2020
DOI: 10.1007/978-3-030-66763-4_22
|View full text |Cite
|
Sign up to set email alerts
|

MITM Intrusion Analysis for Advanced Metering Infrastructure Communication in a Smart Grid Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…The communication layer plays a crucial role in SEM as it connects the UC to the HAN. This layer is susceptible to multiple threats including wireless communication technology [37,38], transmission media [39], and wireless technology security [40,41]. These vulnerabilities lead to session hijacking [42], data loss, and bandwidth loss, resulting in data theft, data manipulation, and denial of service.…”
Section: Smart Energy Meter (Sem) Cyber Attack Surfacementioning
confidence: 99%
“…The communication layer plays a crucial role in SEM as it connects the UC to the HAN. This layer is susceptible to multiple threats including wireless communication technology [37,38], transmission media [39], and wireless technology security [40,41]. These vulnerabilities lead to session hijacking [42], data loss, and bandwidth loss, resulting in data theft, data manipulation, and denial of service.…”
Section: Smart Energy Meter (Sem) Cyber Attack Surfacementioning
confidence: 99%
“…However, attacks on the Modbus TCP/IP exploit the smart grid [89]. In this context, the authors of [90] analyzed the security extortions of MiTM attack on the AMI and concentrate on the vulnerabilities in Modbus TCP/IP protocol, which is implemented through AMI for communication purposes. Consequently, various detection methods are developed against MiTM attack detection such as machine learning, physical unclonable functions (PUF) authentication, and intrusion detection system (IDS), which are presented in Table 5.…”
Section: Man-in-the-middle (Mitm) Attackmentioning
confidence: 99%
“…Confidentiality, integrity and availability are impacted by masquerading attacks, together with authentication and access control, especially in the ethernet protocol [144]. Finally, man-in-the-middle (MITM) attacks represent an important security breach for the AMI [145], since the attacker intercepts, without corrupting them, messages exchanged by the data concentrator and the AMI, with the result that such attacks are almost undetectable. Similarly, the DNP3 SCADA protocol is also vulnerable to MITM threats [146].…”
Section: Mac Layer Attacksmentioning
confidence: 99%