Skip to main content
Log in

Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The increasing use of smart metering infrastructure invites security threats through trusted insiders in spite of the devices’ authentication phase. Trusted insiders equipped with high privilege are also become vulnerable to being attacked. In the presence of these malicious or compromised insiders, it becomes difficult to achieve an efficient, transparent, reliable, and cost-effective smart grid. Addressing the issues arising from an insider attack, we explore post-authentication attacks and present a reputation score-based model using blockchain technology. The reputation of a device is computed based on the neighbor’s opinion. The opinions and incentives are stored on a blockchain to ensure integrity, availability, and decentralization. We analyze the latency of the proposed model by modifying the open-source Go Ethereum and security effectiveness through a reputation simulator. In addition to this, storage, communication, resource usage overhead, and security requirements are also analyzed to prove the efficiency of the proposed model for the lightweight smart metering infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Liu, L., De Vel, O., Han, Q., Zhang, J., Xiang, Y.: Detecting and preventing cyber insider threats: a survey. IEEE Commun. Surv. Tutor. 20(2), 1397–1417 (2018). https://doi.org/10.1109/COMST.2018.2800740

    Article  Google Scholar 

  2. Kim, A., Oh, J., Ryu, J., Lee, J., Kwon, K., Lee, K.: SoK: a systematic review of insider threat detection. J. Wirel. Mob. Netw. Ubiq. Comput. Depend. Appl. 10(4), 46–67 (2019). https://doi.org/10.22667/JOWUA.2019.12.31.046

    Article  Google Scholar 

  3. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf

  4. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: Ddos in the iot: Mirai and other botnets. Comput. IEEE Comput. Soc. 50(7), 80–84 (2017)

    Article  Google Scholar 

  5. Mollah, M.B., Zhao, J., Niyato, D., Lam, K.-Y., Zhang, X., Ghias, A.M.Y.M., Koh, L.H., Yang, L.: Blockchain for future smart grid: a comprehensive survey. IEEE Internet Things J 6, 66 (2020)

    Google Scholar 

  6. Kim, S.M., Lee, T., Kim, S., Park, L.W., Park, S.: Security issues on smart grid and blockchain-based secure smart energy management system. In: MATEC Web of Conferences (2019)

  7. Zhuang, P., Zamir, T., Liang, H.: Blockchain for cyber security in smart grid: a comprehensive survey. IEEE Trans. Ind. Inform. 6, 66 (2020)

    Google Scholar 

  8. Andonia, M., Robua, V., Flynna, D., Abramb, S., Geachc, D., Jenkinsd, D., McCallumd, P., Peacock, A.: Blockchain technology in the energy sector: a systematic review of challenges and opportunities. J. Renew. Sustain. Energy Rev. 100, 143–174 (2019)

    Article  Google Scholar 

  9. Popov, S.: The Tangle (2018). https://www.iota.org/foundation/research-papers. Accessed 16 Sept 2020

  10. Hussain, S.M.S., Farooq, S.M., Ustun, T.S.: Implementation of blockchain technology for energy trading with smart meters. In: Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India, 2019, pp. 1–5. https://doi.org/10.1109/i-PACT44901.2019.8960243

  11. Liu, D., Li, D., Liu, X., Ma, L., Yu, H., Zhang, H.: Research on a cross-domain authentication scheme based on consortium blockchain in V2G networks of smart grid. In: 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, pp. 1–5. https://doi.org/10.1109/EI2.2018.8582227

  12. Wang, J., Wu, L., Choo, K.R., He, D.: Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure. IEEE Transactions on Industrial Informatics 16(3), 1984–1992 (2020). https://doi.org/10.1109/TII.2019.2936278

    Article  Google Scholar 

  13. Singh, J., Rajendra, Y., Subramanian, V., Vyas, O.P.: A lightweight authentication and key establishment scheme for smart metering infrastructure. In: International conference on Cyber Security in Emerging Digital Era (ICCEDE2020)

  14. Kamal, M., Tariq, M.: Light-weight security and blockchain based provenance for advanced metering infrastructure, special section on smart caching, communications, computing and cybersecurity for information-centric. IEEE Access Internet Things 7, 87345–87356 (2019)

    Google Scholar 

  15. Formby, D., Jung, S.S., Walters, S., Beyah, R.: A physical overlay framework for insider threat mitigation of power system devices. In: IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, pp. 970–975 (2014). https://doi.org/10.1109/SmartGridComm.2014.7007774

  16. Li, B., Lu, R., Xiao, G., Bao, H., Ghorbani, A.A.: Towards insider threats detection in smart grid communication systems. IET Commun. 13(12), 1728–1736 (2019). https://doi.org/10.1049/iet-com.2018.5736

    Article  Google Scholar 

  17. Pranata, I., Athauda, R., Skinner, G.: Modeling decentralized reputation-based trust for initial transactions in digital environments. ACM Trans. Internet Technol. 12(8), 1–8 (2013)

    Article  Google Scholar 

  18. German Caronni: Walking the web of trust. In: 9th International Workshops on Enabling Technologies: Infrastructurefor Collaborative Enterprises (WET ICE), pp. 153–158. IEEE (2000)

  19. Yang, Z., Yang, K., Lei, L., Zheng, K., Leung, V.C.M.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2019), 1495–1505 (2019)

    Article  Google Scholar 

  20. Moinet, A., Darties, B., Baril, J.-L.: Blockchain based trust & authentication for decentralizedsensor networks. arXiv preprint arxiv:1706.01730 (2017)

  21. Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. 6(5), 7992–8004 (2020)

    Article  Google Scholar 

  22. Pop, C., Cioara, T., Antal, M., Anghel, I., Salomie, I., Bertoncini, M.: Blockchain based decentralized management of demand response programs in smart energy grids. MDPI Sens. 18, 162 (2018)

    Article  Google Scholar 

  23. Guan, Z., Si, G., Zhang, X., Longfei, W., Guizani, N., Xiaojiang, D., Ma, Y.: Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 56(7), 82–88 (2018)

    Article  Google Scholar 

  24. Zhanga, H., Wang, J., Ding, Y.: Blockchain-based decentralized and secure keyless signature scheme for smart grid. The Int. J. Energy 180, 955–967 (2019)

    Article  Google Scholar 

  25. de Agung, A.A.G., Handayani, R.: Blockchain for smart grid. J. King Saud Univ. Comput. Inf. Sci. (in press) (2020)

  26. Mylrea, M., Gourisetti, S.N.G.: Blockchain for smart grid resilience: exchanging distributed energy at speed, scale and security. In: Resilience Week (RWS), Wilmington, DE, pp. 18–23 (2017)

  27. Chen, X., Shen, J., Cao, Z., Dong, X.: A blockchain-based privacy-preserving scheme for smart grids. In: Proceedings of the 2nd International Conference on Blockchain Technology, pp. 120–124 (2020)

  28. Meng, W., Li, W., Yang, L.T., Li, P.: Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. Int. J. Inf. Secur. 19, 279–290 (2020)

  29. Shala, B., Trick, U., Lehmann, A., Ghita, B., Shiaeles, S.: Blockchain and trust for secure, end-user-based and decentralized IOT service provision. IEEE Access 8, 119961–119979 (2020)

  30. Subramanian, V., Rajendra, Y., Sahai, S., Shukla, S.K.: Decentralized device authentication model using the trust score and blockchain technology for dynamic networks. In: Proceedings of the 3rd IEEE Blockchain Conference, Vol. 1, pp. 116–125 (2020)

  31. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)

    Article  Google Scholar 

  32. Graf, T., Lemire, D.: Xor Filters: Faster and Smaller Than Bloom and Cuckoo Filters (2019). arxiv:1912.08258

  33. Goethereum. https://github.com/ethereum/go-ethereum

  34. Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. In: Ethereum Project Yellow Paper, pp. 1–32 (2014)

  35. QTM:P2P Trust Simulator (2009). https://rtg.cis.upenn.edu/qtm/p2psim.php3

  36. Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Dobbie, G., Estivill-Castro, V. (Eds.) Conference Proceedings of the Twenty-Ninth Australasian Computer Science Conference (ACSW 2006), pp. 85–94. Australian Computer Society, CD Rom

  37. West, A.G., Kannan, S., Lee, I., Sokolsky, O.: An evaluation framework for reputation management systems. In: Yan, Z. (Ed.) Trust Modeling and Management in Digital Environments: From Social Concept to System Development, pp. 282–308 (2010)

Download references

Funding

The work is funded by Department of Science and Technology(DST), India, for the Cyber Physical Security in Energy Infrastructure for Smart Cities (CPSEC) project under Smart Environments theme of Indo-Norwegian Call.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaya Singh.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest for the presented work.

Ethical approval

This article does not contain any studies performed by any of the authors with human participants or animals.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, J., Sinha, A., Goli, P. et al. Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology. Int. J. Inf. Secur. 21, 527–546 (2022). https://doi.org/10.1007/s10207-021-00561-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-021-00561-8

Keywords

Navigation