Review-Of-Key-Management-Techniques-For-Advanced-Metering-Infrastructure
Review-Of-Key-Management-Techniques-For-Advanced-Metering-Infrastructure
Abstract
The electricity industry has been developed through the introduction of the smart grid. This has brought about two-way
communication to the grid and its components. The smart grid has managed to increase the efficiency and reliability of
the traditional power grid over the years. A smart grid has a system that is used to measure and collect readings for
power consumption reflection, and the system is known as the Advanced Metering Infrastructure. The advanced meter-
ing infrastructure has its components too which are the smart metre, metre control system, collector or concentrator
and communication networks (wide area network, neighbourhood area network, and home area network). The commu-
nication networks in the advanced metering infrastructure have created a vulnerability to cyber-attacks over the years.
The reliability of the power grid to consumers relies on the readings from the smart metre, and this brings about the
need to secure the smart metre data. This article presents a review of key management methods in advanced metering
infrastructure environments. The article begins with an overview of advanced metering infrastructure and then shows
the relationship between the advanced metering infrastructure and the smart grid. The review then provides the security
issues related to advanced metering infrastructure. Finally, the article provides existing works of key management meth-
ods in advanced metering infrastructure and future directions in securing advanced metering infrastructure and the
smart grid.
Keywords
Advanced metering infrastructure, key management, smart grid, smart metre
Creative Commons CC BY: This article is distributed under the terms of the Creative Commons Attribution 4.0 License
(https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work
without further permission provided the original work is attributed as specified on the SAGE and Open Access pages
(https://us.sagepub.com/en-us/nam/open-access-at-sage).
2 International Journal of Distributed Sensor Networks
MDMS also commands the smart metre to perform responding to commands within a timely manner and
required actions.12 not denying actions of receiving or transmitting data.
lightweight but at the same time providing privacy and Attackers target smart metre readings, billing informa-
following all security requirements. tion and customer information. The attackers or intru-
ders are usually highly skilled in cyber, and they look
Security issues and challenges related to for different weaknesses of the system to exploit the
AMI necessary information they are looking for. They usu-
ally access AMI configuration by cyber means and
As the smart grid deployments and enhancements con- temper with the firmware.23
tinue to grow, the AMI was developed as one of the The vulnerabilities discussed above are usually
enhancements. The development of AMI came with avoided or prevented by introducing four security
security challenges, and these challenges can be aspects in AMI infrastructure which are confidentiality,
addressed in three aspects which are end user privacy, integrity, availability and accountability.25 Cheating of
system resisting cyber-attacks and illegal power customers is avoided by the introduction of these secu-
consumption. rity aspects. Attackers usually develop hacking tools
which are targeting systems without these strong secu-
End user privacy rity aspects.26 In AMI, the four aspects are vital during
the deployment of the system. Cyber-attacks can also
There are three approaches for end user privacy in be targeting a nation or state as a form of terrorism.
AMI applications. The three approaches are anonymi- Attackers may take control of the whole grid in demand
zation, hybrid and non-anonymization. The utility pro- for money or power from a nation or state. If the secu-
vider determines the best privacy approach as a mutual rity aspects are in place, it is difficult for these intruders
agreement between them and customers. to take over the system.
Blocking of service Remote access to WAN Malfunctioning of the power grid and also
the AMI.
Firmware attack Physically accessing the smart metre/ Affects the ability of the smart metre to
Remotely upgrading WAN via the gateway measure.
Injection of packet Accessing WAN Wrong billings to consumers and utility
providers.
Eavesdropping Remotely accessing of WAN Detect and expose consumer’s privacy.
Remote control of the attacker Accessing WAN Distortion of metre readings at
consumers and being transferred to the
whole grid.
Interception On the local metrological Wrong readings feed to the gateway.
network (LMN) or WAN
Modification of the control unit may also deny legiti- many senders communicate to many receivers simulta-
mate users access to the system as their data are tem- neously,35 group to group. In the AMI network, multi-
pered with. The communication between the smart cast transmission or communication takes place when
metre and AMI happens through the collector in the the utility provider sends out notification messages to a
smart metre. The communication between the two can group of smart metres in the same location or demand
be consumption readings, commands on firmware response (DR) group; the DR group can be smart
updates, and configurations. The attacks that may arise metres for businesses, and the group depends on the
from this communication or flow of data disturb the DR project or classification.36 In multicast communica-
power grid, theft of power, and denial of service.30 On tion, only the chosen DR group receives the message
the HAN, the possible attacks that occur are stealing of and other groups do not receive the message.
data and blocking data flow. The optical interface is
where a technician instals and configures software in
the smart metre. The attacks in the optical interface are Broadcast transmission mode
interception and firmware attacks, resulting in power This transmission mode is used for communication
denial and disruption of the power grid in general. between one point and all other points in the network.37
Broadcast transmission was first used in the AM radio,
and now it is continuously used in both radio and tele-
Key management methods vision for distribution of audio and video, respectively.
There are three transmission modes in key manage- In the AMI network, broadcast transmission or com-
ment, which are unicast, multicast and broadcast. munication occurs when the utility company communi-
cates changes in electricity pricing to all consumers and
when notifying the consumers of power outages or any
Unicast transmission mode other ongoing project that may interrupt the service of
This transmission mode is used for communications power distribution.38 In broadcast communication, pri-
between two points.31 The data are transmitted from vacy is not key; thus, anyone in the network receives
the sender and go directly to one specified receiver. the message.
Only these two devices participate in the communica- In the key management systems, different
tion and other devices in the network stay idle.32 In the approaches are adopted for efficient management of
AMI network, unicast transmission or communication keys.36 Table 2 shows the different approaches and the
occurs when the smart metre sends consumption data techniques used in each approach.
to the utility provider.33
Related works
Multicast transmission mode Over the years, some work has been carried out in key
This transmission mode is used for communication management techniques for security of the smart metre
between one point and many specified points, referred and the smart grid in general.
to as a group.34 Multicast transmission can also be a The work in Rafaeli and Hutchison49 shows that
group of senders to a group of receivers thus when research on group key management has been done over
6 International Journal of Distributed Sensor Networks
Double encryption Authentication based The method uses two servers and these Parvez et al.39
servers function without increasing the
number of packet overheads.
Tree key graph Key graph The method is based on the use of key Liu et al.32 and Yu et al.40
graphs. The key graph controls keys of
individual smart metres, ensuring the security
requirements. In this method, the data are
kept private to avoid unauthorized access to
consumer’s daily habits.
Broadcast group PUF based This method uses weak physical unclonable Nabeel et al.42
key management functions (PUFs). PUF is an electronic
connection that deploys variations in
manufacturing to produce unique digital
finger prints.41 These PUFs provide robust
authentication to smart metre and data
collector in the AMI.
Hash chain PUF based This method uses PUFs and brings in the Delavar et al.44
Schnorr protocol for authentication
broadcast messaging protocol in AMI43
Multi group key graph Key graph The method creates secure cryptographic Benmalek et al.45
keys for every smart metre and MDMS over
a public channel. The keys are made in such a
way that they refresh after every transmission
for assurance of security.
Enhanced identity- Authentication based This method authenticates the smart metre Nicanfar et al.46
based cryptography with a server in the smart grid. The approach
adopts a key management protocol for
secure communication using public key.
ID-based encryption Hybrid The method combines private and public key Wan et al.47
cryptography. Different encryption algorithms
can be used here to achieve the combination
or the double encryption/decryption system.
The known work of this method used elliptic
curve cryptosystem.47 In this method, public
key certificate is not needed.
Advanced encryption standard Hybrid The method has an initial stage to eliminate Khasawneh and Kadoch48
or reduce computation overhead that uses
elliptic curve cryptography. The method
provides data encapsulation and its initial
stage provides key encapsulation.
the years. The approaches from previous work are smart metres and provides efficient key management to
divided into three main categories: centralized group, assure confidentiality and integrity of communication
decentralized architectures and distributed key manage- between the smart metre and the utility provider is pro-
ment protocols. posed. The technology is called a physically unclonable
In Yan et al.,50 an efficient batch authentication function (PUF). The system is directly installed in exist-
scheme for smart grid using binary authentication tree ing smart metre communication without the need for
is proposed. The scheme enables the gateway in AMI modification of the metre.
that verifies smart metre data to batch authenticate In Benmalek and Challal,53 a scalable multi group
data. key management method to be used in AMI is pro-
Kamto et al.51 proposed a key management scheme posed. The work supports the three modes of communi-
that combined Needham–Schroeder authentication cation: unicast, multicast and broadcast by using multi
protocol and a cryptographic method known as elliptic group key technique. The method is very applicable to
curve. The key management scheme uses a trust anchor large-scale smart grids.
to establish a session key. In Wen et al.,52 a technology The work in Benmalek et al.54 proposes four key
that provides strong hardware-based authentication for management schemes for AMI, to secure
Kebotogetse et al. 7
communication in the smart grid. The proposed multiple users and provides a link between key manage-
schemes are based on individual and batch rekeying ment centre and multicast network.
operations and support unicast, multicast and broad- In Benmalek et al.,45 a scalable multi group key
cast communications. management scheme for AMI is proposed. The scheme
In Benmalek et al.,55 a new key management scheme introduced low storage overheads when compared to
called iVerSAMI is proposed. The proposed scheme is others and also indicated low communication
aimed at addressing the efficiency flaws in broadcast overheads.
key management protocol suffered by VerSAMI key In Parvez et al.,39 a key management-based scheme
graph–based scheme. The work shows that iVerSAMI having two simple servers is proposed. The scheme
is more secure and efficient than VerSAMI in terms of focuses on a two-level encryption that does not result
storage and communication overheads. in increased packet overhead. Encryption secret keys
The work in Manjul and Mishra56 proposed an are generated by using hash functions in Kiarie et al.60
approach known as elliptic curve cryptography (ECC)- The method is anticipated to be a good approach to
based secure group communication. The approach is deal with 128 bit keys in encryption.
aimed at providing an efficient and improved mechan-
ism for group key management solutions. The method
minimizes rekeying cost and reduces computational Future directions
and communication overheads. AMI communication network security issues and chal-
The work of Kumar et al.57 proposed a key manage- lenges continue to be a major concern regardless of pre-
ment scheme designed for HAN having low rekeying vious researchers’ huge efforts. There is still need for
overheads and robustness that is enhanced, allowing future research ventures related to the smart grid, par-
the smart metres and HAN to share a session key ticularly key management in AMI. The AMI network
among themselves. The scheme does not require update comprises smart metres, customers and also the utility
to the keys whenever a smart metre leaves or joins the providers. The ‘Related works’ section describes the
system. This has reduced the rekeying cost compared research efforts made over the years to provide security
to other existing key management schemes. to AMI systems. However, there are still vulnerabilities
In El-Hajjar and Hanzo,37 a novel key management and issues that arise and this has provided potential
scheme based on the key graph method is proposed. research areas. The areas such as scalable architecture,
The scheme had three different key management pro- consumer privacy and security, defensive mechanisms
cesses designed for hybrid transmission modes, unicast, to address attacks and threats and content-centric net-
multicast and broadcast. Key management problems in working still have room for research ventures in AMI
AMI were addressed in Liu et al.32 with the proposed and key management. The smart grid has a large num-
novel Key Management Systems (KMS). In Kumar ber of sensors connected to it. The sensors are con-
et al.,58 the work of securing communication between nected over a wide area to control and monitor
multiple users using key graphs is proposed. The activities in the smart grid. Building a scalable architec-
method was later found to be weak by Wan et al.47 The ture for AMI network to deal with large amounts of
work found that the method58 was vulnerable to the data from these sensors is a major challenge faced by
denial of service attack and proposed a solution to the smart grid. It has been evident from the past
address this problem. Wan et al.47 addresses the prob- research works that most solutions do not address the
lem of de-synchronization attack and lack of scalability issue of scalability in the smart grid which is a major
due to inefficient key management in Liu et al.32 The requirement of a growing grid. Scalability and effi-
proposed new scalable key management method com- ciency of AMI communication will make secure and
bined identity-based cryptosystem and efficient key tree efficient metre data collection and distribution of mes-
method. The solution was meant for securing smart sages. A few works address the issue of scalability,
metre and MDMS communication. which are seen in Benmalek et al.45 and Wan et al.47
The work in Thomas et al.59 describes and imple- The proposed solutions that address scalability have
ments a signature-based station-to-station protocol for shown that key management in AMI is a promising
exchanging the secret shared keys among the AMI outcome, which means that work in the future should
applications to eliminate undesirable security threats. focus on the design of robust, scalable AMI
Secure Hash Algorithm (SHA) 1 hashing algorithm is communication.
used for creation digital signatures using private key Protection and security of consumers is one of the
encryption. major requirements of the smart grid AMI communica-
A secure IP multicasting system using encryption tion. To address the requirement, smart metres should
key management in an iNet environment was proposed be installed and encrypted with the latest security com-
by Maharjan et al.34 The system delivers keys between ponents for reliable storage. Smart metres should be
8 International Journal of Distributed Sensor Networks
17. Chen Z, Min L, Huang C, et al. Demand side energy multicast communications. In: Proceedings of the 2011
management under emergency conditions. In: Proceed- IEEE PES innovative smart grid technologies, Perth, WA,
ings of the 2018 IEEE power and energy society general Australia, 13–16 November 2011. New York: IEEE.
meeting, Portland, OR, 5–10 August 2018. New York: 34. Maharjan N, Moten D and Dean R. Secure IP multicast-
IEEE. ing with encryption key management. Int Telem C 2011;
18. Mo Y, Kim THJ, Brancik K, et al. Cyber–physical secu- 47: 1–10.
rity of a smart grid infrastructure. P IEEE 2012; 100(1): 35. Bihani A. An analysis of routing protocols in MANETs.
195–209. Int J Eng Trends Tech 2014; 7(1): 31–35.
19. Jia W, Zhu H, Cao Z, et al. Human-factor-aware 36. Ghosal A and Conti M. Key management systems for
privacy-preserving aggregation in smart grid. IEEE Syst smart grid advanced metering infrastructure: a survey.
J 2014; 8(2): 598–607. IEEE Commun Surv Tut 2019; 21(3): 2831–2848.
20. Sankar L, Raj Rajagopalan S, Mohajer S, et al. Smart 37. El-Hajjar M and Hanzo L. A survey of digital television
meter privacy: a theoretical framework. IEEE T Smart broadcast transmission techniques. IEEE Commun Surv
Grid 2013; 4(2): 837–846. Tut 2013; 15(4): 1924–1949.
21. Kalogridis G, Sooriyabandara M, Fan Z, et al. Toward 38. International Telecommunication Union (ITU). Hand-
unified security and privacy protection for smart meter book on Digital Terrestrial Television broadcasting net-
networks. IEEE Syst J 2014; 8(2): 641–654. works and systems implementation, 2016, p. 318, https://
22. Namboodiri V, Aravinthan V, Mohapatra SN, et al. www.itu.int/dms_pub/itu-r/oth/0a/07/R0A0700003B0001
Toward a secure wireless-based home area network for PDFE.PDF
metering in smart grids. IEEE Syst J 2014; 8: 509–520. 39. Parvez I, Islam A and Kaleem F. A key management-
23. Esayas SY. The role of anonymisation and pseudonymi- based two-level encryption method for AMI. In: Proceed-
sation under the EU data privacy rules: beyond the ‘all or ings of the 2014 IEEE power energy society general meet-
nothing’ approach. Eur J Law Technol 2015; 6(2): 1–28. ing, National Harbor, MD, 27–31 July 2014, pp.1–5. New
24. Saputro N and Akkaya K. On preserving user privacy in York: IEEE.
Smart Grid advanced metering infrastructure applica- 40. Yu K, Arifuzzaman M, Wen Z, et al. A key management
tions. Secur Commun Netw 2014; 7(1): 206–220. scheme for secure communications of information centric
25. Anzalchi A and Sarwat A. A survey on security assess- advanced metering infrastructure in smart grid. IEEE T
ment of metering infrastructure in Smart Grid system. In: Instrum Meas 2015; 64(8): 2072–2085.
Proceedings of the IEEE SoutheastCon, Fort Lauderdale, 41. Gu C, Hanley N, McWilliams G, et al. Physical Unclon-
FL, 9–12 April 2015. New York: IEEE. able Functions (PUFs) for smart meter security, 2016,
26. Parks RC. Advanced metering infrastructure security con- https://project-sparks.eu/wp-content/uploads/2016/09/03-
siderations. Sandia report, 2007, pp.1–34. Sandia puf-belfast-workshop-20160826.pdf
National Laboratories, https://www.energy.gov/sites/ 42. Nabeel M, Kerr S, Ding X, et al. Authentication and key
prod/files/oeprod/DocumentsandMedia/20-AMI_Security management for advanced metering infrastructures utiliz-
_Considerations.pdf ing physically unclonable functions. In: Proceedings of
27. Depuru SSSR. Modeling, detection, and prevention of the 2012 IEEE 3rd international conference on smart grid
electricity theft for enhanced performance and security of communications (SmartGridComm), Tainan, Taiwan, 5–8
power grid. PhD Thesis, The University of Toledo, November 2012, pp.324–329. New York: IEEE.
Toledo, OH, August 2012, p.141. 43. Seurin Y. On the exact security of Schnorr-type signa-
28. Tarannu M, Sharma D and Singh D. A survey of moni- tures in the Random Oracle Model. In: Pointcheval D
toring and controlling power theft problem in local area. and Johansson T (eds) Advances in cryptology – EURO-
Int J Adv Res Idea Innov Technol 2017; 3: 401–405.
CRYPT 2012, vol. 7237 (Lecture notes in computer sci-
29. Khattak AM, Khanji S and Khan WA. Smart meter
ence, including subseries lecture notes in artificial
security: vulnerabilities, threat impacts, and countermea-
intelligence and lecture notes in bioinformatics). Berlin;
sures. In: Proceedings of the 13th international conference
Heidelberg: Springer, 2012, pp.554–571.
on ubiquitous information management and communication
44. Delavar M, Mirzakuchaki S, Ameri MH, et al. PUF-
(IMCOM), Phuket, Thailand, 4–6 January 2019. Cham:
based solutions for secure communications in Advanced
Springer.
Metering Infrastructure (AMI). Int J Commun Syst 2017;
30. Yi P, Zhu T, Zhang Q, et al. Puppet attack: a denial of
30(9): e3195.
service attack in advanced metering infrastructure net-
45. Benmalek M, Challal Y and Bouabdallah A. Scalable
work. J Netw Comput Appl 2016; 59: 325–332.
multi-group key management for advanced metering
31. Zhao J, Gündüz D, Simeone O, et al. Non-orthogonal
infrastructure. In: Proceedings of the 2015 IEEE interna-
unicast and broadcast transmission via joint beamform-
tional conference on computer and information technology;
ing and LDM in cellular networks. IEEE T Broadcast
ubiquitous computing and communications; dependable,
2020; 66(2): 216–228.
autonomic and secure computing; pervasive intelligence
32. Liu N, Chen J, Zhu L, et al. A key management scheme
and computing (CIT/IUCC/DASC/PICOM), Liverpool,
for secure communications of advanced metering infra-
structure in smart grid. IEEE T Ind Electron 2013; 60(1): 26–28 October 2015. New York: IEEE.
4746–4756. 46. Nicanfar H, Jokar P, Beznosov K, et al. Efficient authen-
33. Nicanfar H, Jokar P and Leung VCM. Smart grid tication and key management mechanisms for smart grid
authentication and key management for unicast and communications. IEEE Syst J 2014; 8(2): 629–640.
10 International Journal of Distributed Sensor Networks
47. Wan Z, Wang G, Yang Y, et al. SKM: scalable key man- 54. Benmalek M, Challal Y, Derhab A, et al. VerSAMI: ver-
agement for advanced metering infrastructure in smart satile and scalable key management for smart grid AMI
grids. IEEE T Ind Electron 2014; 61(12): 7055–7066. systems. Comput Netw 2018; 132: 161–179.
48. Khasawneh S and Kadoch M. Hybrid cryptography 55. Benmalek M, Challal Y and Derhab A. An improved key
algorithm with precomputation for advanced metering graph based key management scheme for smart grid AMI
infrastructure networks. Mobile Netw Appl 2018; 23(4): systems. In: Proceedings of the 2019 IEEE wireless com-
982–993. munications and networking conference (WCNC), Marra-
49. Rafaeli S and Hutchison D. A survey of key management kesh, 15–18 April 2019, pp.1–6. New York: IEEE.
for secure group communication. ACM Comput Surv 56. Manjul M and Mishra R. Secure group communication
2003; 35(3): 309–329. based on elliptic curve cryptography. Trans Netw Com-
50. Yan L, Chang Y and Zhang S. An efficiency batch mun 2014; 2(1): 1–26.
authentication scheme for smart grid using binary 57. Kumar V, Kumar R and Pandey SK. LKM-AMI: a light-
authentication tree. Int Arab J Inf Techn 2019; 16(3): weight key management scheme for secure two way commu-
435–441. nications between smart meters and HAN devices of AMI
51. Kamto J, Qian L, Fuller J, et al. Light-weight key distri- system in smart grid. Peer Peer Netw Appl 2021; 14: 82–100.
bution and management for Advanced Metering Infra- 58. Kumar A, Sri Lakshmi R and Preethi M. Implementing
structure. In: Proceedings of the 2011 IEEE GLOBECOM secure group communications using key graphs. Defence
workshops (GC Wkshps), Houston, TX, 5–9 December Sci J 2007; 57(2): 279–286.
2011, pp.1216–1220. New York: IEEE. 59. Thomas MS, Ali I and Gupta N. A secure way of exchan-
52. Wen J, Ma H and Zhang X. Optimization of the occlu- ging the secret keys in advanced metering infrastructure.
sion strategy in visual tracking. Tsinghua Sci Technol In: Proceedings of the 2012 IEEE international conference
2016; 21(2): 221–230. on power system technology (POWERCON), Auckland,
53. Benmalek M and Challal Y. eSKAMI: efficient and scal- New Zealand, 30 October–2 November 2012, pp.1–7.
able multi-group key management for advanced metering New York: IEEE.
infrastructure in smart grid. In: Proceedings of the 14th 60. Kiarie LK, Langat PK and Muriithi CM. Key generation
IEEE international conference Trustcom/BigDataSE/ for electrical smart meters using hash functions. In: Pro-
ISPA, Helsinki, 20–22 August 2015, vol. 1, pp.782–789. ceedings of the 2019 IEEE AFRICON conference, Accra,
New York: IEEE. 25–27 September 2019, pp.42–45. New York: IEEE.