816
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures

      proceedings-article
      , ,
      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)
      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
      17 - 18 September 2015
      intrusion detection system, smart meter, advanced metering infrastructure
      Bookmark

            Abstract

            In this paper we describe a novel approach to model smart meter networks aimed at analyzing security related aspects of such networks. The model is realized as a multi-agent based simulation. This allows for detailed analysis of network behaviour on different layers. The layers realized in the simulation are a protocol layer for syntactic analysis of the protocol, a data layer for semantic analysis of the commands transmitted, and an information layer where metering data is interpreted. The ultimate goal of the project is the design and proof-of-concept implementation of an innovative Intrusion Detection System specifically apt for smart meter networks. The simulation described in this paper together with data from real world field tests will be used to deduce formal rules describing regular behaviour of the network which then will be the input for the IDS.

            Content

            Author and article information

            Contributors
            Conference
            September 2015
            September 2015
            : 99-102
            Affiliations
            [0001]University of Applied Sciences

            St. Pölten
            Article
            10.14236/ewic/ICS2015.12
            2ffb861d-b61b-4c14-a725-129b5ae06731
            © Lang-Muhr et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2015.12
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            smart meter,intrusion detection system,advanced metering infrastructure

            References

            1. EUR-Lex http://eur-lex.europa.eu 2006 5 Apr [Online]. Available: http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=URISERV:l27057&fr om=EN 28 May 2015

            2. Bundesgesetzblatt, Intelligente MessgeräteEinführungsverordnung http://www.e-control.at 2012 24 Apr [Online]. Available: http://www.econtrol.at/de/marktteilnehmer/strom/smart-metering/rechtliche-grundlagen 28 May 2015

            3. 2011 Gap analysis of intrusion detection in smart grids Proceedings of the 2nd International Cyber Resilience Conference

            4. 2011 Cyber Security and information protection in a smart grid environment 18th IFAC World Congress Milano

            5. -R. 2013 Behavior-rule based intrusion detection systems for safety critical smart grid applications IEEE Trans. Smart Grid 4 3 1254 1263

            6. 2011 Distributed intrusion detection system in a multi-layer network architecture of smart grids IEEE Trans. Smart Grid 2 4 796 808

            7. 2013.Device implant attack detection for the smart grid King Fahd University of Petroleum & Minerals Dhahran, Saudi Arabia

            8. 2012. Model-based intrusion detection for home area networks in smart grids Department of Electrical and Computer Engineering, University of British Columbia

            9. 2014 A connection pattern-based approach to detect network traffic anomalies in critical infrastructures ACM European Workshop on System Security (EuroSec2014) Amsterdam

            10. 2014 Multiagent simulation and the MASON library Department of Computer Science, George Mason University Fairfax, VA

            11. 2012. SmartGrid/AEIC AMI interoperability standard guidelines for ANSI C12.19 / IEEE 1377 / MC12.19 end device communications and supporting enterprise devices, networks and related accessories, association of edison illuminating companies

            12. KommEnergie http://www.kommenergie.de [Online]. Available: /www.kommenergie. de/netz/standardlastprofil/standardlastprofileslp/ 28 May 2015

            13. 2012 AMI threats, intrusion detection requirements and deployment recommendations IEEE SmartGridComm Symposium Institute European Telecommunications Standards ETSI GS OSG 001 V1.1.1, 2012

            Comments

            Comment on this article