Attack surface analysis and mitigation for near-field communication networks and devices in smart grids

IF 4.5 Q2 COMPUTER SCIENCE, THEORY & METHODS
Array Pub Date : 2025-08-05 DOI:10.1016/j.array.2025.100447
Jing Guo, Zhimin Gu, Haitao Jiang, Yan Li, Daohua Zhu
{"title":"Attack surface analysis and mitigation for near-field communication networks and devices in smart grids","authors":"Jing Guo,&nbsp;Zhimin Gu,&nbsp;Haitao Jiang,&nbsp;Yan Li,&nbsp;Daohua Zhu","doi":"10.1016/j.array.2025.100447","DOIUrl":null,"url":null,"abstract":"<div><div>With growing demand and increasing concern for energy sustainability, smart grids (SGs) have emerged as a promising solution by integrating information and communication technologies to enhance the efficiency, reliability, and flexibility of power systems. While SGs enable real-time monitoring, they also introduce new security risks, particularly for endpoint and edge devices such as smart meters and inverters. Although earlier attacks primarily targeted centralized systems, recent studies have highlighted vulnerabilities on the consumer side, especially in the context of MadIoT-style attacks (MadIoT, short for Manipulation of Demand via IoT, refers to a class of coordinated attacks exploiting high-wattage IoT devices to destabilize power grids). This paper analyzes the attack surfaces of near-field communication network (NFN) protocols and devices within SGs, with a focus on widely adopted public protocols. We propose mitigation strategies to address these risks, including a reverse engineering-based edge device firmware emulation and execution method, a large language model-based protocol analysis approach, and a fuzzing-based malicious behavior simulation technique in a NFN. In our experiments, the proposed AFL-Netzob framework discovered 6 vulnerabilities across 3 firmware samples and achieved up to a 2× improvement in fuzzing efficiency compared to Boofuzz. These results demonstrate the practical effectiveness and general applicability of our framework in real-world smart grid scenarios.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"27 ","pages":"Article 100447"},"PeriodicalIF":4.5000,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Array","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2590005625000748","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

With growing demand and increasing concern for energy sustainability, smart grids (SGs) have emerged as a promising solution by integrating information and communication technologies to enhance the efficiency, reliability, and flexibility of power systems. While SGs enable real-time monitoring, they also introduce new security risks, particularly for endpoint and edge devices such as smart meters and inverters. Although earlier attacks primarily targeted centralized systems, recent studies have highlighted vulnerabilities on the consumer side, especially in the context of MadIoT-style attacks (MadIoT, short for Manipulation of Demand via IoT, refers to a class of coordinated attacks exploiting high-wattage IoT devices to destabilize power grids). This paper analyzes the attack surfaces of near-field communication network (NFN) protocols and devices within SGs, with a focus on widely adopted public protocols. We propose mitigation strategies to address these risks, including a reverse engineering-based edge device firmware emulation and execution method, a large language model-based protocol analysis approach, and a fuzzing-based malicious behavior simulation technique in a NFN. In our experiments, the proposed AFL-Netzob framework discovered 6 vulnerabilities across 3 firmware samples and achieved up to a 2× improvement in fuzzing efficiency compared to Boofuzz. These results demonstrate the practical effectiveness and general applicability of our framework in real-world smart grid scenarios.
智能电网中近场通信网络和设备的攻击面分析与缓解
随着能源可持续性需求的不断增长和人们对能源可持续性的日益关注,智能电网(SGs)已成为一种有前途的解决方案,它通过集成信息和通信技术来提高电力系统的效率、可靠性和灵活性。虽然SGs能够实现实时监控,但它们也带来了新的安全风险,特别是对于智能电表和逆变器等端点和边缘设备。虽然早期的攻击主要针对集中式系统,但最近的研究强调了消费者方面的漏洞,特别是在MadIoT式攻击的背景下(MadIoT是通过物联网操纵需求的缩写,指的是一类利用高瓦数物联网设备破坏电网稳定的协同攻击)。本文分析了近场通信网络(NFN)协议的攻击面和SGs内部设备的攻击面,重点分析了广泛采用的公共协议。我们提出了解决这些风险的缓解策略,包括基于逆向工程的边缘设备固件仿真和执行方法,基于大型语言模型的协议分析方法,以及NFN中基于模糊的恶意行为仿真技术。在我们的实验中,提出的AFL-Netzob框架在3个固件样本中发现了6个漏洞,与Boofuzz相比,模糊效率提高了2倍。这些结果证明了我们的框架在实际智能电网场景中的实际有效性和一般适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Array
Array Computer Science-General Computer Science
CiteScore
4.40
自引率
0.00%
发文量
93
审稿时长
45 days
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信