Hawzhin Mohammed, Jimmy Howell, S. R. Hasan, N. Guo, Faiq Khalid, O. Elkeelany
{"title":"基于硬件木马的家庭局域网安全问题:一个试验台设置","authors":"Hawzhin Mohammed, Jimmy Howell, S. R. Hasan, N. Guo, Faiq Khalid, O. Elkeelany","doi":"10.1109/MWSCAS.2018.8624048","DOIUrl":null,"url":null,"abstract":"Advanced Metering Infrastructure (AMI) is the main player in todays Smart Grid, and Home Area Network (HAN) is an important subsystem in AMI. HAN connects the smart home appliances (SHA) inside the home to the smart meter (SM), which is connected to the power utility company. In the last decade, hardware Trojans (HT), have been extensively studied in both academia and industry. Consequently, the vulnerability of integrated circuits (ICs) against HTs leads to the potential security threat to any system that contains ICs, and HAN is no exception. However, to the best of authors knowledge, the potential effect of HTs on HAN has not been studied in the literature so far. In this paper, we are investigating HT in HAN network. In the process, we developed a testbed which can be scalable up to 127 nodes using I2C interface to control and implement any kind of required network behavior. We introduced three possible scenarios of HTs in this HAN network testbed. These scenarios illustrate the manifestation of HTs in the HAN that leads to network performance degradation.","PeriodicalId":365263,"journal":{"name":"2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup\",\"authors\":\"Hawzhin Mohammed, Jimmy Howell, S. R. Hasan, N. Guo, Faiq Khalid, O. Elkeelany\",\"doi\":\"10.1109/MWSCAS.2018.8624048\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advanced Metering Infrastructure (AMI) is the main player in todays Smart Grid, and Home Area Network (HAN) is an important subsystem in AMI. HAN connects the smart home appliances (SHA) inside the home to the smart meter (SM), which is connected to the power utility company. In the last decade, hardware Trojans (HT), have been extensively studied in both academia and industry. Consequently, the vulnerability of integrated circuits (ICs) against HTs leads to the potential security threat to any system that contains ICs, and HAN is no exception. However, to the best of authors knowledge, the potential effect of HTs on HAN has not been studied in the literature so far. In this paper, we are investigating HT in HAN network. In the process, we developed a testbed which can be scalable up to 127 nodes using I2C interface to control and implement any kind of required network behavior. We introduced three possible scenarios of HTs in this HAN network testbed. These scenarios illustrate the manifestation of HTs in the HAN that leads to network performance degradation.\",\"PeriodicalId\":365263,\"journal\":{\"name\":\"2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MWSCAS.2018.8624048\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MWSCAS.2018.8624048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup
Advanced Metering Infrastructure (AMI) is the main player in todays Smart Grid, and Home Area Network (HAN) is an important subsystem in AMI. HAN connects the smart home appliances (SHA) inside the home to the smart meter (SM), which is connected to the power utility company. In the last decade, hardware Trojans (HT), have been extensively studied in both academia and industry. Consequently, the vulnerability of integrated circuits (ICs) against HTs leads to the potential security threat to any system that contains ICs, and HAN is no exception. However, to the best of authors knowledge, the potential effect of HTs on HAN has not been studied in the literature so far. In this paper, we are investigating HT in HAN network. In the process, we developed a testbed which can be scalable up to 127 nodes using I2C interface to control and implement any kind of required network behavior. We introduced three possible scenarios of HTs in this HAN network testbed. These scenarios illustrate the manifestation of HTs in the HAN that leads to network performance degradation.