flooding Attack .................................................................. 71
Connectivity ............................................................................... 81
5.3 Comparing Impacts of Ping Flood, Smurf Attack, and TCP/SYN Attacks ................ 86
6.3 Conclusion............................................................................................................... 96
ix
6.4 Future Work ............................................................................................................ 98
x
LIST OF TABLES
Page
Table 1: Advantages and disadvantages of common smart metering communication
technologies .................................................................................................................. 8
Table 2: Common meter communication protocols in the market and a brief description ........... 10
Table 6: Smart meters used in the laboratory to create the smart grid ......................................... 44
xi
LIST OF FIGURES
Page
Figure 1: ANSI data frame structure .......................................................................................... 12
xii
Figure 16: S4x Ethernet specifications....................................................................................... 36
Figure 18: Web portal after selecting instantaneous readings option .......................................... 38
Figure 19: Landis+Gyr Gridstream solution. It is the most common form of communication
deployed on Landis+Gyr meters .............................................................................. 39
Figure 22: General Electric’s sample application of EPM 6100 smart meters ............................ 42
Figure 24: Ethernet-based smart grid system designed in the electrical engineering
laboratory at the University of Texas Rio Grande Valley......................................... 44
Figure 25: S4x Ethernet meter’s web portal after selecting energy and demand from the
billing data option .................................................................................................... 45
Figure 31: Photo of the performance laboratory setup at the University of Texas Rio Grande
Valley ...................................................................................................................... 51
xiii
Figure 32: Ping Flood Progression ............................................................................................ 54
Figure 36: Steps in the smart grid to read, store, and retrieve information .................................. 60
Figure 37: Average kilowatt-hour consumption in 72 hours recorded by the S4x Ethernet
meter ...................................................................................................................... 61
Figure 39: Consumption Study. Expected Values vs. Real values .............................................. 64
Figure 41: SG Overseer after a communication session were all three meters shown
successful connectivity ............................................................................................ 68
Figure 43: Baseline used to set a reference for the next experiments .......................................... 71
Figure 45: Ping flood's minimum effective attack bandwidth for each meter used ..................... 74
Figure 46: Recovery times for 1-minute attacks using different attack bandwidths .................... 76
Figure 47: Recovery times for 5-minute attacks using different attack bandwidths .................... 76
Figure 48: Recovery times for 10-minute attacks using different attack bandwidths .................. 77
xiv
Figure 49: Recovery times for 20-minute attacks using different attack bandwidths .................. 77
Figure 50: Recovery times for 60-minute attacks using different attack bandwidths .................. 78
Figure 51: Recovery times for 1-day attacks using different attack bandwidths ......................... 78
Figure 53: Smurf attack’s minimum effective attack bandwidth for each meter used ................. 80
Figure 54: MEAB required on each meter for a TCP/SYN attack to be successful ..................... 82
Figure 55: Recovery times for all three meters after setting a 500 Mbps TCP/SYN attack ......... 83
Figure 56: Recovery times for 1-min attacks with different bandwidths. .................................... 84
Figure 57: Recovery times for 5-min attacks with different bandwidths. .................................... 84
Figure 58: Recovery times for 10-min attacks with different bandwidths. .................................. 85
Figure 59: Recovery times for 30-min attacks with different bandwidths. .................................. 85
Figure 60: Recovery times for 60-min attacks with different bandwidths. .................................. 86
Figure 61: MEABs from different attacks on a S4x Ethernet meter. ........................................... 87
Figure 62: MEABs from different attacks on a EPM 7000 meter ............................................... 87
Figure 63: MEABs from different attacks on a EPM 6100 meter. .............................................. 88
Figure 64: Optical communication session done using ANSI C12.18. ....................................... 89
xv
Figure 66: Communication enclosed in a yellow perimeter while the metrology board is
enclosed in a red perimeter....................................................................................... 90
Figure 68: Optical port in a S4x Ethernet meter is part of the metrology board. ......................... 91
Figure 74: Details of sending an identification packet and receiving a response. ........................ 99
xvi
CHAPTER I
INTRODUCTION
Today, electrical energy is a necessity to execute most of daily regular tasks. Washing
machines, televisions, air conditioners and every single light bulb used at home requires
electrical energy to work. Nevertheless, electrical energy is not cheap. Special machinery,
dedicated personnel, and various resources are necessary to obtain electrical energy. Some
industries have made their business to create this energy for us and, through arrangements with
other companies (utilities), the administration of electrical energy deliverance to each single
household and business has been possible. This administration has led to the creation of a
transformers, and distribution systems to provide consumers with the power they need [1,2].
Thanks to this system, every home has the privilege of electrical energy usage. Yet,
administration of energy is not an easy task. Utility companies must study how much energy
they must deliver, where, and when. Otherwise, a bad administration can lead to disastrous
results, like blackouts that could last weeks. This led to the conclusion that an electrical grid had
to be improved in a way that a proper communication system between the energy administrators
and every single end in the grid were achieved. Hence, the grid stopped being simple, and
became smart.
1
Smart grids became the next generation of power grids due to the use of bidirectional
stream of energy [3]. Communication is the key component for the proper administration of
energy in any smart grid infrastructure [3-6]. Modern technology offers the tools to achieve
successful communication through different mediums and methods. But also, modern
technology has also tools that can compromise a communication between ends. This
The work presented here demonstrates how is a smart metering system severely affected
when modern technology is used to perform cyber-attacks. This thesis begins by introducing
common concepts in smart grid science, then it provides three major contributions: a deep study
experiments involving the use of common cyber-attacks in metering systems, and finally, results
that demonstrate the negative effects of cyber-attacks in the communication aspects of smart
meters. As smart grids are becoming part of humanity’s necessary technology, cybersecurity
must keep studying to help improve the existing communication methods and ensure a reliable
system where consumers can always count with their needed energy and utility companies can
transformers, and power generators that deliver electric energy from the power plant to homes
and businesses [1,2]. The term “smart” comes from the digital technology that allows a two-way
communication between the utility and its customers, and the ability to sense along the
transmission lines. The key to use the enormous potential that this idea offers is the
2
communication. Having the knowledge of the energy a user consumes creates awareness of all
energy consumption. Yet, there are more benefits associated with smart grid as:
Analyzing the places where less energy is required, energy waste can be
considerably reduced. The energy that was not wasted can be used to always
Smart grid allows communication between ends and nodes within the grid. This
meaning that devices can communicate to each other and alert when some are
behaving abnormally.
Reduced operations and management costs for utilities, lowering costs for consumers.
Reduced peak demand, which will also help lower electricity rates.
There are programs where users are asked if they can have a reduced energy
delivered to their homes during peak times, this to ensure energy used on all the
demanding sectors. In exchange, the user obtains reduced electricity rates [4].
Improved security.
Before being called smart, electricity meters, patented by Samuel Gardiner in 1872,
were only capable of providing information about the current flow; and had to be physically
read by a person standing in front of the meter [7,8]. Smart meters are a common form of smart
grid technology; their digital design replaced the old analog meters used in homes to record
3
electrical usage. Smart meters are defined as devices capable of performing two-way
and making possible the access of data from any part of the grid [9]. Smart grids allow users to
monitor the consumption more precisely, so the user can make more informed energy choices.
Work done in [10] explains that in the European Smart Metering Alliance (ESMA), the
•A Supporter of services that improve the energy efficiency of the energy consumption and the
The use of smart meters has been well accepted worldwide. By 2019, the United States
already had installed 94.8 million smart meters out of which 88% were for residential use [11].
In summary, smart meters implement two major functions, which are communication and
measurement. This means that each meter electronic system consists of two subsystems. The
metrology subsystem records the data obtained from the power line, whose interpretation
depends on the program that calibrated the meter. The communication subsystem takes care of
the security and transmission of information [2,12]. Depending on the type of technology used,
field purposes, and manufacturing company’s interests, the communication designed can be
either using wireless technologies (radio, ZigBee, cellular, Wi-Fi), or wired (ethernet, power
infrastructure and ease of connection to difficult areas [3]. A very accurate statement described
by the authors in [7] about a successful implementation of a smart metering system is that the
4
choice of communication technology is the most important aspect to take care of. The final
application, the features of the location, and the topology of the electricity grid, among others,
must influence when choosing the most appropriate technology. Some technology solutions
example, Landis+Gyr offers a solution called Gridstream. This solution, also known as mesh
network, has the advantage of having meters sending their recorded information to all the
nearby meters until reaching the operations center. In the case of an anomaly, the information
travels using the shortest path to their destination [3,13]. In the United States, radio frequency
(RF) technologies for smart metering deployments are the most widely spread. The best-known
topology is called RF mesh, where each smart meter talk to each other and form a Local Access
Network (LAN) cloud to a collector [7,14]. Smart meters also come with a variety of features
such as the remote disconnection, which allows utility companies to disconnect power from a
Before the introduction of AMI, for many years the smart metering system used was called
Automated Meter Reading (AMR). AMR advantage consisted of the remote readings of meters
which allowed the availability of metering data to the utility companies. However, AMR
communication was one-way type, and therefore, meter management was not possible [15-17].
sensors, monitoring systems, and data management systems that enables two-way
communication between utilities and customers [3,4]. The system provides several important
functions that were not previously possible or had to be performed manually such as the ability
5
to, automatically and remotely, measure electricity use, connect and disconnect service, detect
tampering, identify, and isolate outages, and monitor voltage. Hence, AMI makes possible the
data [2]. Data presented in [18] prove through statistics that thanks to AMI implementations,
utilities can identify outages quicker than before which ends in producing lower costs and fewer
inconveniences for both customers and producers. While smart grid extends its definition to all
devices arranged in a network, AMI refers specifically to meter communication infrastructure (an
suppliers) [19].
article [20], the authors defined three types of scenarios depending on the threats to the smart
grid: manipulation, sabotage, and espionage. Each of these scenarios are directly involved with
the three elements of the security triad (confidentiality, integrity, availability). The possible
Confidentiality. An AMI secure system must be the one where all stored information
regarding consumption and billing must be protected to ensure the customer’s privacy
and business. Knowing the energy consumption from a home could let cyber criminals
detect when the peak demand occurs as well as when is the consumption at is minimum.
This would allow anyone to predict when a certain home is empty, and to study the
behavior of customers [2]. Authors in [21] demonstrated how they can identify major
devices by analyzing the energy consumption data from the smart meter. Such
information is useful for espionage from a single individual to a whole community [20].
6
Integrity. An AMI operation is dependent of the integrity of information [2]. To have a
better administration, system owners must know how energy is consumed. Even worse,
reporting less energy consumption in a certain area will lead to disastrous shortages
since energy delivering companies would not be prepared for such consumption.
Availability. This element is the response to the question why smart grid. AMI must
always ensure that any network resources, such as data, bandwidth, and equipment, will
always be available to any authorized entity [22, 2]. Not only having incorrect
information can cause the consequences described before, but also the lack of access to
many studies like in [2] and [20], DoS attacks are of the most dangerous attacks against
an AMI. They overload the communication risking the failure of the functionality and
not many improvements have been done that could prevent these types of attacks.
There are different cyber-attacks that theoretically, could be used to achieve one of the
bullets before. Thankfully, meter manufacturing companies have paid attention to this matter,
and developed meters with strong security. Hence, this work attempts to simulate a system
already implemented in the field and determine through a different type of known cyber-attacks
7
CHAPTER II
Technologies in smart metering communication can be divided in two types: wired and
wireless. Ethernet, powerline, and optical wiring are the most common wired technologies used.
currently the most common wireless used technologies. Each technology has their own
some advantages over wired communications like low-cost infrastructure and ease of
considered as it may fit to one environment, but not to another one (mostly depends on the
infrastructure already in place before a transition to smart metering) [3]. The table below
provides some advantages and disadvantages of most of the technologies mentioned above.
Table 1. Advantages and Disadvantages of Common Smart Metering Communication Technologies [3,23,24,25].
8
Table 1, continued.
networks
Most of machines in this era communicate through signals and information displayed
through strings of letters and numbers. The units used to represent data depend on the OSI layer.
For this work, the units used were frames. For a machine to interpret the information received,
specific rules and standards have been designed so that any computer can receive data packets,
understand them, and execute the proper action according to the information received. These
rules and standards are known as protocols. Generally, communication protocols consist of
defined sequences that begin by having a requesting device identifying itself to the requested
device. After the identification, there must be an exchange of parameters to stablish the
9
communication desired. Not all protocols are used to perform communication rules, but also to
define structures to store and retrieve data. ANSI C12.19 for example, is a set of defined tables
where every bit corresponds to a cell with a name that is associated to a specific state of the
smart device; and table cells can be associated with other cells. Protocols are also used to define
standards for the physical medium used. For example, standards like RS232, RS422, and
RS485, define the electrical characteristics of drivers and receivers for use in serial
communications systems. The study presented in [26] explains the differences between these
three and [27] explains design standards of RS485 (network topology, cable specifications, data
rate). However, these standards define the hardware technology (physical medium) of the
communication system, not the data transmission protocol. Other standards define the protocols
for communication over a RS-485 link. Table 1 displays some of the protocols used to stablish
communication.
Table 2. Common meter communication protocols in the market and a brief description.
PROTOCOL DESCRIPTION
Open Smart Grid Protocol Created by the European Telecommunications Standards Institute (ETSI). OSGP provides reliable
(OSGP) and efficient delivery of command-and-control information for smart meters, direct load control
modules, solar panels, and other smart grid devices. It is one of the most widely used smart meter and
smart grid device networking standards. The full protocol is in [28].
ANSI C12.18 Used for two-way communications with a meter. Written specifically for meter communications via
an ANSI Type 2 Optical Port and specifies lower-level protocol details [29].
ANSI C12.19 Specifies data table structures to store and manage data within the meter’s memory. C12.19 does not
define communication hardware design criteria nor specify the language or protocol used to transport
data [30].
ANSI C12.21 Used for two-way communications with a meter. Written specifically for meter communications via
telephone modem [31].
ANSI C12.22 Describes the communication session over a network for interoperability purposes among
communications modules and meters [32].
IEC 61107 Published by the International Electrotechnical Commission (IEC). It sends ASCII data using a serial
port. The physical media are either a modulated light, sent with an LED and received with a
photodiode, or a pair of wires [33].
DLMS/COSEM It has an object-oriented structure, allowing reading application data of different manufacturer’s
meters in the same way. DLMS is a universal abstract language for meter communication being
standardized in IEC” [33].
Modbus TCP/IP Created for industrial automation systems and controllers. It is an application protocol designed as a
messaging structure defining rules for the organization and interpretation of data. Modbus devices
use a master-slave (client-server) relation [34-36].
G3 PLC. Adapted to the power lines that are already installed in homes running electrical energy. This
protocol was designed to overcome all these adversities in the power line hostile environment with
the use of an orthogonal frequency division multiplexing (OFDM) modulation technique [37].
10
2.3 ANSI Protocols
Most of the information about these protocols was obtained from the referenced
documents [30], [29], [31], and [32]. The American National Standards Institute (ANSI) has
served as an administrator and coordinator of the United States private sector of voluntary
standardization system for more than 100 years. ANSI protocols were designed to help smart
meter companies establishing rules and specifications for the communication between a user
and the meters. Landis+Gyr, one of the leading smart meter manufacturing companies, uses
ANSI protocols to stablish communication with their meters [38]. Generally, ANSI C12.18,
2) Transport of information
To provide their communication capabilities, the rules of all three protocols apply to the
Physical layer
Application layer
Nevertheless, most of the work detailed in all three protocols focuses on the application
layer. ANSI protocols include an application language called PSEM (Protocol Specification for
Electric Metering) that allow applications to read and write over meter memory tables.
11
Figure 1. ANSI data frame structure.
Figure 1 shows the data frame structure followed by ANSI protocols. Where the start of
packet byte is always represented by hexadecimal value EE. The identity byte represents the
C12.19 devices used. The control byte indicates whether if the packet is unique, or if it was
fragmentated. If the packet was fragmentated, the sequence number byte indicates the number
of fragments remaining. The data length word indicates how many bytes of data are being sent
in the frame. Data frames regulated by all three protocols contain a word-long field for cyclic
redundancy check (CRC). The CRC defined by the protocol is the standard polynomial X 16 +
included at the end of the data field. The author in [39] presented an experiment to determine
the efficiency resulted from the interaction between both the checksum and the CRC.
This protocol defines the standards used for optical communication using an ANSI Type 2
optical port. The original protocol ANSI C12.18 is defined in [29]. This protocol defines the
requirements for the physical layer of (optical port and optical cable), and it also describes the
As stated before, the focus of these protocols is the application layer. ANSI defines nine
PSEM (Protocol Specification for Electric Metering) services for data exchange during a
communication session:
12
Identification. Is the first service used. This service returns the version and revision of
protocol.
Read. This service is used to request data stored in the target device. The requesting device
Write. This service is used to write data in the memory of the target device. The requesting
device must specify the memory location where the new data will be written.
channel when the manufacturer does not wish to use the default values established.
Examples of this parameters are baud rates, packet size, and maximum number of packets.
Wait. This service is used to maintain an established communication channel during idle
communication session.
13
Figure 2. Typical communication session using ANSI C12.18.
ANSI C12.21 was designed for communications between smart devices using modems
connected to the switched telephone network. The original protocol ANSI C12.21 is defined in
[31]. The structure of C12.21 was designed as an extension of C12.18, but applied for a
different communication medium, which required a bigger number of PSEM services and an
extended use of tables from C12.19. Another two major differences are that C12.21 does not
define the physical layer standard and both protocols listed differences for their data-link layers.
C12.21 provides important information about the communication channel settings, the CRC
14
selection, acknowledgement, retry attempts, timeouts, and collision. The communication
channel settings can be subdivided into the two types: fixed settings, and variable settings.
Listed below are the differences between the services defined by C12.21 compared with
Authenticate Service. Used when a higher level of security is desired. It provides a two-
Negotiate Service. Same as in 12.18, but baud rate is ignored because the data rate for
Terminate Service. Provides for immediate transfer to the base state. All parameters
optional service.
15
Figure 3. ANSI C12.21 typical communication session.
The original protocol ANSI C12.19 is defined in [30]. Unlike C12.18 or C12.21, C12.19
does not specify any type of rule or parameter used for the transportation of data. C12.19
stablished a multi-table structure used to allocate data in the memory of the smart meter. ANSI
C12.19 defines several tables, yet the three major ones are:
Standard tables
16
Manufacturer tables
Due to all the development done on C12.19, this protocol has been well accepted to define
the data model even for non-ANSI protocols. In article [40], the author explains the
improvements and extensions done to the protocol since its first published version in 1997. The
author in [41] explored the use of ANSI C12.19 to implement a DDS middleware with the
intention to prove it as the best solution to address the heterogeneity and complexity of
When a data frame requesting to read/write information is received by the device, the frame
must have the table intended as well as the fields required identified. Each field in the table
represents a bit or bits of memory. The table below represents an example of a C12.19
implementation.
STANDARD TABLE 20
FIELD DATA TYPE
ED_MODEL CHAR [5]
FIRMWARE VERSION UINT8
FIRMWARE REVISION UINT8
SERIAL NUMBER CHAR [3]
Using ANSI C12.18, if the user wishes to obtain the information from the standard table
20 in Table 3, the read request data frame would be EE0000000003300014382C. Down below,
EE Start of packet
00 C12.19 identity
00 Control
00 Sequence number
0003 Length of DATA – 3 bytes
30 DATA – Requesting to read full table
17
0014 DATA – Table Id: 20 (decimal value)
382C CRC
by sections.
EE Start of packet
00 C12.19 identity
00 Control
00 Sequence number
000E Length of DATA – 14 bytes
00 DATA – OK (ACK)
000A DATA – length of TABLE DATA: 10 bytes
5554524742 DATA – TABLE DATA: ED_MODEL (CHAR [5]) – UTRGV (ASCII)
0A DATA – TABLE DATA: FIRMWARE VERSION (UINT8) – 10 (decimal
value)
4B DATA – TABLE DATA: FIRMWARE REVISION (UINT8) – 75 (decimal
value)
4A853F DATA – TABLE DATA: SERIAL NUMBER (CHAR [3]) – 4,883,775
(decimal value)
19 DATA – Checksum
432C CRC
The user will interpret that the device model name is “UTRGV”, the firmware version is
“10”, the firmware revision is “75”, and the meter serial number is “4,883,775”.
Networks
Using all the definitions from ANSI C12.18 and ANSI C12.21, plus the table structure
defined by ANSI C12.19, ANSI C12.22 was created to make ANSI applications possible to
transport data to any type of network communication system. The author in [42] provides a survey
18
The original protocol ANSI C12.22 is defined in [32]. The standard focuses on defining
the services used to stablish a communication session between two ANSI devices and how can
an ANSI device can communicate with a device from another protocol. To achieve the extend
of the protocol, C12.22 introduces the Extended Protocol Specification for Electric Metering
(EPSEM) which differentiates from PSEM because of the inclusion of more services than the
ones used in previous ANSI protocols. Besides the introduction of EPSEM, the standard defines
data management procedures on more OSI model layers than in previous protocols and it adds
more table information to C12.19 to assist the allocation of values used for network
communication of any kind. The table below displays the extra services used in the application
layer.
SERVICE DESCRIPTION
Registration Adds and keeps routing table entries of C12.22 relays active. To be part of a C12.22 network, a C12.22
node shall send a registration service request to one of the C12.22 master relays.
Deregistration Removes routing table entries of C12.22 relays, master relays, and provide service discontinuation of all
the C12.22 master relay authentication and notification hosts.
Resolve Retrieves the native network address of a C12.22 node. This native address is used to communicate
directly with other C12.22 nodes on the local area network.
Trace Retrieves the list of C12.22 relays which has forwarded a C12.22 message to a target C12.22 node.
The network topology used for ANSI C12.22 communication requires C12.22 gateways
for the translation of the C12.22 protocol to other protocols. The purpose of this architecture is
to allow the creation of C12.22 devices that can reside on any type of network. This architecture
also allows the development of C12.22 communication modules that can interface any C12.22
devices to specific networks. Transport layer services are defined to facilitate setup,
19
The Data Link Layer is used only for communication between the C12.22 device and the
C12.22 communication module. Figure 4 below represents the general idea of the data flow
conjunction with the Advanced Encryption Standard (AES) block Cipher with 128-bit keys. The
protocol provides the ability to both protect the privacy of portions of a message, as well as
authenticate the entire message. To successfully exchange authenticated and private messages,
each side of the communication link must share the same cipher-algorithm and key [32].
Although the security aspect may seem well developed, authors in [43] claim vulnerabilities that
Most information about this protocol was obtained from the referenced documents [34],
[35], and [36]. Modbus TCP/IP was created for industrial automation systems and controllers. It
20
is an application protocol designed as a messaging structure for the organization and
interpretation of data. This protocol is independent of the transmission medium (physical layer)
since it uses Ethernet technology which is standardized by IEEE 802.3. MODBUS TCP/IP
devices use a master-slave (client-server) relation in which one device (master/client) initiates a
transaction (query), while the slaves (servers) respond by returning the requested data to the
master. A client’s transaction is a data packet consisting of a server address, a function code
defining the requested action, data required for the transaction, and an error checking field. A
server’s response consists of fields confirming the action taken, data returned, and an error
checking field. The error check field of the server’s message frame allows the client to confirm
if the contents of the message are valid. Hence, the client/server model; is based on four types
of messages:
Modbus Confirmation – used by the client to confirm the response sent by the server.
Modbus Indication – used when the request message is received by the server.
Figure 6 displays a representation of the network architecture for a system using Modbus
21
three different types of devices: MODBUS clients, MODBUS servers, and Interconnection
Modbus TCP/IP defines a Protocol Data Unit (PDU) as the basic data frame, which consists
of a function code and the data of interest. For traditional serial Modbus, the PDU gets extra
fields added (additional address and error check) making the packet to become an Application
Data Unit (ADU). The data field in the PDU includes register addresses, count values, and
written data. When the slave device responds to the master, it uses the function code field to
TCP/IP refers to the Transmission Control Protocol and Internet Protocol. These
22
protocols allow data to be exchanged between computers. TCP ensures that all packets of data
are received correctly, while IP makes sure that messages are correctly addressed and routed.
Modbus TCP/IP combines a physical network (Ethernet), with a networking standard (TCP/IP),
In Modbus TCP/IP, the client that initiates the transaction builds what is called a MODBUS
Application Data Unit. This unit uses a header called the MBAP (MODBUS Application
Protocol) to identify itself when is used on TCP/IP layers. Modbus TCP/IP Application Data
Unit consists of a 7-byte header, and the protocol data unit (function code + data). The PDU is
embedded into the data field of a standard TCP frame and sent via TCP to system port 502,
which is specifically reserved for Modbus applications. Modbus TCP/IP clients and servers
23
As shown in Figure 8, the MBAP header consists of a transaction identifier, protocol
Transaction Identifier (2 bytes). This field has the purpose of identifying the response or
Protocol Identifier (2 bytes). Used to identify the protocol used. Always 0 for Modbus.
Unit Identifier (1 byte). Identifies a remote slave connected on a serial line or other
buses.
With Modbus TCP/IP, a Modbus server is addressed using its IP address. When a
Modbus client wants to send a message to a remote Modbus server, it opens a connection with
remote port 502. As soon as a connection is established, the same connection can be used to
The Data Link Layer specification for Modbus TCP/IP uses the CSMA/CD protocol
(Carrier Sense Multiple Access w/ Collision Detection) to arbitrate access to the shared Ethernet
medium. With CSMA/CD, any network device can try to send a data frame at any time, but
each device will first try to sense whether the line is idle and available for use.
client and the server, which uses Berkeley Software Distribution (BSD) socket interface to
manage TCP connections. As a note, the document [34] remarks that BSD is not the only type
24
Figure 9. Typical Modbus TCP/IP communication session
The communication session as displayed in Figure 9, begins with the application on both
sides using the socket() function. The socket() function creates a virtual socket (endpoint of
communication). The bind() function binds a port number to a socket. The server always uses
port 502. Once the sockets have a port number associated, the client uses the function connect()
using as parameters the socket, the server IP address, and the port number. The connect()
function is used to begin the connection sending an SYN packet to the server. At this moment,
the server uses the function listen() to receive the SYN and immediately responds. Once the
client has acknowledge the response from the server, the server uses the accept() function to
complete the connection. After this procedure, both server and client can begin the transfer of
25
data through the functions recv() and send(). An advantage of this protocol is that the client can
send as multiple requests as desired without having to wait for a response to each request. Once
all the requests have been responded, to end the session, the client must use the close() function
and wait for the acknowledge from the server. Once the server has sent its ACK packet, the
server will also use the close() function and wait for the client’s ACK packet to finally end the
communication session.
Powerline communication is a technique that uses the existing powerlines to transmit high
speed data and establishes a direct connection with the meter [44]. This protocol was designed
to overcome high interferences and collisions for frequencies below 500 kHz in the hostile
environment of the power lines and has been successfully implemented in urban areas where
other solutions struggle to meet the utility needs [3]. To overcome the hostility, the standard
efficiency when using all the available bandwidth. Because of the noise, interference and other
factors, a robust communication is only possible through the application of advanced channel
coding techniques [37]. Authors in article [45] perform a study of G3 PLC implementation to
demonstrate that the use of the encoder/decoder, Interleaver, and the modulator, can be
protocol, smart devices must incorporate PLC technology in their hardware. Another concern
about the powerline was the effect over the meters in regards of accuracy in their metrology and
communication ability. Fortunately, the author in [46] demonstrated that PLC signals do not
26
Article on [37] explains all the details related to the protocol specification. Since the power
line communication medium is not as suitable as the medium used for the previous protocols,
the use of more processes is required before sending data into the communication line which
include the use of OFDM. The following figure represents the diagram followed by G3 PLC for
Figure 10. G3 PLC protocol. Data is manipulated through different processes before being sent through the power
line [37].
Except for the FCH (Frame Control Header), Data, and Power Line diagram blocks from
Figure 10, all other blocks perform a manipulation of data essential for the standard. The first
two blocks in the G3 PLC diagram are the data with its FCH. Before the data is sent to the
1. Typical. Each frame begins with a preamble used for synchronization and detection in
addition to automatic gain control adaptation. The preamble is followed by the frame control
header (FCH) which contains control information to demodulate the data frame.
27
Figure 11. G3 PLC Typical data frame [37].
2. ACK/NACK. It only consists of the preamble and the frame control header. Since the frame
is used only for acknowledgment purposes, it does not need to contain data fields.
For both cases, the frame control header is protected with CRC5 and CRC8 depending on
band plan:
The data to transport in the physical frames is provided by the upper layers as a byte
stream and it is read with the most significant bit first into the scrambler as seen in Figure 11.
The data scrambler gives the data a random distribution using the generator polynomial
S(x) = x7 ⊕ x4 ⊕ 1
28
As shown in Figure 10, once the frame passes through the scrambler, it continues
through the Reed Solomon encoder, which is used to correct errors by adding redundancy to the
original data. The convolutional encoder is another type of correction code that can correct
errors by adding redundancy to the data stream. Hence the convolutional and the Reed Solomon
encoder provide redundancy bits allowing the receiver to recover lost bits caused by
background and impulsive noise. The Interleaver helps the data to protect against two types of
errors:
2. Frequency deep fade: corrupts a few adjacent frequencies for many OFDM symbols.
Once the data has passed the Interleaver block, it enters the OFDM modulator. The
orthogonal subchannels to transmit data. It splits the information into several subchannels
allowing an optimal use of the available spectrum. The OFDM addresses the following
objectives:
2. Provides a minimum of 20kbps effective data rate in the normal mode of operation.
3.Ability to notch selected frequencies, allowing the cohabitation with S-FSK narrow band
communication.
4. Dynamic tone adoption capability to select frequencies on the channel that do not have major
interference.
29
The following figure provides a general representation of the physical frame (PHY
frame), which is the data packet after being manipulated through the required processes before
G3 PLC defines standards only for layers one and two of the OSI model. Messaging
exchange between the physical layer and the data link layer begin with the receipt of a data or
received, the end that received must reply with a confirmation packet (PD-DATA.confirm or
For the case of the data link layer, the specification is subdivided in two sublayers: MAC
sublayer, and the adaptation sublayer. The channel access in the MAC sublayer uses the carrier
sense multiple access with collision avoidance (CSMA/CA). MAC sublayer deals with the
necessary fields to make the transmission successful between the data link layer and the
physical layer, while the adaptation sublayer helps with the interface between upper layers in
the OSI model with the data link layer. In article [37], the author provides a chart that resembles
a complete messaging sequence between two ends in the system. Figure 14 displays the
messaging sequence.
30
Figure 14. G3 PLC communication session between two end devices involving both first and second OSI layers
[37].
Table 5. G3 PLC commands used for a communication session. There are more defined in [37].
COMMAND DESCRIPTION
PLME_SET_TRX_STATE.request Requests the PHY to change the state of the receiver (ON) and turns off the transmitter.
(TXOFF_RXON)
PLME_SET_TRX_STATE.confirm Confirms the PHY changing state, SUCCESS meaning that both the Receiver and the
PLME_CS.request Requests the PHY to get media status using carrier sense.
31
Table 5, continued.
PLME_SET_TRX_STATE.request(TXON_RXOFF) Requests the PHY to change the state of the transmitter (ON) and turns off the
receiver.
PD_DATA.request Requests the transmission of a MAC protocol data unit (MPDU) to the PHY
PD_Ack.indication(ACK) Indicates the reception of the ACK frame from the PHY to the local MAC
sublayer entity.
PD_DATA.indication Indicates the transfer of a MPDU from the PHY to the local MAC sublayer.
PD_ACK.request(ACK) Requests to send an ACK frame to the PHY from the MAC sublayer.
MCPS-DATA.indication Indicates the reception of data from the MAC sublayer to the adaptation.
Beside the specifications for the physical and data link layers, G3 PLC protocol also
defines its security procedures. First, an end device must be identified and pass through an
authentication procedure to access the network. This is achieved based on two parameters:
-A 128-bit shared key between the end user and an authentication server, which is used as a
The authentication and identification processes are activated when an end device restarts
Confidentiality and integrity are insured at two different levels: MAC level and EAP-
PSK level. At the MAC level, ciphering is used when delivering any frame between nodes in
32
the network. MAC frames are encrypted and decrypted at every hop using a group master key.
At the EAP-PSK level, confidentiality and integrity are protected according to IETF RFC 4764,
where the service is known as protected channel (PCHANNEL) between the EAP server and
any peer.
Taking into consideration that DoS attacks are usually difficult to prevent, for the case
of G3 PLC, the impact of a DoS would only affect a small area. This is achieved by preventing
unauthenticated devices accessing the network and not having malicious actions on routing.
G3 PLC prefers the use of pre-shared key EAP to achieve the security that it offers. It
consists of a 128-bit group master key generated by the EAP server and delivered to all peers
via the EAP-PSK protected channel (PCHANNEL). EAP-PSK key hierarchy overview is
33
CHAPTER III
For an accurate smart metering system assimilation, the setup consisted of three smart
devices (smart meters), a computer to monitor the system, a small-scale electrical setup, and
energy loads. For reference, all meters were setup in a fashion to always measure the same load.
Each meter represents either a business or a home and report their consumption in real time.
The monitoring computer has access to all information stored in meters as long as all devices
are connected to the grid. The types of communication involved in our experiments were
smart grids and how they are not widely implemented due to the high costs in equipment and
challenging redeployments during emergencies. However, their high security has kept ethernet
smart grids an option in today’s implementations [2]. According to most sources, the most
Landis+Gyr
Itron
Aclara
Elster Group
Sensus
34
Because of their capability to communicate using ethernet technology, this study was
Document [48] describes E650 S4x meters as designed to be the foundation for a
complete metering infrastructure. They can yield a complete package for accessing real-time
voltage, current, and load data monitoring, extensive user-defined event and tamper alerts, data
and graphical load analysis capability, and vector diagrams. Communications boards, such as
RS485, RS232, and Ethernet boards can be supplied with the meter from the factory or added to
a meter in the field. An optical port (ANSI Type II ) is provided for programming and recording
35
Allows access to up-to-the minute information including status, meter
networks
36
Landis+Gyr offers a web portal that can be access by only entering the meter assigned
IP address into the web browser of preference. The web page requires a username and password
that will have to be provided by the utility company. Once the user logs in, the website will
display a menu of options that contain the desired information from the meter, such as the
energy consumed, the voltage and current being read, the frequency detected, MAC address,
etc.
37
Figure 18. Web portal after selecting instantaneous readings option.
Unlike the rest of the meters produced by L+G, E650 S4x Ethernet meters are relatively
new in the market. Most of metering solutions offered by Landis+Gyr communicate using radio
technology when they are deployed in the field. The most common solution in L+G is called
Gridstream. This works in the form of a mesh network where each device can access the
transmitter and receiver. Gridstream consists mainly of the following elements: energy loads,
38
smart meters, network routers, data collectors, and the command center software. Energy loads
are any device connected to the electrical grid of the home, business, or industry that consumes
electrical power. All meters are interconnected and share their information until reaching the
nearest data collector. If a data packet must be sent, the meter, knowing the location of the
nearest data collector, will send the data though the minimum number of meters required and
network routers (this is finding the shortest path). Network routers provide a powerful hub for
moving information through the network and to another network router. The data collector is
the link between the smart devices and the head-end software used by the utility company to
process all the data from all meters. The command center software is the interface between the
network and the multiple data management tools and applications used by the utility company.
The following diagram represents in simple manner how the Gridstream solution works today:
Figure 19. Landis+Gyr Gridstream solution. It is the most common form of communication deployed on
Landis+Gyr meters.
However, for the case of E650 S4x Ethernet meters, the Gridstream solution does not
apply. There reason is the communication medium. Gridstream is based on radio transmission
39
technologies, while Ethernet, like the name implies, communicates using ethernet technology.
Therefore, its deployment and communication structure are completely different. The way the
Ethernet solution works consists of the following elements: energy loads, smart meters,
networking devices, modems, and the cloud. All energy loads must report the consumption to
the smart meter. A networking device permits the availability of the meter information into a
local area network. The modem allows the meter to send its collected information into the
cloud, where it can be accessed remotely from a far distance by other intended users.
Figure 20. S4x Ethernet field deployment example. This particular example involves three meters in a single
location. Usually only one meter is used per location.
The grid begins by having all energy consumption read by the smart meter, who
afterwards, sends the data through an ethernet cable in the form of a digital signal to a
networking device (for example, routers). Routers are devices capable of taking the digital
signal delivered from the modem and retransmit it to multiple devices using ethernet cables or
wi-fi technology. Thanks to routers or similar networking devices, a local area network can be
40
built, and users connected to the local area network may access the meter information. For users
out of the LAN, the router will take the data from the meter and retransmit it to the modem
using the same communication medium. The modem is a networking device capable of
receiving a digital signal and converts it into an analog signal. Once the modem has finished
converting the digital signal into an analog signal (demodulation), it sends the analog signal to
the internet service provider (cloud). Having the information in the cloud, users outside the
LAN could access it by retrieving the analog signal with this information and modulate it with a
second modem. As already mentioned, the service that Landis+Gyr S4x Ethernet meters offers
consists of letting the user access all the concerning information from the meter with the use of
a web portal. The user can be able to access information such as the total watthour recorded, the
actual voltage, current and frequency that the meter reads, and other billing data.
General Electric’s document [49] describes EPM 6100 as a multifunction meter that
allow users to monitor and manage energy usage within factories, businesses, and across
41
campuses. It features ANSI C12.20 (0.2% class) accuracy, RS485, RJ45 Ethernet or IEEE
802.11 Wi-Fi communications. EPM 6100’s installation is practical, easy to use, and General
Electric provides a software application that allows detailed studies on energy management. For
this thesis, the communication aspect studied in EPM 6100 is the ethernet communication
system.
Figure 22. General Electric's sample application of EPM 6100 smart meters [49].
General Electric’s document [50] describes EPM 7000 as a meter capable of measuring
three-phase systems with waveform capture (512 samples/cycle) and data logging. The meter
supports Ethernet communication (100 BaseT), and it can perform energy measurements with
0.2% accuracy. EPM 7000 is a useful tool capable of supporting disturbance recording and
power quality studies. Like with EPM 6100, General Electric provides a software application
that allows users to manage and study the energy recorded by the meter, plus, like with the S4x
42
Ethernet meter, EPM 7000 also provides a web portal where the users can find the meter
information.
We built a smart metering system that complies with the basic idea of communication
that ethernet grids used. For all our experiments, we used fans, light bulbs, and motors as loads.
Given that we only required a local area network for our experiments, there was no need to get a
modem. Hence, the most appropriate device to control the traffic of data was a network switch.
Here is where the meters were connected on different ports, and on another port a computer was
connected to monitor all the data gathered by the meter (this is the command center, or utility
company). Therefore, our laboratory can be represented with the following diagram:
43
Figure 24. Ethernet-based smart grid system designed in the electrical engineering laboratory at the University of
Texas Rio Grande Valley.
Even though network switches keep a table with all the devices’ MAC addresses, the
transportation of data is done using layers 2 and 3 of the OSI model. This, meaning that for
Table 6. Smart meters used in the laboratory to create the smart grid.
Meters 1 and 3 have the capability of letting the user access a web portal to get the
information recorded by the meter. Meter 2 comes with a specialized software provided by the
44
3.6 AMT Monitor
Once having the communication networks and the electrical circuit setup ready. We had
to make sure that we were recording the data properly. As already stated, for the case of the
L+G meter, the manufacturing company offers a web portal to the utility company to check on
the values recorded by the meter, this same portal was used by us, since we are simulating to be
Figure 25. S4x Ethernet meter’s web portal after selecting energy and demand from the billing data option.
However, our experiments would require long lasting times of even weeks, and our
values had to be recorded per hour, minute, or even seconds. Therefore, a specialized software
application was developed to make this job easier and human-error-free. This application was
baptized with the name of Automatic Meter Transmission Monitor or AMT Monitor.
45
Figure 26. Automated Meter Transmission Monitor (AMT Monitor).
The development of AMT monitor became essential to this thesis as it provided critical
information that revealed how the meter behaves regarding consumption and communication to
the user. This software application was designed using Visual Studio in the .NET platform. The
46
AMT monitor was designed to follow the following functioning diagram:
Before beginning the process, the user must enter three parameters:
Sample size. Determines the number of readings that will be taken by the software.
Time Interval. Determines the time that the software will take to read the information
from the meter between samples. This time is set on seconds. Meaning that one reading
File. This field will contain the name of the log file that the software will create after
finishing the test. Log files are always stored in C:\temp. Once the software is installed,
the user must manually create this folder, or the application will crash.
After setting the parameters correctly and starting the test, the software begins by
sending a ping request to the meter. If successful, then the test proceeds. The next step is
47
accessing the web portal, followed by an automatic login, and it ends displaying the billing
information. Once the billing information is displayed, AMT Monitor will fill the two
WH. Displays the watthour recorded at the time. Units are in Kilo watthours.
After displaying the readings in the boxes, the test will repeat the same process as many
times as indicated in the sample size field. Once the last test is done, the user can check all the
readings in the log file created. The log file is a text file that contains the time and KWH of
48
every single sample taken during the test. As a note, the user does not have to wait until the
whole test is done to access the log file, after the first reading, the user can access the log file at
any time. This is done in case the user detects an irregularity during the test.
Once the software was developed and the smart grid system was terminated, several
tests were done until all the minor details were fixed. At the end, the system could have the
meter recording data for as many days as desired and the software could take readings with a
small probability of interruption of 1/73. This meaning that every reading had a failure
probability of 1.34% Still, the results were satisfactory enough to proceed with the real
experiments.
49
3.7 Performance Measurement
The final element to complete the laboratory is the attacking computer. To study the
systems as if it were one more element in the grid. The idea of this experiment was to attack the
50
Figure 31. Photo of the performance laboratory setup at the University of Texas Rio Grande Valley.
51
CHAPTER IV
Smart meters can provide detailed information about how the user spends energy, billing
utility companies to remotely cut the power out of a facility or a home. All these new features
can bring great advantages with the goal of optimizing energy, yet it can also bring risks in
security of information. If an action performed by a third party ends up affecting any of the
cyber-attack. Cyber-attacks are threads to any computer system, including smart grid systems.
In November 2011, an attacker was able to gain access to the control system of an Illinois
municipal water supplier and remotely disable operating equipment [51]. High reliability and
availability are essential for energy management in smart grids [52]. For this work, a series of
different attacks were analyzed to determine which ones could apply to the intended system.
Taking into consideration that an attacker must force access to a wired system, like the one
presented in this research, because of how easier is to secure it compared to wireless systems
[52], this work’s approach was not done to attempt violating specifically the meter security
layers; but to evaluate the security of the smart grid system, which refers to the meters along
with the communication medium and the monitoring software. Our experiments are similar to
the ones performed in [53]. However, our performance simulator is a specialized tool that
testing. Hence, our results are different from [53] and are discussed in the following chapters.
The most common cyber-attacks that were considered for this research, which are
described below, are DOS, ping floods, smurf attack, TCP/SYN attacks, and HTTP attacks.
4.1.1 DOS
Standing for Denial of Service, the goal of this type of attack is to make a machine or its
resources unavailable to its user. There are different DOS attacks (some are below). Typically,
DOS are accomplished by flooding the intended machine with dummy data packets that prevent
the flow of traffic in the communication channel. Many sources like authors in [2] agree that
DOS is one of the most dangerous attacks against AMI. These types of attacks risk the failure of
the functionality when not detected and quarantined early enough. Although some security-
enhancing works like key management schemes offered by the authors from [54] and [55]
propose in AMI have been investigated and implemented, there has not been an ideal solution
A ping is a simple data packet sent to a machine that requests a response. The purpose of
this request is to ensure that the machine responding is available to communicate and displays
the time taken for the response to arrive. In simple terms, a ping verifies availability and speed
of communication between two devices. Ping floods are common denial of service attacks in
which the attacking device saturates the target machine by sending an overwhelming number of
53
pings. The saturation occurs because for each ping send by the attacking device, the internet
control messaging protocol (ICMP) indicates that the end machine will have to send a response.
Since the number of requests and responses are significantly enormous, the network medium
gets saturated consuming critical bandwidth and thus, communication becomes impossible until
all the pings have been responded by the targeted device. Nevertheless, the attack will only
become successful when the attacking device can use more bandwidth than the targeted device,
only this way, the attacker will ensure to send more packets than the ones the victim can
54
4.1.3 Smurf Attack
Like the ping flood, a smurf attack is another type of DOS attack. In this case, a large
number of Internet Control Message Protocol (ICMP) packets with the intended target’s false IP
are broadcast to a whole network using an IP broadcast address. By protocol, all the devices in
the network receiving the ICMP packets will respond using response packets directed to the
source address. In this attack, the source address is the victim’s address. Therefore, depending
on the number of devices in the network is how the attack will increase its severity.
This is another DOS type of attack. In this case, the attack focuses on the TCP three-way
handshake feature to consume resources and saturate the communication network. In a regular
stablish communication. Once the intended device receives the SYN message, it acknowledges
55
it by replying with a SYN-ACK (synchronized-acknowledge) message. Finally, the third step of
the establishment ends by having the initial device receiving the SYN-ACK message and
SYN flood attacks use this concept by having the attacker send multiple SYN packets to
a targeted machine. The machine will receive all the different SYN packets as legitimate and
will acknowledge every single one of them. Nevertheless, the attacker would not accept any of
these packets, and therefore, will not send the final ACK packet to establish communication.
The targeted machine will remain on wait because the connection will stay open until receiving
the ACK message. Since the connection cannot be closed by the targeted machine, it will have
to wait until the connection times out. However, just before the connection times out, the
attacker will send another group of SYN packets causing the targeted machine to end up with
connections half open. As the number of half open connections increase, the targeted machine
will begin to lose its ability to establish connections with legitimate devices until it cannot
56
4.1.5 HTTP Attack
HTTP stands for Hypertext Transfer Protocol, and it is used to load web pages using
hypertext links. Different from almost all the protocols already discussed in this work, HTTP
works at the application layer. For this protocol, a device makes request to a server and waits
for the server to response. To begin, the HTTP request consists of specifying HTTP version
type, the URL, the HTTP method, request headers, and it ends with an optional body. The
HTTP response is sent from the server to the requester device, the information varies depending
on the request previously done. The HTTP response consists of a status code, headers, and the
optional body. Like on previous attacks, HTTP flood attack is another type of DOS attack. The
difference with this type of attack and ping flood is that it operates at the layer 7 of the OSI
model. The attacker or attackers overwhelm a server with HTTP requests until it cannot respond
anymore.
57
4.2 Experiment Setup
The experiments consisted of setting traffic loads directed at the three meters at the same
time. Three different types of attacks were experimented: Ping flood, smurf attacks, and
TCP/SYN attacks. All attacks are infamous due to the processor resources exhaustion effects
caused on the victim’s computer. Articles [56] and [57] provide complete studies that show the
effects of ping floods and smurf attacks. Work done in [56] displays experiments done using
ping floods and work in [57] shows how smurf attacks can even be amplified with the number
the system, the use of a performance tester becomes the key. The tester played the role of the
There are three elements of the information security triad that must be complied to
Having the integrity aspect compromised in a smart grid system refers to any
modification made to the information transferred from the meters to the monitoring computer,
or when the information that comes out of the meter does not reflect the expected one. A simple
example could be that the meter physically reports x watthour consumed, yet the information
that the monitoring computer receives is y. Another interesting experiment was comparing the
energy consumption made between a smart meter in normal conditions versus another one
under cyber-attacks.
58
The other aspect to investigate was the information availability. During the attack, it was
observed if every single element in the smart grid remained available, meaning that the
monitoring computer must be able to access the information from all connected devices. Having
the information always at hand help users and providers to determine how the energy is being
consumed, how to define billing data, and also help utility companies to execute special
commands like the mentioned remote disconnection of service. However, if an element gets cut
out of the grid, either the user or the company will start to use extra resources that always end
up in wasting money.
The first test consisted of setting a three-days baseline (the meter was not under any type
of attack) after three experiments performed on the S4x Ethernet meter. The electrical loads
were active (200 watts) while the metrology board (boards inside the meter in charge of taking
the electrical signal and return the value within the internal memory that represents it) took care
of the metering job. Inside the meter, the metrology board maintained a continuous
communication with the communication module. As the metrology boards determined the
readings being taken, they sent the information to the communication modules. In the case of
the S4x Ethernet meter, the communication module works at the same time as a network
interface card (NIC). The signal then traveled through an ethernet medium until it reached the
network switch. On the other side of the system, the monitoring computer was connected on a
different port of the network switch. To begin a communication session with the meter from the
monitoring computer, the computer accessed the web portal created by the meter manufacturing
company. Once the session was stablished, the monitoring computer accessed all the
information that it needed. For this monitoring, a user intervention was not needed thanks to the
59
implementation of the software application developed by our laboratory, AMT monitor. To
begin a communication session, the monitoring computer entered the meter parameters through
AMT monitor, and the application took care of retrieving the energy consumption. Once the
communication session was over, the AMT Monitor left a log file containing the concerning
information.
Figure 36. Steps in the smart grid to read, store, and retrieve information.
During the first successful test, the communication was stable along with the rate of
change of watthour consumption. For the 200 watts load, the meter was able to read an average
60
BASELINE AVERAGE WATTHOUR CONSUMPTION
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
197 198 199 200 201 202 203 204 205
WATTHOURS
Figure 37. Average kilowatt-hour consumption in 72 hours recorded by the S4x Ethernet meter.
This experiment began with the system acting under normal conditions. After a planned
time, the performance tester started to send a series of ping requests to all meters. During the
flood time, AMT monitor attempted to build its report on the basis it was indicated to. The
initial parameter for the performance tester had a bandwidth of 22.83 Mbps. The total time of
the system being under attack was eighteen hours. After the attack ceased, the system was let to
After the test ended, the AMT monitor log file was analyzed. The file presented several
failures when retrieving data. It was practically impossible for AMT Monitor to ensure a proper
reading. This, meaning that connection to the meter was impossible. Therefore, the log file
showed no readings during the first 18 hours of testing, which is the period were the meter was
under attack, the remaining 18 hours were tested with no attack, here is where the log file
61
started to report values normally. This experiment was repeated several times and displayed the
Figure 38. Values recorded by the S4x Ethernet meter.18 hours under attack vs 18 hours without attack. Hours vs.
kilowatt-hours.
After trying ping flood attacks, the next type of attack in the list was the Smurf attack.
The experiment was executed in the same way as ping flood did and using the same bandwidth
(22.83 Mbps). After the experiment was done, the data was analyzed, and it reflected very
similar results than in the experiment with the ping flood. In fact, the results were so similar that
if a picture were to be placed in here, it could be easily confused with previous picture. All
The final experiment to try on this list was the TCP/SYN attack with the same attack
bandwidth as in previous attacks (22.83 Mbps). Surprisingly, this final attack presented the
same results as in previous two types. The communication stopped almost immediately after the
62
attack started, AMT monitor could not determine the watthour readings. Like on previous
attacks, the results were the same for all three meters.
The experiments in this section provided a broad insight about the behavior of smart
meters when an external component in their communication system is introduced, in this case, a
different 144-hour runs were done, and an average consumption was calculated from all the
runs.
Figure 39 displays a run of 144 hours which was obtained from the average of all three
runs. The real consumption data in the graph can be divided in three periods: the hours were the
meter ran under normal conditions, the hours were the meter ran with a ping flood applied, and
the hours were the meter ran with a smurf attack applied. The first period which corresponds to
the first 48 hours is when the meter ran under normal conditions. The second period
corresponds to the following 48 hours between hour 48 and hour 96; and it is when the meter
received a ping flood cyber-attack. The last period corresponds to the last 48 hours of the
experiment between hour 96 and hour 144; and it is when the meter received a smurf cyber-
attack. The expected consumption data was calculated from the average watthour consumption
obtained from the first 48 hours of experimentation (meter running under normal conditions).
It is important to mention that AMT Monitor returned values of zero when the
communication with the meters was impossible. Therefore, the real consumption graph has
values of zero when the meter was under attack. Figure 39 shows the differences in
consumption between the real consumption and the expected consumption. Although there
63
exists a difference in consumption between both graphs, it is minimal. Sample A was taken at
hour 96 right after the ping flood attack ceased and reported a consumption of 19.1673 kilo
watthours compared to the expected value of 19.1468 kilo watthours; the difference between
both values is 0.0205 kilo watthours or 20.5 watts above the expected value. Sample B was
taken at hour 144 right after the smurf attack ceased and reported a consumption of 28.7341 kilo
watthours versus the expected value of 28.7202 kilo watthours. The difference between the final
readings was 0.0139 kilo watthours or 13.9 watthours above the expected value. Since the
difference between the final samples was less than the first samples, the results are not sufficient
to determine whether if the meter was in fact affected by the attacks or if the differences are
Figure 39. Consumption study. Expected values versus real values of meter readings when the meter was under
cyber-attacks.
64
4.8 Connectivity Focus
For technical practicality, this work refers to the availability of information as the
connectivity capability of smart meters in the network. If the connection is stable, the
information is available. Since the focus of research changed to the connectivity status, there
was no point on keeping track of the loads read by the meter. The data graphs changed its layout
from being sample vs watt-hour to sample vs connection status. There were only two statuses
1. What is the minimum attack bandwidth needed to completely stop the smart grid
communication?
2. How fast can a flood attack stop the communication in the smart grid?
4. Is there any relationship between the time that the smart meter spends being under a
5. Is there a relationship between the attack’s bandwidth and the effect in the smart grid?
6. Is there any possible way, a smart meter can stop communication for good after being
under attack?
65
To determine the answer to these questions meant that the AMT monitor was not the
best solution anymore. The reason of this is because smallest sample interval that the AMT
monitor can create is 2 minutes, and samples as small as one second were required.
determining the connectivity status of devices in the grid. The science behind this application
relies in the phenomena that occurs when a smart meter is under attack. Taking into
consideration the ICMP protocol defined in [58], a ping response was enough evidence to
determine the connectivity status of any device connected in the local network. If a smart meter
works under normal conditions, the monitoring computer can ensure communication by sending
a single ping request. If the smart meter replies with a ping response, it meant that the
communication between the monitoring computer and the smart meter was active. If the smart
meter would not send the ping response, it meant that there was a problem in communication.
When meters were under attack, the communication got cut between the monitoring computer
and the smart meter. Therefore, any ping request done by the monitoring computer resulted in a
request timeout, because the meter was unable to communicate, and hence, the communication
was considered as inactive. SG overseer allowed the user to make readings of any size of time,
and it achieved this by sending ping requests to the smart meter. The readings samples can be
done from even less than a second, up to any value the user may come up to. Regardless of the
status in communication between the meter and the monitoring computer, SG Overseer
reflected this result through log files. Like AMT monitor, SG Overseer became an essential tool
for the work performed in this thesis. It was developed using Visual Studio and the .NET
66
platform. While AMT monitor was used to study energy consumption, SG Overseer was used
The Data File field specifies the name the user entered to create the log file; the log file
would have the name entered. As the name implies, the following three fields are the meter IP
addresses, if one if these is wrong, the application will not be able to retrieve any information
from that specific address. The Sample Size field indicates how much will the test last. Time
Intervals is the field used to determine the sample intervals at which each reading will take
place.
67
Once the test begins, the log file is immediately created, and it gets dynamically filled as
the application gets executed. When the test is finished, the graphs in the interface will display
the status of the last group of five readings. Green dots mean connection normal, while red dots
Figure 41. SG Overseer after a communication session were all three meters shown successful connectivity.
The log files present the information with the structure of a table with four columns and
a user defined number of rows. The first column specifies the exact date at which the sample
(ping request) started execution, the second, third, and forth column indicates the connectivity
status. SG Overseer will report only 0’s and 1’s as the status values. 0’s means that the ping
68
failed, and therefore, the communication was broken. 1’s indicate that the meter successfully
69
CHAPTER V
RESULTS
The data in this section describe the results from the experiments performed when
evaluating the consumption reports for both cases (when a meter worked under normal
conditions and when it was subjected to cyber-attacks). The meter used for these experiments
was the Landis+Gyr S4x Ethernet. The theory in discussion was to determine a possible data
corruption caused by a severe traffic attack to the meter communication module. This
experiment was based on the hypothesis that exhausting the processor with tasks, could lead to
5.1.1 Baseline
For this experiment, the loads consisted of two 100-watts light bulbs. Therefore, the
expected consumption was 200 watthours. The baseline would set a reference for a normal
consumption in a certain period. Three different experiments of 168 hours (one week) were
done. The graph below summarizes the average watthour consumption recorded from the three
70
experiments. The results indicated that there was an average consumption of 201 watthours with
a standard deviation of 1.198 watthours. Data ranged from 196 to 206 watthours.
Figure 43. Baseline used to set a reference for the next experiments.
This experiment consisted of setting the traffic simulator to create data packets in the
form of echo requests (pings). Since ear echo request has their own size in bytes, sending
multiple requests per second requires bandwidth resources. The traffic simulator software has
the option to set the maximum resource bandwidth used for data transfer. For this experiment,
the bandwidth set for data transfer 500 Mbps. This means that the simulated attack had a
bandwidth of 500 Mbps or 62.5 Megabytes per second. This bandwidth will be referred for the
71
This experiment was executed three different times. The meter was set under a constant
cyber-attack, and at different times, a sample was taken. The sample consisted of recording the
current watthour consumption. Sample 1 was taken after 48 hours, sample two after 144, and
sample 3 after 168 (one week). The figure below shows the baseline in a blue line and three
different color dots. Each dot represents the value obtained at each sample taken. All three
samples fall within three standard deviations from the mean. This concluded that the data is not
sufficient to declare the effectiveness of a flooding cyber-attack against the meters’ capability to
record consumption.
0.25
0.2
198.462 watthours
0.15
0.1
0.05
198.119 watthours
0
197 198 199 200 201 202 203 204 205
watthours
72
5.2 Communication Availability
Given that previous experiments revealed that the attacks produced a total loss of
communication between the monitoring computer and the meters, the next stage of experiments
focused on analyzing the effects of attacks in the communication availability for smart meters.
All three meters were tested equally by setting the same traffic loads. For a deep analysis,
different bandwidths and periods were tested and helped determining a relationship between the
severity of the attack and these two parameters. These experiments revealed three important
observations: a minimum effective attack bandwidth to make effects noticeable, the final effect
All experiments from section 5.2.1 were executed with the application of ping floods.
The performance tester was set to automatically and programmatically sent multiple ping
packets to all three meters. The sub sections below describe the observations of the effects
the attack bandwidth increased, it was observed that all three meters started to present
communication problems. After a certain bandwidth for each of the three meters,
communication ceased completely. This value for bandwidth was referred as the minimum
effective attack bandwidth (MEAB). Once the MEAB is applied, the communication gets
instantly interrupted, and users are not able to establish communication with the meter. All three
73
Figure 45. Ping flood's minimum effective attack bandwidth for each meter used.
Our data results shown that while S4x Ethernet meters present a more robust defense
against traffic attacks compared to EPM 700, it is less robust compared to EPM 6100.
74
5.2.1.2 Final Effect. Before reaching the MEAB for each of the meters, the
communication did not seem to be affected in any way. As the attack bandwidth got closer to
the MEAB, the communication stability became inconsistent, meaning that successful
communication sessions with the meter became less common while some ended in failures.
Once the MEAB was reached, the communication with meters became impossible. This implies
that the attack does breach the availability aspect of the smart metering communication system,
and therefore, a Denial of Service (DOS) attack exists. The final effect consists of not letting
any authorized user access any of the meter data including billing, current consumption, or any
5.2.1.3 Posterior Effects of a DOS Attack. The last observation is the effect in the
communication system that occurs after the attack ends: communication with meters does not
come back to normal immediately. After the attack ends, a recovery time is needed to have the
meters go back to normal. The following set of experiments were done to determine the
relationship between the recovery time, the attack bandwidth, and the attack period. Since the
recovery time exists only after an attack is effective, all the experiments were done surpassing
the MEAB. If the attack bandwidth is equal to the MEAB, the recovery time tends to be zero.
As the attack bandwidth increases getting farther from the MEAB, the recovery time also
increases up to the point where it reaches a common average time. All our experiments were
done combining both parameters: attack bandwidth, and attack duration. Results tend to be
consistent regardless of the modification of both parameters. As long as the MEAB is surpassed,
the recovery time seemed to be independent of how the attack bandwidth increased and how the
75
Recovery Time vs Attack Bandwidth (1-Min Attack)
60
50
Recovery Time (seconds)
40
30
20
10
0
0.05 0.06 0.4 0.5 1 5 7 8 10 100 760
Attack Bandwidth (Mbps)
Figure 46. Recovery times for 1-minute attacks using different attack bandwidths.
50
Recovery Time (seconds)
40
30
20
10
0
0.05 0.06 0.4 0.5 1 5 7 8 10 100 760
Attack Bandwidth (Mbps)
Figure 47. Recovery times for 5-minute attacks using different attack bandwidths.
76
Recovery Time vs Attack Bandwidth (10-Min Attack)
60
50
Recovery Time (seconds)
40
30
20
10
0
0.05 0.06 0.4 0.5 1 5 7 8 10 100 760
Attack Bandwidth (Mbps)
Figure 48. Recovery times for 10-minute attacks using different attack bandwidths.
50
40
30
20
10
0
0.05 0.06 0.4 0.5 1 5 7 8 10 100 760
Attack Bandwidth (Mbps)
Figure 49. Recovery times for 20-minute attacks using different attack bandwidths.
77
Recovery Time vs Attack Bandwidth (60-Min Attack)
60
50
Recovery Time (seconds)
40
30
20
10
0
0.05 0.06 0.4 0.5 1 5 7 8 10 100 760
Attack Bandwidth (Mbps)
Figure 50. Recovery times for 60-minute attacks using different attack bandwidths.
57
Recovery Time (seconds)
56
55
54
53
52
51
10 100 760
Attack Bandwidth (Mbps)
Figure 51. Recovery times for 1-day attacks using different attack bandwidths.
78
Recovery Time vs Attack Duration (Attack Bandwidth
500 Mbps)
60
50
Recovery Time (seconds)
40
30
20
10
0
0 0.5 1 5 10 20 60 120 1440 10080
Attack Duration (Minutes)
As a conclusion to the experiments, both, the attack bandwidth, and duration become
irrelevant once the MEAB is passed. Therefore, for a successful DOS attack it is only required
to apply a ping flood with a bandwidth stream higher than the MEAB to cause a total cease of
communication (which will return approximately 50 to 60 seconds after the attack ceases).
The next set of experiments were performed similarly to previous, but instead of using
ping flood as the method to induce a DOS, a smurf attack was simulated. As previously
mentioned, a smurf attack uses the same protocol as ping flood. Instead of using echo requests
like ping does, smurf consists of sending echo responses with the victim’s address as the source
of the packets to all the elements in the LAN. These experiments displayed how after setting the
attack, all the elements in the network started to send packets to the targeted meter. Three
79
observations were made: the MEAB values for all three meters is different than when ping flood
was used, the final effect is the same (DOS confirmed), and the recovery time does not exist,
meaning that once the attack ends, the meters come back to regular operations instantly.
Figure 53. Smurf attack's minimum effective attack bandwidth for each meter used.
80
5.2.3 TCP/SYN Attack Experiments
The last type of attack used for experimentation was the TCP/SYN attack. In this
scenario, the traffic simulator used the protocol TCP/IP and send multiple synchronization
request packets to all three meters without waiting for responses. The effects of the TCP/SYN
attacks were similar to the ping flood attack. Three observations were also made: there exists a
MEAB, the final effect is also a DOS, and recovery times also exist.
the cases before, each meter presented a different MEAB. However, surprisingly, the effects of
this type of attack reflected that the EPM 6100 was weaker in robustness compared to the other
meters, when in previous attacks was shown to be the most robust. In case of TCP/SYN attacks,
81
Figure 54. Minimum effective attack bandwidth required on each meter for a TCP/SYN attack to be successful.
5.2.3.2 Final Effect. After the MEAB is reached, the final effect is also a total loss of
communication. Like with previous attacks, a DOS can be created with the use of TCP/SYN
82
5.2.3.3 Posterior Effects of a DOS Attack. Like with ping floods, an observable
recovery time is needed for meters to start communicating normally after ending the
compared to a ping flood is that all the meters presented different recovery times. In ping
floods, the recovery times for all meter ranged between 50 and 60 seconds. In TCP/SYN
attacks, the range is different per meter. However, a similar effect occurs in terms that after
applying the MEAB, the recovery time for each meter tends to normalize. The graph below
represents multiple experiments using an attack bandwidth of 500 Mbps and the variable
parameter is the attack period. The difference between meters is noticeable. In regard to
recovery time after the application of a TCP/SYN attack, the S4x Ethernet meter seems to be
the one that recovers faster, while the EPM 6100 takes longer.
Figure 55. Recovery times for all three meters after setting a 500 Mbps TCP/SYN attack for different periods.
83
The graphs below are of multiple experiments performed with TCP/SYN attacks and
using different attack periods. The variable parameter is the attack bandwidth.
Figure 56. Recovery times for 1-min attacks with different bandwidths.
Figure 57. Recovery times for 5-min attacks with different bandwidths.
84
Figure 58. Recovery times for 10-min attacks with different bandwidths.
Figure 59. Recovery times for 30-min attacks with different bandwidths.
85
Figure 60. Recovery times for 60-min attacks with different bandwidths.
Although definite conclusions cannot be inferred from the results with the EPM 7000, it
can be generally assumed that its recovery times are usually shorter than with the EPM 6100
and longer than with the S4x Ethernet. The recovery times with the S4x Ethernet range from 10
to 20 seconds, the recovery times with the EPM 7000 tend to range between 50 to 60 seconds,
and the recovery times with the EPM 6100 range between 80 and 90 seconds. Using these
results along with the defined MEABs, it can be concluded that out of all the three types of
attacks experimented in this chapter, TCP/SYN attacks are the most harmful to EPM 6100
meters.
5.3 Comparing Impacts of Ping Flood, Smurf Attack, and TCP/SYN Attacks
The MEAB values are different for all three meters, the graphs below show a
comparison of the different MEABs found on each meter. The only conclusion that can be
drawn is that in regards of MEAB and recovery times, smurf attacks are less powerful than ping
floods. TCP/SYN attacks are most effective against EPM 6100 in terms of MEAB and recovery
86
times. Although the MEAB in TCP/SYN attacks to affect a S4x Ethernet meter is slightly less
than with the ping floods, in terms of recovery times, they seem to be less effective.
Communication lost
Communication lost after using a 0.4-Mbps Communication lost
after using a 0.3-Mbps ping-flood attack after using a 3.2-Mbps
TCP/SYN attack smurf attack
Communication
Communication lost after using lost after using a
a 0.05-Mbps ping-flood attack 0.76-Mbps
TCP/SYN attack
Communication lost after using
a 0.7-Mbps smurf attack
87
Communication lost
Communication lost after using a Communication lost after after using a 15-
0.002-Mbps TCP/SYN attack using a 7-Mbps ping-flood Mbps smurf attack
attack
METER PING FLOOD MEAB SMURF ATTACK MEAB TCP / SYN ATTACK
(Mbps) (Mbps) MEAB (Mbps)
S4x Ethernet 0.35 3.2 0.3
EPM 6100 6.5 15 0.002
EPM 7000 0.05 0.7 0.76
Optical communication with the S4x Ethernet meter was established thanks to an
AIP200 optical probe [60]. Taking into consideration that this meter does not have a password,
another application was developed to establish a successful connection with the meter through
optical communication and make access to the meter possible. Using ANSI C12.18 as protocol
of communication, a session was stablished consisting of sending data packets to log into the
meter and have access to its stored data. Once the access was granted, the communication was
terminated.
88
Figure 64. Optical communication session done using ANSI C12.18.
When the meter was subjected to large amounts of traffic data, there was no change in
the optical communication session. No delay between data packets was observed or any other
type of anomaly. More testing consisted of setting week-lasting attacks and testing multiple
communication sessions along the way. Neither the bandwidth nor duration of attack reflected
any effects that made a difference between communication sessions established during normal
conditions (system not being under attack) and when the system was under attack. Therefore,
the results indicate that ethernet-based DOS attacks make no effect on the optical
communication system of the meter. Further analysis continued with the hardware design of the
meter.
89
Figure 65. S4x Ethernet internal circuitry.
Figure 66. Communication enclosed in a yellow perimeter while the metrology board is enclosed in a red
perimeter.
90
Figure 67. Different angle of S4x Ethernet internal circuitry. The communication module is enclosed in a yellow
perimeter.
Figure 68. Optical port in a S4x Ethernet meter is part of the metrology board.
91
From Figures 65, 66, 67, 68, and 69, it can be noticed that the smart meter consists of
the integration of two electronic boards. The board at the top is the communication module,
which contains the RJ-45 ethernet connection and a Lantronix XPort embedded device server
[61]. The board at the bottom is the metrology board, which oversees translating the received
signal from the power line and determine the values of current, voltage, and energy, among
others. The metrology board is the one that stores all the meter data such as the readings, user-
configurations, time, and date information, and it is also the one that has the optical port
session after disconnecting the communication module from the metrology board. Like in
previous attack experiments, no effect was noticeable during the session. This lead to conclude
that both boards are independent of each other. If the ethernet communication is down, meter
data can still be retrieved using optical communication. Based on the analysis, Figure 70 below
represents the flow of data from the power line to the monitoring computer.
Figure 69. (Left) Metrology module and communication module from a S4x Ethernet meter disassembled. (Right)
S4x Ethernet communication module.
92
Figure 70. S4x Ethernet metering data flowing
93
CHAPTER VI
A last analysis was done after the observation that all three meters presented different
values of resiliency against DOS attacks. The technology constituting the network interface
cards of the meters are not the same. Using the finding that the metrology board did not seem to
be affected, left the conclusion that the element of the smart meter that was directly affected was
the communication module. This module is different between all three meters, as this could be
the reason for the difference in results. For both Landis+Gyr S4x Ethernet and General Electric
EPM 7000, the modules are physically independent. In the case of the General Electric EPM
6100, both, the metrology board and the communication module seem to be integrated in the
94
Figure 72. S4x Ethernet internal circuit.
Although the data was not sufficient to conclude that traffic attacks cause a significant
impact when it comes to meter consumption data, there was enough evidence to prove that it
does cause a Denial-of-Service Attack. A minimum effective attack bandwidth (MEAB) was
identified for all meters tested to cause the DOS, and as long as this one is reached,
communication with the targeted meter is impossible. Using the tools provided by the meter
manufacturing companies does not help identifying the source of the interruption in
communication. In other words, the meter manufacturing companies, and the utility companies
95
would not be able to identify the system failure as an actual intended DOS. From the point of
view of all users, the nature of the problem would be interpreted as a simple meter malfunction.
The other effect caused by traffic attacks is a delay that meters take to resume
communicating after an effective ping flooding or TCP/SYN attack takes place. To create the
maximum possible delay, two parameters were involved: attack bandwidth, and attack duration.
Results indicate that applying an attack bandwidth higher than the MEAB for a minimum
duration of 60 seconds would ensure a delay effect. Increasing either the attack bandwidth or
Since the DOS attack does not leave traces in the smart grid system, meter service
providers would have no other choice than treating the problem caused as if the source is a
meter malfunction. This implies the useless intervention of a technician and a probable
replacement of equipment. In conclusion, for every meter attacked, there will be a cost of
money wasted in replacements and man-labor without mentioning that the meters replaced
would not have any real defect, plus meter manufacturing companies will be forced to spend
money in investigations to detect the source of the defect within the meter limits, when the
6.3 Conclusion
As a conclusion from our experiments, the following eight observations were made:
1. Ping-Floods, Smurf attacks, and TCP/SYN attacks create the effect of complete loss of
2. A minimum effective attack bandwidth must be reached for a successful DOS attack.
96
3. There is an apparent positive relationship between the recovery time and the duration of
attack, but this is only visible for short term durations (less than one minute). Once the
attack duration surpasses one minute, the recovery times will stabilize in a defined range
4. There is also an apparent positive relationship between the recovery time and the attack
bandwidth, but this is only visible if the MEAB is not surpassed. Once the attack
bandwidth passes the MEAB, the recovery times will stabilize in a defined range
regardless of how long the attack lasts regardless of how much the attack bandwidth
increases.
5. For effective ping-flood attacks, the communication will return to normal between 50 to
60 seconds after the attack ceased. In the case of TCP/SYN attacks, the recovery times
6. Based on the required MEABs, ping-flood attacks seem to be more damaging than
7. The technology used for the network interface card of the meters, determines the
resilience of them against certain data traffic attacks. Hence, based on the results
obtained from the experiments performed in this research, the EPM 6100 meter was the
most resilient against ping-flood and smurf attacks, but extremely weak against
TCP/SYN attacks.
8. For the case of S4x Ethernet meter, network-based attacks do not interfere with the
97
Is apparent from these observations that smart metering communication is vulnerable to
common DOS attacks. The purpose of this research was to analyze and learn about the final
effect, and how is the overall communication system being affected by the attacks. These results
would help companies understand the resilience of their meters against these common cyber-
attacks, and they could define security mechanisms to identify traffic loads that surpass their
MEABs and reject them before a successful DOS occurs. Although the occurrence of DOS
attacks is less likely now due to current implemented security mechanisms like firewalls,
companies must be aware that such mechanisms have been defeated before and having this
Some experiments raised the suspicion that performing several consecutive streams of
traffic attacks, could lead to a total communication blockage of the meter victim; this meaning
that the communication would not return unless the meter undergoes a power cycle. Future
research should investigate how to replicate this scenario since its existence would represent a
major thread.
Another area to investigate is the possible attacks using optical communication. Since
the metrology board of the meter is shared with the optical communication system, there is a
strong possibility that by affecting the optical communication system would indirectly affect the
metrology system. A DOS attack may turn into a resource depletion attacks that attacks a
battery power node by forcing it to respond or send several messages until the power is depleted
[58]. Learning how to build data packets with ANSI C12.18 would provide the opportunity to
investigate how to create dummy data packets similar to the ICMP’s echo requests and
98
responses. Since the idea of the attack relies on the fact that the attacker does not wait for
acknowledge packets and responses, using ANSI C12.18 to create identification packets without
the need to wait for the acknowledgment packet would replicate the same scenario as the
already mentioned DOS attacks. The string EE0000000001201310 is the basic identification
request using ANSI C12.18. Numbers 0001 indicate that the data packet consists of only one
byte, number 20 indicates the data packet is using an identification request service and number
the concept. As it can be seen from Figure 84, there exists a time gap of 20 milliseconds
between the identification packet and the acknowledgment packet. The next time gap is around
49 milliseconds, which is the time that took the user’s device to receive the response packet
from the smart meter. In total, the approximate time that takes between sending the
Figure 74. Log file showing details of the sending of an identification request packet and the response from the
smart meter.
Optical communication attacks are an area that has not been studied in the smart
metering communication science, and therefore, further studies can be done in this regard.
99
REFERENCES
[1] SmartGrid.gov. What is the Smart Grid? US Department of Energy, Office of Electricity
Delivery & Energy Reliability. Retrieved on 2019 from
https://www.smartgrid.gov/the_smart_grid/smart_grid.html
[2] Le, Nghia & Chin, Wen-Long & Truong, Dang & Nguyen, Tran. (2016). Advanced
Metering Infrastructure Based on Smart Meters in Smart Grid. 10.5772/63631.
[3] Gungor V. C., Sahin D., Kocak T., Ergut S., & Bucella C. (2011). Smart Grid Technologies:
Communication Technologies and Standards. Retrieved from IEEE TRANSACTIONS
ON INDUSTRIAL INFORMATICS, VOL. 7, NO. 4.
[4] Gungor, V.C. & Lambert, Frank. (2006). A Survey on Communication Networks for Electric
System Automation. Computer Networks. 50. 877-897. 10.1016/j.comnet.2006.01.005.
[5] V. C. Gungor, B. Lu, & G. P. Hancke, Opportunities and challenges of wireless sensor
networks in smart grid. IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557–3564, Oct.
2010.
[6] D. M. Laverty, D. J. Morrow, R. Best, & P. A. Crossley, Telecommunications for smart grid:
Backhaul solutions for the distribution network. in Proc. IEEE Power and Energy
Society General Meeting, Jul. 25–29, 2010, pp. 1–6.
[7] Uribe-Pérez, Noelia & Hernández-Callejo, Luis & Vega, David & Angulo, Itziar. (2016).
State of the Art and Trends Review of Smart Metering in Electricity Grids. Applied
Sciences. 6. 68-92. 10.3390/app6030068.
[8] Public Utility Commision of Texas. Smart Metering. Retrieved on 2021 from
https://www.puc.texas.gov/consumer/electricity/Metering.aspx.
[10] Koponen, Pekka & Saco, Luis & Orchard, Nigel & Vorisek, Tomas & Parsons, John &
Rochas, Claudio & Morch, Andrei & Lopes, Vitor & Togeby, Mikael. (2008). Definition
of Smart Metering and Applications and Identification of Benefits.
100
[11] U.S Energy Information Administration. How Many Smart Meters are Installed in the
United States, and who has them? Retrieved on 2020 from
https://www.eia.gov/tools/faqs/faq.php?id=108&t=3
[13] V. C. Gungor, D. Sahin, T. Kocak, & S. Ergüt, Smart grid communications and networking.
Türk Telekom, Tech. Rep. 11316-01, Apr. 2011.
[15] M. Rafiei, S. M. Elmi and A. Zare, "Wireless communication protocols for smart metering
applications in power distribution networks," 2012 Proceedings of 17th Conference on
Electrical Power Distribution, 2012, pp. 1-5.
[16] W. Li and X. Wang, "Notice of Retraction: The Research of AMR in Smart Meter," 2010
Asia-Pacific Power and Energy Engineering Conference, 2010, pp. 1-4, doi:
10.1109/APPEEC.2010.5448275.
[17] Li Li; Xiaoguang Hu; Jian Huang; Ketai He. Research on the architecture of Automatic
Meter Reading in Next Generation Network. IEEE international conference on industrial
informatics , 13-16 july 2008 , pp. 92-97.
[20] M. Wagner, M. Kuba and A. Oeder, "Smart grid cyber security: A German perspective,"
2012 International Conference on Smart Grid Technology, Economics and Policies (SG-
TEP), 2012, pp. 1-4, doi: 10.1109/SG-TEP.2012.6642389.
101
[21] Murrill, Brandon J.; Liu, Edward C. & Thompson, Richard M., II. Smart Meter Data:
Privacy and Cybersecurity, report, February 3, 2012; Washington D.C..
(https://digital.library.unt.edu/ark:/67531/metadc87204/: accessed February 7,
2020), University of North Texas Libraries, UNT Digital
Library, https://digital.library.unt.edu; crediting UNT Libraries Government Documents
Department.
[22] Pallotti, Emiliano & Mangiatordi, Federica. (2011). Smart grid cyber security requirements.
10.1109/EEEIC.2011.5874564.
[24] Hafeez, Ayesha & Kandil, Nourhan & Al-Omar, Ban & Landolsi, T. & Al-Ali, A.R..
(2014). Smart Home Area Networks Protocols within the Smart Grid Context. Journal of
Communications. 9. 665-671. 10.12720/jcm.9.9.665-671.
[25] Mendes, T.D.P. & Godina, Radu & Rodrigues, Eduardo & Matias, João & Catalão, João.
(2015). Smart Home Communication Technologies and Applications: Wireless Protocol
Assessment for Home Area Network Resources. Energies. 8. 7279-7311.
10.3390/en8077279.
[26] John Sonnenberg. Serial Communications RS232, RS485, RS422. 2018. Raveon
Technologies. Retrieved on 2020 from: https://www.raveon.com/wp-
content/uploads/2019/01/AN236SerialComm.pdf
[27] Kugelstadt Thomas. The RS-485 Design Guide. Texas Instruments. 2016. Retrieved on
2020 from:
https://www.ti.com/lit/an/slla272d/slla272d.pdf?ts=1638808796487&ref_url=https%253
A%252F%252Fwww.google.com%252F
[28] European Telecommunications Standards Institute. ETSI TS 104 001 V2.1.1 (2016-12)
Technical Specification Open Smart Grid Prototol (OSGP); Smart Metering/Smart Grid
Communication Protocol. Retrieved on 2020 from:
https://www.etsi.org/deliver/etsi_ts/104000_104099/104001/02.01.01_60/ts_104001v02
0101p.pdf
[29] National Electrical Manufacturers Association. 1996. Protocol Specification for ANSI Type
2 Optical Port.
[38] Landis+Gyr: Company Profile Financial Year 2015-2016. Retrieved on 2019 from
https://www.landisgyr.eu/webfoo/wp-content/uploads/2012/09/landis-gyr-company-
profile-financial-year-2015-2016-ENGLISH-ds-1.pdf
[39] Beroset, Edward. (2014). On the interaction between checksums and cyclic redundancy
codes in communications protocols. 1-3. 10.1109/ISGT.2014.6816439.
[40] Snyder, Aaron & Ramirez, P.. (2007). The newly revised ANSI C12.19 and its application
across the utility enterprise. 10.1109/PSAMP.2007.4740905.
[41] AL-Madani, Basem & Ali, Hassan. (2017). Data Distribution Service (DDS) based
implementation of Smart grid devices using ANSI C12.19 standard. Procedia Computer
Science. 110. 394-401. 10.1016/j.procs.2017.06.082.
[42] Snyder, Aaron & Garrison Stuber, Michael. (2007). The ANSI C12 protocol suite - updated
and now with network capabilities. 117 - 122. 10.1109/PSAMP.2007.4740906.
[43] S. Rana, H. Zhu, C. W. Lee, D. M. Nicol and I. Shin, "The Not-So-Smart Grid: Preliminary
work on identifying vulnerabilities in ANSI C12.22," 2012 IEEE Globecom Workshops,
2012, pp. 1514-1519, doi: 10.1109/GLOCOMW.2012.6477810.
103
[44] R. P. Lewis, P. Igic, & Z. Zhongfu, Assessment of communication methods for smart
electricity metering in the U.K. in Proc. IEEE PES/IAS Conf. Sustainable Alternative
Energy (SAE), Sep. 2009, pp. 1–4.
[45] Shongwe, Thokozani & Vinck, Jan. (2013). Interleaving and nulling to combat narrow-
band interference in PLC standard technologies PLC G3 and PRIME. 258-262.
10.1109/ISPLC.2013.6525860.
[46] M. Malek, D. Ketel, H. Hirsch and M. Trautmann, "Investigation of smart meters using G3
PLC," 2016 International Symposium on Electromagnetic Compatibility - EMC
EUROPE, 2016, pp. 162-166, doi: 10.1109/EMCEurope.2016.7739276.
[47] Wenpeng Luan, D. Sharp and S. Lancashire, "Smart grid communication network capacity
planning for power utilities," IEEE PES T&D 2010, 2010, pp. 1-4, doi:
10.1109/TDC.2010.5484223.
[48] Landis+Gyr. Commercial + Industrial: E650 S4x Ethernet. Retrieved on 2020 from:
https://www.landisgyr.com/product/e650-s4x-meter/
[49] General Electric. EPM 6100 Power Quality Meter. Retrieved on 2020 from:
https://www.gegridsolutions.com/multilin/catalog/epm6100.htm
[50] General Electric. EPM 7000 Power Quality Meter. Retrievedon 2020 from:
https://www.gegridsolutions.com/multilin/catalog/epm7000.htm
[51] Nakashima Ellen. Foreign hackers targeted U.S. water plant in apparent malicious cyber
attack, expert says. 2011. Retrieved on 2021 from:
https://www.washingtonpost.com/blogs/checkpoint-washington/post/foreign-hackers-
broke-into-illinois-water-plant-control-system-industry-expert-
says/2011/11/18/gIQAgmTZYN_blog.html
[53] Khaed S., Zouheir T., Mohammad A., Ahmed G., & Mahmoud Alahmad. Resiliency of
Smart Power Meters to Common Security Attacks. Procedia Computer Science 53, pp.
145-152, 2015.
[54] N. Liu, J. Chen, L. Zhu, J. Zhang, & Y. He. A key management scheme for secure
communications of advanced metering infrastructure in smart grid. IEEE Trans. Ind.
Electron. 2013;60(10):4746–4756.
104
[55] M. Nabeel, S. Kerr, Xiaoyu Ding and E. Bertino, "Authentication and key management for
Advanced Metering Infrastructures utilizing physically unclonable functions," 2012
IEEE Third International Conference on Smart Grid Communications
(SmartGridComm), 2012, pp. 324-329, doi: 10.1109/SmartGridComm.2012.6486004.
[56] Kumar, Sanjeev. (2006). PING attack – How bad is it?. Computers & Security. 25. 332-
337. 10.1016/j.cose.2005.11.004.
[60] Landis+Gyr. ANSI and IEC Optical Probe AIP200. Retrieved on 2020 from:
https://www.landisgyr.com/product/ansi-iec-optical-probe-aip200/
105
BIOGRAPHICAL SKETCH
The author, Oscar A. Alvarez, was born on December 7, 1991, in Mexico and lived the
first eighteen years of his life in his home city, Reynosa, Tamaulipas. In June 2010, after being
awarded a technical degree in Mechatronics, Oscar came to the United States to pursue a
higher-level education, and in December 2019, Oscar married his wife, Adelaeda Barrera, and
In May 2015, Oscar obtained his bachelor’s degree in Engineering Physics and
Computer Engineering from the University of Texas at Brownsville. While completing his
university studies, Oscar participated in NASA design competitions where he was presented
with multiple first place awards. After obtaining his engineering degree, Oscar was given the
skills and knowledge of smart grid science, and in April 2021, the company promoted him to
has presented posters in HESTEC (Hispanic Engineering, Science, and Technology) week and
at the ICDIS (International Conference on Data and Information Security) and participated in
the creation of two research papers in smart metering cyber-security. For more information,
106