Mobile Networks and Applications

, Volume 23, Issue 4, pp 967–981 | Cite as

A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT

  • Vilmar AbreuEmail author
  • Altair Santin
  • Alex Xavier
  • Alison Lando
  • Adriano Witkovski
  • Rafael Ribeiro
  • Maicon Stihler
  • Voldi Zambenedetti
  • Ivan Chueiri


The literature does not present integral solutions to allow using the same credential to access the smart meter and smart house from an electric utility and vice-versa. The main reason being the technology gap in the communication between the Advanced Metering Infrastructure (AMI) and the Internet. The technology used in the Internet domain to communicate with Data Concentrators (DC) and the electric utility is more powerful than the technology used in the communication between smart meters and the DC, which is bandwidth limited and better suited to the Internet of Things (IoT) domain. Therefore, we are proposing the use of Identity Management (IdM) and a key-based scheme to enable the integration of IoT and the Internet using the same credentials, without creating a security bottleneck in the communication. An additional security mechanism is provided in the smart house context to isolate the house from direct accesses from the Internet, though allowing the utility to reconfigure the electric power consumption profile to avoid a potential blackout, for instance. Our proposal includes multi-sensor anti-tampering techniques to provide physical protection to a smart meter, in conjunction with a multilevel integrity mechanism to provide logical protection to its resource-constrained microcontroller, given the smart meter is a key component to mitigate electricity consumption fraud. The prototype has shown that our proposal is feasible for protecting the smart house, smart meter and the end-to-end communication between smart meter or house and the utility.


Smart meter physical and logical security Multilevel integrity protection Tampering detection End-to-end protection in smart grid ICT Reconfiguration of smart house electric power consumption IdM integrating the internet and IoT technologies 



This work was partially sponsored by the Brazilian National Council for Scientific and Technological Development (CNPq), grants 307346/2015-3 and 404963/2013-7. Vilmar Abreu Junior wishes to thanks to CNPq for scholarship granting, process 381612/2014-7. We wish to thank for the valuable contribution to the electric engineering Alison Lando, Ivan Chueiri, Voldi Zambenedetti and Marcio Hamerschmidt (Copel). Moreover, we thanks to our partners from industry, Siemens and Copel.


  1. 1.
    Cai Z, Yu M, Steurer M, Li H, Dong Y (2016) A network model for the real-time communications of a smart grid prototype. J Netw Comput Appl 59:264–273CrossRefGoogle Scholar
  2. 2.
    Gungor VC, Sahin D, Kocak T, Ergut S, Buccella C, Cecati C, Hancke GP (2013) A survey on smart grid potential applications and communication requirements. IEEE Trans Ind Inf 9(1):28–42CrossRefGoogle Scholar
  3. 3.
    Shiobara T, Palensky P, Nishi H (2015) Effective metering data aggregation for smart grid communication infrastructure, IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society, Yokohama, pp. 2136–2141.  https:/
  4. 4.
    Emmanuel M, Rayudu R (2016) Communication technologies for smart grid applications: a survey. J Netw Comput Appl 74:133–148CrossRefGoogle Scholar
  5. 5.
    Ganzha M, Paprzycki M, Pawłowski W, Szmeja P, Wasielewska K (2016) Semantic interoperability in the internet of things: an overview from the INTER-IoT perspective. J Netw Comput Appl 81:111–124CrossRefGoogle Scholar
  6. 6.
    OpenID Connect Core 1.0 Available at: Accessed March 2017
  7. 7.
    Infoworld. Millions of embedded devices use the same hard-coded SSH and TLS private keys. Available at: Accessed March 2017
  8. 8.
    Hacker News Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys. Available at: Accessed March 2017
  9. 9.
    ZDnet Smart meter hacking tool released. Available at: Accessed March 2017
  10. 10.
    Patel SC, Sanyal P (2008) Securing SCADA systems. Inf Manag Comput Secur 16(4):398–414CrossRefGoogle Scholar
  11. 11.
    Warmer C, Kok K, Karnouskos S, Weidlich A, Nestle D, Selzam P, Ringelstein j, Dimeas A, andDrenkard S (2009) Web services for integration of smart houses in the smart grid. Proc of Grid-Interop Conference, Denver, USA, pp. 1–5Google Scholar
  12. 12.
    Yan Y, Qian Y, Sharif H, Tipper D (2013) A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Commun Surv Tutorials 15(1):5–20CrossRefGoogle Scholar
  13. 13.
    ZDnet Could lax smart meter security blackout the UK? Available at: Accessed March 2017
  14. 14.
    Tanimoto S, Kinno R, Iwashita M, Kobayashi T, Sato H, Kanai A (2016) Risk assessment of home gateway/smart meter in smart grid service. Proc Int Congr Adv Appl Informatics:1126–1131Google Scholar
  15. 15.
    Kołodziej J, Jaatun MG, Khan SU, Koeppen M (2013) Security-aware and data intensive low-cost mobile systems. Mob Networks Appl 18(5):591–593CrossRefGoogle Scholar
  16. 16.
    Liu J, Xiao Y, Chen CLP (2012) Authentication and access control in the internet of things. 32nd International Conference on Distributed Computing Systems Workshops, Macau, pp. 588–592.  https:/
  17. 17.
    Chin WL, Lin YH, Chen HH (2016) A framework of machine-to-machine authentication in smart grid: a two-layer approach. IEEE Commun Mag 54(12):102–107CrossRefGoogle Scholar
  18. 18.
    Saxena N, Choi BJ (2016) Integrated distributed authentication protocol for smart grid communications. IEEE Syst J:(99)1–12.  https:/
  19. 19.
    Mohammad N, Barua A, Arafat MA (2013) A smart prepaid energy metering system to control electricity theft.2013 International Conference on Power, Energy and Control (ICPEC), Sri Rangalatchum Dindigul, pp. 562–565.  https:/
  20. 20.
    Tangsunantham N, Ngamchuen S, Nontaboot V, Thepphaeng S, Pirak C (2013) Experimental performance analysis of current bypass anti-tampering in smart energy meters. 2013 Australasian Telecommunication Networks and Applications Conference (ATNAC), Christchurch, pp. 124–129.  https:/
  21. 21.
    Kadurek P, Blom J, Cobben JFG, Kling WL (2010) Theft detection and smart metering practices and expectations in the Netherlands. 2010 I.E. PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe), Gothenburg, pp. 1–6.  https:/
  22. 22.
    Fraser T (2000) LOMAC: low water-mark integrity protection for COTS environments. Proceeding 2000IEEE Symposium on Security and Privacy. S&P 2000, Berkeley, CA, pp.230–245.  https:/
  23. 23.
    Brasser F, El Mahjoub B, Sadeghi A-R, Wachsmann C, Koeberl P (2015) TyTAN: tiny trust anchor for tiny devices. 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, pp. 1–6.  https:/
  24. 24.
    Al-Ali AR, AL-Rousan M (2004) Java-based home automation system. IEEE Trans Consum Electron 50(2):498–504CrossRefGoogle Scholar
  25. 25.
    Golzar MG, Tajozzakerin H (2010) “A new intelligent remote control system for home automation and reduce energy consumption,” 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation, Kota Kinabalu, Malaysia, pp. 174–180.  https:/
  26. 26.
    Korkmaz I, Metin SK, Gurek A, Gur C, Gurakin C, Akdeniz M (2015) A cloud based and android supported scalable home automation system. Comput Electr Eng 43:112–128CrossRefGoogle Scholar
  27. 27.
    Chan H, Perrig A (2003) Security and privacy in sensor networks. Computer 36(10):103–105CrossRefGoogle Scholar
  28. 28.
    The hacker News. Linux Worm targets Internet-enabled Home appliances to Mine Cryptocurrencies Available at: Accessed March 2017
  29. 29.
    Zheng J, Gao DW, Lin L (2013) Smart meters in smart grid: an overview. 2013 I.E. GreenTechnologies Conference (GreenTech), Denver, CO, pp. 57–64.  https:/
  30. 30.
    Ramírez DF, Céspedes S (2015) Routing in neighborhood area networks: a survey in the context of AMI communications. J Netw Comput Appl 55:68–80CrossRefGoogle Scholar
  31. 31.
    Dark Reading. Smart meter hack shuts off the lights. Available at: Accessed March 2017
  32. 32.
    Weiss M, Helfenstein A, Mattern F, Staake T (2012) Leveraging smart meter data to recognize home appliances. 2012 I.E. International Conference on Pervasive Computing and Communications, Lugano, pp. 190–197.  https:/
  33. 33.
    Biba KKJ (1977) Integrity considerations for secure computer systems. Proc Symp on Comput Archit 5(7):66Google Scholar
  34. 34.
    Witkovski A, Santin A, Abreu V, Marynowski J (2015) An IdM and key-based authentication method for providing single sign-on in IoT. 2015 I.E. Global Communications Conference (GLOBECOM), San Diego, CA, pp. 1–6.  https:/
  35. 35.
    Drotos D μCSim: software simulator for microcontrollers, Available at: embedded/ucsim/ Accessed March 2017
  36. 36.
    IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS) (2011) End-Use Applications, and Loads, in IEEE Std 2030–2011, pp.1-126.  htpps:/
  37. 37.
    Wolkerstorfer M, Schweighofer B, Wegleiter H, Statovci D, Schwaiger H, Lackner W (2016) Measurement and simulation framework for throughput evaluation of narrowband power line communication links in low-voltage grids. J Netw Comput Appl 59:285–300CrossRefGoogle Scholar
  38. 38.
    ANSI X9 encryption collection. Available at: Accessed March 2017
  39. 39.
    Vaadin OpenID Integration. Available at:!addon/openid-integration. Accessed March 2017
  40. 40.
    Java API for RESTful Services. Available at: Accessed March 2017
  41. 41.
    Eclipse Foundation, “Californium.” Available at: Accessed March 2017
  42. 42.
    The Contiki Operating System. Available at: Accessed March 2017
  43. 43.
    Mohammadali A, Tadayon MH, Asadian M (2014) A new key management for AMI systems based on DLMS/COSEM standard. Telecommunications (IST), 2014 7th International Symposium on, Tehran, pp. 849–856.  https:/
  44. 44.
    Ribeiro R, Santin A, Abreu V, Marynowski J, Viegas E (2016) Providing security and privacy in smart house through mobile cloud computing. Proc of IEEE Latin-American Conference on Communications:1–6Google Scholar
  45. 45.
    Niewiadomska-Szynkiewicz E, Sikora A, Kołodziej J (2013) Modeling mobility in cooperative ad hoc networks. Mob Networks Appl 18(5):610–621CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • Vilmar Abreu
    • 1
    Email author
  • Altair Santin
    • 1
  • Alex Xavier
    • 1
  • Alison Lando
    • 2
  • Adriano Witkovski
    • 1
  • Rafael Ribeiro
    • 1
  • Maicon Stihler
    • 1
    • 3
  • Voldi Zambenedetti
    • 2
  • Ivan Chueiri
    • 2
  1. 1.Graduate Program in Computer SciencePontifical Catholic University of ParanaCuritibaBrazil
  2. 2.Polytechnic SchoolPontifical Catholic University of ParanaCuritibaBrazil
  3. 3.Federal Center for Technological Education of Minas GeraisLeopoldinaBrazil

Personalised recommendations