Award Abstract # 1617394
TWC: Small: Collaborative: Multi-Layer Approaches for Securing Enhanced AMI Networks against Traffic Analysis Attacks

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF TENNESSEE
Initial Amendment Date: August 5, 2016
Latest Amendment Date: August 5, 2016
Award Number: 1617394
Award Instrument: Standard Grant
Program Manager: Phillip Regalia
pregalia@nsf.gov
 (703)292-2981
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2016
End Date: August 31, 2019 (Estimated)
Total Intended Award Amount: $107,926.00
Total Awarded Amount to Date: $107,926.00
Funds Obligated to Date: FY 2016 = $107,926.00
History of Investigator:
  • Husheng Li (Principal Investigator)
    husheng@purdue.edu
Recipient Sponsored Research Office: University of Tennessee Knoxville
201 ANDY HOLT TOWER
KNOXVILLE
TN  US  37996-0001
(865)974-3466
Sponsor Congressional District: 02
Primary Place of Performance: University of Tennessee Knoxville
1 Circle Drive
Knoxville
TN  US  37996-0003
Primary Place of Performance
Congressional District:
02
Unique Entity Identifier (UEI): FN2YCS2YAUW3
Parent UEI: LXG4F9K8YZK5
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001617DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7434, 7923, 9150
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

The U.S. power grid is being replaced with a smart grid, a complex network of intelligent electronic devices, distributed generators, and dispersed loads, which requires communication networks for management and coordination. Advanced metering infrastructure (AMI) networks are one part of the smart grid to provide two-way communications between smart meters at the consumers' side and the utility companies. AMI networks allow utilities to collect power consumption data at high frequency rates. However, it needs too much communication bandwidth for smart meters to frequently send power consumption data even when the power consumption does not change. Since using cellular networks is one of the best options to AMI networks, the cost of sending this large amount of data is prohibitive. This project considers enhanced AMI networks, where the meters send power consumption data only when there is a significant change. This can significantly reduce the amount of bandwidth needed for sending the power consumption data; however, it creates a new privacy problem. Practical experiment results have confirmed that by observing the data transmission rate and using traffic analysis techniques, the attackers can infer sensitive information about consumers. Therefore, this new privacy problem must be studied and addressed, and strong countermeasures should be developed.

The proposed research systematically combines efforts from privacy, networking, and communication communities. The project promotes a research program designed to: (a) develop schemes for countering traffic analysis in AMI networks by considering different network and adversary models; (b) quantitatively measure the privacy protection provided by the schemes; and (c) evaluate the schemes in a prototype system for validating the proposed research and enabling hands-on experience for both undergraduate and graduate students. The project will significantly contribute to the research on smart grid, as well as computer system security and privacy. The proposed research will lead to a body of knowledge that can be leveraged by the designers of other networks. The proposed project also lends itself to teaching, training and learning of students. A new graduate course focusing on security and privacy aspects of smart grid will be developed. The achievement of the proposed research will be disseminated to academic community and industry via academic conferences and industrial connections.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

J. Bao, D. Sun and H. Li "Cell Coverage of UAV Millimeter Wave Communication Network Subject to Wind" IEEE Global Communication Conference , 2019
J. Bao, H. Li "Privacy aware distributed computing of control strategy for smart grids - A separable function approach" IEEE International Conference on Communications , 2016
J. Bao, D. Sprinz, H. Li "Blockage of millimeter wave communications on rotor UAVs: Demonstration and mitigation" IEEE Military Communication Conference , 2017
Liang Li, Ju Bin Song, Husheng Li "Dynamic State Aware Adaptive Source Coding for Networked Control in Cyberphysical Systems." IEEE Trans. Vehicular Technology , v.66 , 2017
Liang Li, Shuping Gong, Ju Bin Song, Husheng Li "Performance analysis on joint channel decoding and state estimation in cyber-physical systems" EURASIP J. Wireless Comm. and Networking 2017 , 2017
S. Gong, L. Li, J. B. Song, H. Li "Joint Channel Decoding and State Estimation in Cyber-Physical Systems" IEEE Trans. on Wireless Communications , 2017
Shuping Gong, Liang Li, Ju Bin Song, Husheng Li "Joint Channel Decoding and State Estimation in Cyber-Physical Systems" IEEE Trans. Wireless Communications , v.16 , 2017

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

The Information infrastructure of smart grid plays the role of neural system, which carries various types of signal to the brain (control center) to react to the rapidly changing environment. The leakage of confidential message flowing through the network not only compromises the information security but also threatens the operation of the physical system. In Dec. 2015, a coordinated cyberattack on the Ukrainian power grid left more than 200,000 people within blackout for 30 minutes. This cyberattack immediately caught enormous concerns for the future integration of information technology of smart grid. As a large geographically distributed system, the operation of power system is highly nontrivial in the history, where all generators and consumers are connected through alternating coupling line, thus introducing the nonlinear nature to the whole system. To address the desire of a more reliable and efficient system, more real time automations are required to provide full control and extensive visibility of the entire system. All these urge for the new information and communication technologies to integrate all subsystems together. However, in the deregulated power systems since the 1970s, monopoly is eliminated in the power market, and the authority is dispersed to hundreds of companies. The privatization of power system allows power producers to pursue profits in the power market, while they share the same responsibility to maintain the interconnected system. It is well known that a noncooperative control approach for a large distributed system, where each party only considers its own profit, may lead to catastrophe. In such scenarios, information sharing among all subsystems is inevitable.
However, with the merge of competitive generation and transmission market, sharing confidential information comprises the privacy, reveals individual strategies and endangers the future profits. To handle the problem, independent third parties, such as independent system operators (ISOs) and regional transmission organizations (RTOs), will play a critical role in coordinating, controlling and monitoring the operation of the entire system. For the current situation, a contract is signed to authorize the trusted third parties to gather these confidential information with advanced communication network. In spite of that, malicious attackers could access or eavesdrop the information via the vulnerable information network. Therefore, the data must be protected with disguise. In general, there are several approaches to retain privacy. One is the traditional encryption method, which encodes the message in a manner such that only authorized participants can decode it. Another interesting approach, which caught attention recently, is to add dedicated random noise to perturb the true values. Here we consider a new approach to design an approximated control strategy with barely noticeable sacrifice of the performance loss. The basic idea used in this paper is based on the decomposition of functions and the corresponding dimension reduction. Consider two parties (e.g., two regional power providers) that intend to compute the control policy, which requires the local information of the two parties. We can consider the control policy as the computation of a function f(x,y), where x and y are the local parameters (e.g., the parameters of generators) of the two parties. However, they do not want to leak the full information of x and y to each other. Then, we intend to decompose the function f, namely to find functions g, h, s such that f(x,y)= g(h(x),s(y)). In this project, the PI has leveraged the framework of nomography for the function decomposition, such that only the necessary information for the computing is sent to the center, such that the privacy of each sub-system (e.g., different utility companies) is kept.

 


Last Modified: 12/26/2019
Modified by: Husheng Li

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page