Sie sind auf Seite 1von 4

2014 International Conference on Information Technology and Multimedia (ICIMU), November 18 – 20, 2014, Putrajaya, Malaysia

Financial Impacts of Smart Meter Security and


Privacy Breach
Salman Yussof, Mohd. Ezanee Rusli, Yunus Yusoff, Roslan Ismail, Azimah Abdul Ghapar
Center of Information and Network Security
College of Information Technology
Universiti Tenaga Nasional
Malaysia
Email: {salman, ezanee, yunusy, roslan, azimah}@uniten.edu.my

Abstract—Many power utility companies around the world to the utility company [2]. The smart meter can also interface
are moving towards smart grid, which integrates power delivery with ‘smart’ home appliances and control them to operate in a
infrastructure with information and communication technologies. power-efficient manner. Fig.1 portrays an example of smart
Smart meter is one of the main components of smart grid. The grid topography which shows the various components of a
task of a smart meter is to track energy consumption of a premise smart grid and how they are connected together.
and send that information to the utility company. Although the
use of smart meter has many benefits, there are a number of
security concerns regarding its usage. One particular concern is
regarding the impacts of security and privacy breach of smart
meter. This paper focuses on the financial impacts of smart meter
security and privacy breach. The financial impacts discussed in
this paper are derived from the impacts of security and privacy
breach described in the literature. It is found out that the
financial loss may involve various parties including the premise
owner, the utility company, as well as the nation. The amount of
loss can also go up to billions of dollars. Given the large group of
people who may be involved and the large amount of money to be
potentially lost should a security or privacy breach occur, it is
very important for power companies to establish a security policy
regarding smart meter and to allocate reasonable amount of
resources to secure the deployed smart meter as well as the rest Fig. 1. Example of smart grid topography [6]
of the smart grid infrastructure.

Keywords—Smart meter; security; privacy; financial impacts;


Although the use of smart meter has many benefits, there
security economics.
are also downsides to its usage. The biggest concerns
nowadays are the security and privacy issues that may arise
I. INTRODUCTION from the use of smart meters. Smart meter is a computerized
In recent years, a number of power utility companies have device. As with other computerized devices, a smart meter is
migrated to a new power delivery infrastructure known as the prone to various types of security attacks. Security attacks are
smart grid. Smart grid refers to the integration of power well-known to security researchers and practitioners.
delivery infrastructure with information and communication Unfortunately, a large portion of the society does not
technologies (ICT) [1]. This integration allows for a more understand much about security attacks and their implications.
accurate monitoring and management of energy usage, which However, most people do understand financial implications.
in turn allows for a more efficient energy provision that can This has given rise to a research area called security
save money [2]. A smart grid consists of four major economics, which attempts to study the economic impacts of
components which are advanced metering infrastructure security problems [4]. Researchers in this area argue that
(AMI), supervisory control and data acquisition (SCADA), security problems can be more appreciated if it can be
plug-in hybrid vehicle (PHEV) and communication protocols explained in terms of microeconomics [5]. Therefore, it is the
and standards [3]. Of interest to this paper is AMI, which is an aim of this paper to highlight and discuss the financial
integration of multiple technologies that provides intelligent implications should there be a security or privacy breach in
connections between consumers and system operators. One of smart meters. Hopefully, this will increase the awareness of the
the main components to provide AMI is the smart meter. A public with regard to smart meter security and provide a guide
smart meter is a computerized replacement of the electrical to the people in the management on how much money and
meter located at a premise. The task of the smart meter is to effort should be spent in order to ensure that such breach does
track the energy usage of a premise and send that information not occur.
This work is supported by the Malaysian Ministry of Education through
the Exploratory Research Grant Scheme (ERGS).

978-1-4799-5423-0/14/$31.00 ©2014 IEEE 11


2014 International Conference on Information Technology and Multimedia (ICIMU), November 18 – 20, 2014, Putrajaya, Malaysia

The rest of the paper is organized as follows. Section II Security attacks to a smart meter can be done either through
provides an overview of smart meter. Section III discusses the the smart meter’s communication module, utility server,
financial impacts of smart meter security breach. Section IV service provider or the communication network [13]. The
discusses the financial impacts of smart meter privacy breach. attacks can be performed by various parties, where different
Section V concludes the paper. party may benefit in different ways. Attacks may be performed
by outsiders, premise owners, or even the energy provider
II. OVERVIEW OF SMART METER employers. Regardless of the attack vector, the target is
normally the smart meter itself, or the data transmitted/received
Smart meter is a new kind of energy meter that has the by the smart meter. Security attacks on smart meter can have
capability to obtain information from end users’ devices and various negative consequences. Of particular interest are the
measure the energy consumption of those devices [7]. The financial impacts caused by these security attacks. These
information obtained from the smart meter can be used by the financial impacts can be categorized into several categories
utility company to provide better monitoring and billing. based on the affected group and are further explained in the
Furthermore, the consumers will also be better informed following sub-sections.
regarding their energy consumption, which in turn will enable
them to make better decision on their energy usage. Typically, A. Financial Impacts to Premise Owner
smart meter supports bidirectional communication between
itself and the central system. This feature is important for The premise owner is the person who resides in the premise
remote monitoring capability. Smart meter also has built-in whose smart meter is being attacked. Financial loss to the
ability to control the connection status of certain load remotely. premise owner can occur is several ways. An attacker may
In general, with the advancement of smart meter technology, cause the premise owner to pay a higher electrical bill by
many other operations can be performed by a smart meter. altering the meter reading so that the smart meter reports a
Example of functions that are expected to be available on a higher usage than the actual energy consumption of the owner
smart meter are two-way communication function, data [13] – [15]. Altering the smart meter reading can be done by
management (i.e. collection, recording and storing) functions, physically tampering the smart meter [10] or performing data
load control function, programming and display functions, manipulation on the smart meter remotely through its network
security function and billing function. Basically, the connectivity [13]. The latter is also made possible due to the
introduction of smart meter plays an important role in realizing use of insecure software [12], [16]. In certain types of smart
the concept of “smart-building” in the future. meter, the attacker may be able to disconnect power supply
from certain household appliances, equipment or facilities [14].
The benefits of smart meter that can be enjoyed by different Shutting down household appliances such as refrigerator or
stakeholders such as consumers, utility companies and freezer may cause damages to the food inside and this in turn
government have been discussed extensively in [8]. These cause financial loss to the owner. With the use of smart
benefits include more accurate and timely electrical billing, appliances as popularized by the smart home concept, it is also
reduction of operational cost and improvement of the possible for the attacker to have a malicious remote control
environmental condition by reducing CO2 emission. Due to over the appliances [12]. This can definitely leads to damages
these benefits, many power companies in Europe and US have and financial losses. An attacker may also steal the premise
taken the initiative to install smart meter in residential and owner’s data from the smart meter and hold the owner
commercial buildings [8]. Similar trend can also be seen for “hostage” through the data and eventually ask for some kind of
countries in Asia-Pacific region [9]. payment [17].

III. FINANCIAL IMPACTS OF SMART METER SECURITY B. Financial Impacts to Utility Company
BREACH Compared to the premise owner, the utility company has a
The security vulnerabilities of smart meter are due to the lot more to lose when security breach occurs. Simply altering
computer-like ability of the smart meter. The traditional the smart meter reading to report a lower usage than the actual
electric meter can only record the power usage of a premise. energy consumption will cause the utility company to lose
The smart meter, on the other hand, can run various money [12] – [15]. In the situation where the attacker is able to
applications, as well as communicate over the network. Even impersonate the smart meter, the attacker may be able to send
though this computer-like capability is very useful, it may erroneous data or control commands to the power grid, which
expose the smart meter to the various security attacks that are may cause dire consequences. The consequence can be
plaguing the computer network. Common security attacks on anything from sub-optimal running condition, degraded power
computer network such as denial-of-service (DoS), user quality, blackout or even equipment damage [14], [18], [19]. In
impersonation, sniffing, side-channel analysis, traffic hijacking, each of these consequences, the utility company will end up
routing attacks, configuration manipulation and exploitation of losing money, either directly or indirectly. In countries where
insecure software can now be performed on smart meter [10], energy prices are tied to the amount of energy produced, an
[11]. Furthermore, with the smart meter’s ability to execute attacker may send false report on energy prices to the smart
codes and communicate over the network, viruses, worms and meter, which may cause a usage spike that can destabilize the
Trojan horses can run on the smart meter and spread through power grid [13]. An unstable power grid may lead to blackout
its network connectivity [12], [13]. or equipment damage.

12
2014 International Conference on Information Technology and Multimedia (ICIMU), November 18 – 20, 2014, Putrajaya, Malaysia

When a security breach is known to the customers, the [23], [24]. The power usage information from smart meter can
integrity of the billing information may be questioned by the also reveal the private activities of the occupants within the
customers and they may refuse to pay the bills [16]. Even premise such as whether they are awake or asleep, cooking,
worse, the utility company may face substantial liability claims having meals, taking shower or watching TV [25] – [29].
and regulatory fines for not having adequate security measures Inferring these activities is made possible by comparing the
[17]. If that happens, the utility company not only has to pay energy consumption with the energy profile of household
the fines, but it may also lose money through degraded appliances [30]. Long-term monitoring of the power usage
reputation and loss of customer trust. Furthermore, once the information of a premise can eventually reveal the daily
source of the security breach has been identified, the remedial activities, personal habits and lifestyle of the occupants [23],
action may require fixing or replacing existing hardware and [28], [31], [32].
software which could be very costly to the utility company.
The privacy breach of smart meter is, in general, harmful to
the owner or occupants of the premise. The main problem that
C. Financial Impacts to the Nation and Society may cause financial loss to the premise occupants is burglary.
Security breach to smart meter can impact the nation or the Knowing whether the occupants are at home and the daily
society when the security breach is severe enough that it allows activities of the occupants will help the criminals to find the
the attacker to have access or affect the power grid right time to break into the premise. Knowing the types of
infrastructure. As mentioned in Section III.B above, if the electrical devices or home appliances in the premise will help
attacker is able to send erroneous data or control commands to the criminals to choose their targets. NILM may even reveal
the power grid, the attacker would be able to shut down the whether the premise has an alarm system, and this will assist
power grid, which will cause blackouts [14] [18]. A blackout the criminals even further [28]. By choosing the right target
does not only impact the utility company, but it would also and entering the premise at the right time, the criminals may be
impact other companies, the public, as well as the nation who able to conduct the robbery effectively and this may cost the
depend on the electricity supply [12]. A long-duration blackout victim a large amount of money. In addition to burglary, other
that affects a large area can be very costly. For example, in criminal acts that may cause financial loss to the premise
August 2003, there was a two-day blackout which affected the owner include kidnapping, arson and vandalism. Criminals
northeastern region of the United States. The cost of this who intend to perform these criminal acts would definitely
blackout event is estimated to be around USD 6 billion [20]. It benefit from the information that can be obtained from smart
even resulted in 11 deaths. Although this blackout was not meters.
caused by a security breach, the financial loss caused by a
severe blackout following a security breach could be similar. V. CONCLUSION
As described in Section III.A, a power failure to certain Smart meter is an essential part of smart grid. However,
household appliances such as a refrigerator may be costly to similar to any other computerized equipment, smart meter may
the home owner. Even though the financial lost for a single be vulnerable to security attacks. Security attacks may lead to
house may not be that much, but if that amount is multiplied security and privacy breaches. When that happens, various
with the number of houses affected, the total loss to the whole parties may be affected. Our studies have shown that many of
society who are affected by the power failure can be quite the impacts of security and privacy breach of smart meter can
large. A factory that cannot operate due to power failure may actually lead to financial losses. The financial loss may affect
lose millions of dollars due to loss of production. The same the premise owner, the utility company, other companies who
goes for the banking industry, the service industry and the depend on the power supplied by the utility company, the
government services, who cannot deliver the intended services public, as well as the government and the nation. The amount
to the public. Unavailability of services does not only cost of losses varies depending on the type of breach, the party
financial loss to the service provider, but it would also cause affected and the duration that the victims are affected by the
difficulty and financial loss to the public who may be impacted consequence of the breach. However, in serious cases, the
in various ways. amount of financial loss that has to be endured by the affected
parties may reach billions of dollars. Due to the large amount
IV. FINANCIAL IMPACTS OF SMART METER PRIVACY of potential losses, it is very important for power utility
BREACH companies to take smart meter security seriously by allocating
sufficient resources to ensure the security of the deployed smart
Many researchers have identified that the data obtained
meters as well as the rest of the smart grid infrastructure.
from a smart meter can reveal some information about the
occupants of a premise, as well as about the electrical The study has also found out that the level of vulnerability
appliances in the premise. The utility company or an attacker of a smart meter to security attacks is related to the level of its
can deduce whether the occupants are at home by monitoring “smartness”. As described in Section II, there are various
the power reading of the smart meter, where the change of different features that can be implemented in a smart meter.
power consumption is more frequent when the occupants are at However, not all smart meter models have the same set of
home [21]. The type of electrical devices or home appliances features. Different models may have different features. Models
that are currently in the premise can also be deduced from the with more features tend to be more vulnerable to security
power reading [22]. One way to do this is by using Non- attacks. This is because with more features, there will be more
intrusive Load Monitoring (NILM) algorithms, which are able attack vectors. Among the more vulnerable features are the
to distinguish power fluctuations caused by different devices wireless communication interface, the ability to read data from

13
2014 International Conference on Information Technology and Multimedia (ICIMU), November 18 – 20, 2014, Putrajaya, Malaysia

individual household devices and the ability to control [16] F.M. Tabrizi, and K. Pattabiraman, “A model for security analysis of
individual household devices. Similar to other areas of smart meters,” in Proc. IEEE/EFIP 42nd International Conference on
Dependable Systems and Networks Workshops (DSN-W), pp. 1 – 6,
computer security, there is always a tradeoff between 2012.
functionality and security. Therefore, it is important for the [17] Ye Yan, R.Q. Hu, S.K. Das, H. Sharif, and Yi Qian, “An efficient
utility company to identify what the smart meter can and security protocol for advanced metering infrastructure in smart grid,”
cannot do as part of its security policy. Using the security IEEE Network, vol. 27, issue 4, pp. 64 – 71, 2013.
policy as the guiding principle, the company can then choose [18] S. Kaplantzis, and Y.A. Sekercioglu, “Security and smart metering,” in
and deploy the right smart meter model to optimize Proc. 18th European Wireless Conference European (EW), pp. 1 – 8,
functionality and minimize the financial risk. 2012.
[19] T. Mehra, V. Dehalwar, and M. Kolhe, “Data communication security of
advanced metering infrastructure in smart grid,” in Proc. 5th
REFERENCES International Conference on Computational Intelligence and
Communication Networks (CICN), pp. 394 – 399, 2013.
[1] H.S. Fhom, K.M. Bayarou, “Towards a holistic privacy engineering [20] J.R. Minkel, “The 2003 northeast blackout – five years later,” [online].
approach for a smart grid system,” in Proc. 10th IEEE International Available: http://www.scientificamerican.com/article/2003-blackout-
Conference on Trust, Security and Privacy in Computing and five-years-later/, 2008.
Communications, pp. 234 – 241, 2011. [21] S. Gong, and H. Li, “Anybody home? Keeping user presence privacy for
[2] P. McDaniel, S. McLaughlin, “Security and privacy challenges in the advanced metering in future smart grid,” in Proc. GLOBECOM
smart grid,” IEEE Security & Privacy, vol. 7, issue 3, pp. 75 – 77, 2009. Workshops (GC Wkshps), pp. 1211 – 1215, 2011.
[3] Jing Liu and Yang Xiao, “Cyber security and privacy issues in smart [22] C. Efthymiou and G. Kalogridis, “Smart grid privacy via anonymization
grids,” IEEE Communications Surveys & Tutorials, vol. 14, issue 4, pp. of smart metering data,” in Proc. First IEEE International Conference on
981 – 997, 2012. Smart Grid Communications (SmartGridComm), pp. 238 – 243, 2010.
[4] R. Anderson, “Security economics – a personal perspective, ” in Proc. [23] L. AlAbdulkarim and Z. Lukszo, “Impact of privacy concerns on
Computer Security Application Conference, pp. 139 – 144, 2012. consumers' acceptance of smart metering in the Netherlands,” in Proc.
IEEE International Conference on Networking, Sensing and Control
[5] R. Anderson, “Why information security is hard – an economic (ICNSC), pp. 287 – 292, 2011.
perspective,” in Proc. Computer Security Applications Conference, pp.
358 – 365, 2001. [24] Xuebin Ren, Xinyu Yang, Jie Lin, Qingyu Yang, and Wei Yu, “On
scaling perturbation based privacy-preserving schemes in smart metering
[6] E. Ellis, “Report finds smart-grid security lacking,” [online]. Avalaible: systems,” in Proc. 22nd International Conference on Computer
http://www.cnet.com/news/report-finds-smart-grid-security-lacking. Communications and Networks (ICCCN), pp. 1 – 7, 2013.
[7] L. Wang, V. Devabhaktuni, N. Gudi, "Smart meters for power grid — [25] G. Kalogridis, C. Efthymiou, S.Z. Denic, T.A. Lewis, R. Cepeda,
Challenges, issues, advantages and status," in Proc. Power Systems “Privacy for smart meters: towards undetectable appliance load
Conference and Exposition (PSCE), pp. 20 – 23, 2011. signatures,” in Proc. First IEEE International Conference on Smart Grid
[8] J. Zheng, D.W. Goa, L. Lin, “Smart meters in smart grid: an overview,” Communications (SmartGridComm), pp. 232 – 237, 2010.
in Proc. IEEE Green Technologies Conference, pp. 57 – 64, 2013. [26] C. Thoma, T. Cui, and F. Franchetti, “Secure multiparty computation
[9] “The smart meter revolution: towards a smarter future,” [Online]. based privacy preserving smart metering system,” in Proc. North
Available: https://m2m.telefonica.com/m2m-media/m2m-downloads. American Power Symposium (NAPS), pp. 1 – 6, 2012.
[10] A. Barenghi, G. M. Bertoni, L. Breveglieri, M. G.Fugini, and G. Pelosi, [27] Z. Erkin, J.R. Troncoso-Pastoriza, R.L. Lagendijk, and F. Perez-
“Smart metering in power grids: Application scenarios and security,” in Gonzalez, “Privacy-preserving data aggregation in smart metering
Proc. 1st IEEE PES Innovative Smart Grid Technologies (ISGT) Asia systems: an overview,” IEEE Signal Processing Magazine, vol. 30, issue
Conf., pp. 1 – 8, 2011. 2, pp. 75 – 86, 2013.
[11] F. Skopik, and Z. Ma, “Attack vectors to metering data in smart grids [28] A. Cavoukian, and K. Kursawe, “Implementing privacy by design: the
under security constraints,” in Proc. IEEE 36th Annual Computer smart meter case,” in Proc. IEEE International Conference on Smart
Software and Applications Conference Workshops (COMPSACW), pp. Grid Engineering (SGE), pp. 1 – 8, 2012.
134 – 139, 2012. [29] A. Reinhardt, F. Englert, and D. Christin, “Enhancing user privacy by
[12] G. Kalogridis, M. Sooriyabandara, Z. Fan, and M.A. Mustafa, “Toward preprocessing distributed smart meter data,” in Proc. Sustainable
Unified Security and Privacy Protection for Smart Meter Networks,” Internet and ICT for Sustainability (SustainIT), pp. 1 – 7, 2013.
IEEE Systems Journal, vol. 8, issue 2, pp. 641 – 654, 2013. [30] T. Jeske, “Privacy-preserving smart metering without a trusted-third-
[13] J. Chinnow, K. Bsufka, A.D. Schmidt, R. Bye, A. Camtepe, and S. party,” in Proc. International Conference on Security and Cryptography
Albayrak, “A simulation framework for smart meter security (SECRYPT), pp. 114 – 123, 2011.
evaluation,” in Proc. IEEE International Conference on Smart [31] Hsiao-Ying Lin, Shiuan-Tzuo Shen, and B.P. Lin, “A privacy preserving
Measurements for Future Grids (SMFG), pp. 1 – 9, 2011. smart metering system supporting multiple time granularities,” in Proc.
[14] L. Al Abdulkarim and Z. Lukszo, “Information security assurance in Sixth International Conference on Software Security and Reliability
critical infrastructures: smart metering case,” in Proc. First International Companion (SERE-C), pp. 119 – 126, 2012.
Conference on Infrastructure Systems and Services: Building Networks [32] C. Rottondi, G. Verticale, and C. Krauss, “Distributed privacy-
for a Brighter Future (INFRA), pp. 1 – 6, 2008. preserving aggregation of metering data in smart grids,” IEEE Journal
[15] L.O. AlAbdulkarim and Z. Lukszo, “Information security on Selected Areas in Communications, vol. 31, no. 7, pp. 1342 – 1354,
implementation difficulties in critical infrastructures: smart metering 2013.
case,” in Proc. International Conference on Networking, Sensing and
Control (ICNSC), pp. 715 – 720, 2010.

14

Das könnte Ihnen auch gefallen