Zhang Zhongdong, Cai Ziwen, Yang Jinfeng, Qian Bin, Xiao Yong
{"title":"基于云的智能电表网络安全防御","authors":"Zhang Zhongdong, Cai Ziwen, Yang Jinfeng, Qian Bin, Xiao Yong","doi":"10.1109/ICVRIS51417.2020.00132","DOIUrl":null,"url":null,"abstract":"In Advanced Metering Infrastructure (AMI), smart meters (SM) implement encryption with Embedded Secure Access Module (ESAM) to implement secure communication. However, it may be attacked by malicious adversaries once the ESAM is cracked. Since SM has limited communication and computing resources and cannot detect malicious code, a cloud based cyber security protection approach is proposed to detect malware online. Firstly, the closed and fixed operating environment is utilized to establish and maintain a white list of legal processes in the cloud security server. Thereafter, the malware detection agent is installed in SM, and all operating processes are enumerated by it. The hash code of each process can be calculated as its identity and submitted to the cloud security server. The SM with malware could be identified by comparing it with the whitelist. SM needs only calculate and upload hash code of processes, which is affordable to SM with limited computing & communication resources. The proposed approach can help harden cyber security defense of AMI.","PeriodicalId":162549,"journal":{"name":"2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cloud Based Cyber Security Defense of Smart Meters\",\"authors\":\"Zhang Zhongdong, Cai Ziwen, Yang Jinfeng, Qian Bin, Xiao Yong\",\"doi\":\"10.1109/ICVRIS51417.2020.00132\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Advanced Metering Infrastructure (AMI), smart meters (SM) implement encryption with Embedded Secure Access Module (ESAM) to implement secure communication. However, it may be attacked by malicious adversaries once the ESAM is cracked. Since SM has limited communication and computing resources and cannot detect malicious code, a cloud based cyber security protection approach is proposed to detect malware online. Firstly, the closed and fixed operating environment is utilized to establish and maintain a white list of legal processes in the cloud security server. Thereafter, the malware detection agent is installed in SM, and all operating processes are enumerated by it. The hash code of each process can be calculated as its identity and submitted to the cloud security server. The SM with malware could be identified by comparing it with the whitelist. SM needs only calculate and upload hash code of processes, which is affordable to SM with limited computing & communication resources. The proposed approach can help harden cyber security defense of AMI.\",\"PeriodicalId\":162549,\"journal\":{\"name\":\"2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICVRIS51417.2020.00132\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICVRIS51417.2020.00132","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud Based Cyber Security Defense of Smart Meters
In Advanced Metering Infrastructure (AMI), smart meters (SM) implement encryption with Embedded Secure Access Module (ESAM) to implement secure communication. However, it may be attacked by malicious adversaries once the ESAM is cracked. Since SM has limited communication and computing resources and cannot detect malicious code, a cloud based cyber security protection approach is proposed to detect malware online. Firstly, the closed and fixed operating environment is utilized to establish and maintain a white list of legal processes in the cloud security server. Thereafter, the malware detection agent is installed in SM, and all operating processes are enumerated by it. The hash code of each process can be calculated as its identity and submitted to the cloud security server. The SM with malware could be identified by comparing it with the whitelist. SM needs only calculate and upload hash code of processes, which is affordable to SM with limited computing & communication resources. The proposed approach can help harden cyber security defense of AMI.