An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Meter Using Fuzzing Testing

IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS IET Networks Pub Date : 2022-10-14 DOI:10.1109/IET-ICETA56553.2022.9971577
Chien-Lung Wang, Jou-An Shih, I. Liao, Chun-Tsai Chien
{"title":"An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Meter Using Fuzzing Testing","authors":"Chien-Lung Wang, Jou-An Shih, I. Liao, Chun-Tsai Chien","doi":"10.1109/IET-ICETA56553.2022.9971577","DOIUrl":null,"url":null,"abstract":"Since smart meters are IoT devices that can share energy usage information to users and third-party service providers, any vulnerability of smart meters that can be exploited by hackers is a threat to the reliability of smart grids. The purpose of this paper is to explore the possibilities of DoS attacks to smart meters. Our research focuses on the High-Level Data Link Control layer of DLMS/cosEM smart meters. The testing cases are generated by fuzzing testing methods according to the HDLC specifications. The CTT 3.1 is used as the client sending requests to the smart meter server. The responses of the server are then recorded and analyzed for potential vulnerabilities. The results show that the fuzzing test cases on the buffer overflow/underflow category generate most of the abnormal responses.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"38 1","pages":"1-2"},"PeriodicalIF":1.3000,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IET-ICETA56553.2022.9971577","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 2

Abstract

Since smart meters are IoT devices that can share energy usage information to users and third-party service providers, any vulnerability of smart meters that can be exploited by hackers is a threat to the reliability of smart grids. The purpose of this paper is to explore the possibilities of DoS attacks to smart meters. Our research focuses on the High-Level Data Link Control layer of DLMS/cosEM smart meters. The testing cases are generated by fuzzing testing methods according to the HDLC specifications. The CTT 3.1 is used as the client sending requests to the smart meter server. The responses of the server are then recorded and analyzed for potential vulnerabilities. The results show that the fuzzing test cases on the buffer overflow/underflow category generate most of the abnormal responses.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于模糊测试的DLMS/COSEM智能电表网络安全风险评估
由于智能电表是可以向用户和第三方服务提供商共享能源使用信息的物联网设备,因此智能电表的任何漏洞都可能被黑客利用,从而威胁到智能电网的可靠性。本文的目的是探讨DoS攻击智能电表的可能性。我们的研究重点是DLMS/cosEM智能电表的高级数据链路控制层。根据HDLC规范,采用模糊测试方法生成测试用例。使用CTT 3.1作为客户端向智能电表服务器发送请求。然后记录服务器的响应并分析潜在的漏洞。结果表明,缓冲区溢出/下流类别的模糊测试用例产生的异常响应最多。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IET Networks
IET Networks COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
5.00
自引率
0.00%
发文量
41
审稿时长
33 weeks
期刊介绍: IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks. IET Networks is particularly interested in new ideas and superior solutions to the known and arising technological development bottlenecks at all levels of networking such as topologies, protocols, routing, relaying and resource-allocation for more efficient and more reliable provision of network services. Topics include, but are not limited to: Network Architecture, Design and Planning, Network Protocol, Software, Analysis, Simulation and Experiment, Network Technologies, Applications and Services, Network Security, Operation and Management.
期刊最新文献
Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks An effective ensemble electricity theft detection algorithm for smart grid Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1