ANALYSIS OF COMMUNICATION PROTOCOLS FOR NEIGHBORHOOD AREA NETWORK FOR SMART GRID Adithya Shreyas B.S., The Oxford College of Engineering, Bangalore, India, 2006 PROJECT Submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in COMPUTER ENGINEERING at CALIFORNIA STATE UNIVERSITY, SACRAMENTO FALL 2010 ANALYSIS OF COMMUNICATION PROTOCOLS FOR NEIGHBORHOOD AREA NETWORK FOR SMART GRID A Project by Adithya Shreyas Approved by: __________________________________, Committee Chair Isaac Ghansah, Ph.D. __________________________________, Second Reader Chung-E Wang, Ph.D. ____________________________ Date ii Student: Adithya Shreyas I certify that this student has met the requirements for format contained in the University format manual, and that this project is suitable for shelving in the Library and credit is to be awarded for the Project. __________________________, Graduate Coordinator Suresh Vadhva, Ph.D. Department of Computer Engineering iii ________________ Date Abstract of ANALYSIS OF COMMUNICATION PROTOCOLS FOR NEIGHBORHOOD AREA NETWORK FOR SMART GRID by Adithya Shreyas Smart Grid’s success heavily lies in the communication infrastructure underneath it. In Smart Grid, Neighborhood Area Network has a role to play in the HOME-to-HOME or HOME-to-GRID communication. There are quite a few technologies in contention to be used to implement neighborhood area network. In this project the analysis for communication protocols for Neighborhood Area Network for Smart Grid is done by considering few wireless protocols or standards like IEEE 802.11, IEEE 802.16, IEEE 802.15.4, 3G and few wired standards like Power Line Communication and Optical Fiber Communication. The requirements of the protocols/standards considered for Neighborhood Area Network for Smart Grid are identified as reliable, secure, power efficient, low latency, low cost, diverse path, scalable technology, ability to support bursty, asynchronous upstream traffic. The research also includes analysis of few routing and transport protocols which are used in wired and wireless networks. In Transport Protocols, UDP is a well suited protocol over all kinds of media which enable time critical communication capabilities. For non time critical applications TCP or SCTP could be considered. For Neighborhood Area Networks, the protocols/standards iv that are recommended in this project are IEEE 802.11 [Wi-Fi] and Cellular technology [GSM]. _______________________, Committee Chair Isaac Ghansah, Ph.D. _______________________ Date v DEDICATION To my parents, teachers and friends vi ACKNOWLEDGEMENT I am thankful to all the people who have helped and guided me through this journey of completing my Masters Project. My sincere thanks to Dr. Isaac Ghansah, for giving me the opportunity to work on my masters project under him and for guiding me throughout the project. My heartfelt thanks to Dr.Chung-E Wang for agreeing to be my second reader and providing me with his invaluable inputs on revising my report. My sincere thanks to Dr. Suresh Vadhva for his invaluable support throughout my graduate program. My special thanks to my friends Deepak Gujjar, Pooja Ramesh and Abhijith for helping me with their ideas and by reviewing my project report. I would also like to thank my roommates and all my friends who have been there for me throughout this graduate program at California State University Sacramento. Last but not the least I would like to thank my parents Ramani M.S and Ramesh V, my sister Shruthi Ramesh, my uncles Shankar and Satish, my friends Vasuki, Subramani, Pradeep and Karthik for their unconditional love and moral support. They have always motivated me and are the sole reasons for me to have come this far in life. vii TABLE OF CONTENTS Acknowledgement ……………...……………………………………………………….vii List of Tables ……...…………...………………………………………………………...xi List of Figures …………………………………………………………………………...xii List of Abbreviations ………....……………………………………………….………..xiv Chapter 1. INTRODUCTION ………………………………………………...…………………...1 1.1. Traditional Grid ……………………………………...…………………...1 1.2. Need for Smart Grid …………………………………..………………….3 1.3. Smart Grid ……………………………………………..…………………5 1.4. Neighborhood Area Networks …………………………...……………….9 1.5. Related Work …………………………………………...……………….11 1.6. Scope of the Project ………………………………………...…………...13 2. REQUIREMENTS FOR NEIGHBORHOOD AREA NETWORK ……..…………..15 3. OVERVIEW OF CANDIDATE NETWORK PROTOCOLS AND STANDARDS ...21 3.1. IEEE 802.11 …………………………………………………………......22 3.2. IEEE 802.16 …………………………………………………………......34 3.3. IEEE 802.15.4 ………………………………………………………...…41 3.4. ANSI C12.22 ..…………………………………………………………..44 3.5. Cellular Communication …..…………………………………….............46 3.6. Powerline Communication ………………………………………...........51 3.7. Optical Fiber Communication …...………………………………...........53 3.8. Wireless Mesh Networks ……………………...…………………..…….54 4. ROUTING PROTOCOLS …………………………………...……………………….59 viii Table-Driven Routing Protocol ………………………………………….61 4.1. 4.1.1. Destination-Sequenced Distance-Vector Routing [DSDVR] ……….......62 4.1.2. Clusterhead Gateway Switch Routing [CGSR] ..………………………..63 4.1.3. Wireless Routing Protocol ...…………………………………………….64 4.2. Source Intitiated On-Demand …………………………...………………65 4.2.1. Ad HOC On-Demand Vector Routing [AODV] ………………………..66 4.2.2. Dynamic Source Routing [DSR] ………………………………………..68 4.2.3. Temporally Ordered Routing Algorithm [TORA] ………………………70 4.2.4. Associativity-Based Routing [ABR] …………………………………….73 TRANSPORT PROTOCOL …………………………………………………….75 5. 5.1. Transmission Control Protocol ………………………………………….76 5.2. User Datagram Protocol …………………………………………………78 5.3. Split TCP …………………………………………………………….......79 5.4. Stream Control Transmission Protocol ………………………………….79 5.5. Wireless Datagram Protocol …………………………………………….81 6. SECURITY ISSUES, VULNERABILITIES AND BEST PRACTICES ……………82 6.1. IEEE 802.11 ……………………………………………………………..82 6.1.1. Vulnerabilities and Security Issues ……………………………………...82 6.1.2. Best Practices for 802.11 ………………………………………………..85 6.2. IEEE 802.16 ……………………………………………………………..86 6.2.1. Vulnerabilities and Security Issues ……………………………………...86 6.2.2. Best Practices for 802.16 ………………………………………………..87 6.3. IEEE 802.15.4 …………………………………………………………....88 6.3.1. Vulnerabilities and Security Issues ……………………………………...88 ix 6.3.2. Best Practices for 802.15.4 ……………………………………………...91 6.4. GSM Security …………………………………………………………....92 7. POTENTIAL RESEARCH TOPICS ………………………………………………....93 7.1. Choosing a standard for implementing Neighborhood Area Network ….93 7.2. Unpredictable latencies in Wireless Mesh Network …………………….94 7.3. PLC for Home Automation ……………………………………………...95 7.4. IP based Networks ……………………………………………………....95 7.5. Security for Routing protocols in Wireless Mesh Networks ……………96 7.6. Limitation on Wireless Intrusion Detection ……………………………..97 7.7. 802.11 MAC Management Attacks ……………………………………..99 7.8. Physical Security ……………………………………………………......99 7.9. Denial of Service Attacks ……………………………………………….99 7.10. Key Management in IEEE 802.15.4 …………………………………...100 8. CONCLUSION ……………………………………………………………………..102 Bibliography ………………………………………….………………………………..104 x LIST OF TABLES Table 1: Network Types, Coverage and Bandwidth ......................................................... 19 Table 2: IEEE 802.11 Standards and its Variations .......................................................... 23 Table 3: Summary of GSM Specifications ....................................................................... 47 Table 4: Summary of Technologies for NAN (continued) ............................................... 57 Table 5: Summary of Technologies for NAN................................................................... 58 xi LIST OF FIGURES Figure 1: Traditional Grid ................................................................................................... 2 Figure 2: Smart Grid ........................................................................................................... 7 Figure 3: Evolution of Utility Communication Requirements ......................................... 15 Figure 4: Customer Domain: NAN, gateway and HAN ................................................... 16 Figure 5: Smart Grid Building Blocks .............................................................................. 17 Figure 6: Hierarchical Organization of Communication Networks .................................. 20 Figure 7: IEEE 802 family and its relation to the OSI model ........................................... 23 Figure 8: IEEE 802.11 Physical Layer Components ........................................................ 24 Figure 9: IEEE 802.11 Design Components ..................................................................... 25 Figure 10: Positive Acknowledgement ............................................................................. 26 Figure 11: RTS/CTS clearing ........................................................................................... 27 Figure 12: RTS/CTS clearing ........................................................................................... 27 Figure 13: Generic Data Frame......................................................................................... 29 Figure 14: Frame Control field ......................................................................................... 29 Figure 15: 802.11 Generic Wireless Cards ....................................................................... 32 Figure 16: IP based WiMAX Network Architecture ........................................................ 36 Figure 17: IEEE 802.16 Protocol Layer ........................................................................... 38 Figure 18: Generic MAC PDU Format ............................................................................. 39 Figure 19: GSM User Authentication Process .................................................................. 49 Figure 20: Signal and Data Confidentiality in GSM ........................................................ 50 xii Figure 21: Ciphering in GSM ........................................................................................... 50 Figure 22: Wireless Mesh Network .................................................................................. 55 Figure 23: Infra-Structured and Infra-Structuredless Networks ....................................... 60 Figure 24: Ad-Hoc Routing Protocols .............................................................................. 61 Figure 25: Cluster Head Gateway Switch Routing ........................................................... 64 Figure 26: Propogation or RREQ packet .......................................................................... 67 Figure 27: Dynamic Source Routing ................................................................................ 69 Figure 28: Temporally Ordered Routing Algorithm ......................................................... 72 xiii LIST OF ABBREVIATIONS AES Advanced Encryption Standard AMI Advanced Metering Infrastructure AMR Advanced Meter Reading ANSI American National Standards Institute AP Access Point ASN Access Service Network ATM Asynchronous Transfer Mode BPL Broadband over Power Line BPSK Binary Phase Shift Keying BS Base Station BWA Broadband Wireless Access CDMA Code Division Multiple Access CMAC Cipher based Medium Access Control CPE Customer Premises Equipment CRC Cyclic Redundancy Check CSN Connectivity Service Network CTS Clear-to-Send CUDP Cyclic User Datagram Protocol DC Direct Current DL Downlink xiv DoS Denial of Service DSSS Direct Sequence Spread Spectrum EAP Extensible Authentication Protocol ERP Extended Rate Physical layer FCS Frame Check Sequence FDD Frequency Division Duplexing FFD Full Function Device FHSS Frequency Hopping Spread Spectrum GSM Global Satellite for Mobile communication HAN Home Area Network HMAC Hashed Medium Access Control HSDPA High Speed Downlink Packet Access IEEE Institute of Electrical and Electronics Engineers IETF International Engineering Task Force IP Internet Protocol ITU International Telecommunication Union kWh kilo Watt hour LAN Local Area Network LLC Link Layer Control LoS Line of Sight MAC Medium Access Control MAN Metropolitan Area Network xv MIC Message Integrity Code MIMO Multiple-input Multiple-output MLME Media Access Sublayer Management Entity MPDU MAC Protocol Data Unit MS Mobile Station MSDU MAC Service Data Unit NAN Neighborhood Area Network NIST National Institute for Standards and Technology NLoS Non Line of Sight NWG Network Working Group OFC Optical Fiber Communication OFDM Orthogonal Frequency Division Multiplexing OFDMA Orthogonal Frequency Division Multiple Access PAN Personal Area Network PCLP Physical Layer Convergence Procedure PCMCIA Personal Computer Memory Card International Association PHY Physical Layer PKM Privacy and Key Management PLC Power Line Communication PMD Physical Medium Dependent QAM Quadrature Amplitude Modulation QoS Quality of Service xvi QPSK Quarternary Phase Shift Keying RAN Radio Access Network RFD Reduced Function Device RTS Request-to-Send SAP Service Access Point SCTP Stream Control Transmission Protocol SIM Subscriber Identity Module TCP Transmission Control Protocol TDD Time Division Duplexing TDM Time Division Multiplexing TKIP Temporal Key Integrity Protocol TMSI Temporary Mobile Subscriber Identity UDP User Datagram Protocol UL Uplink UMTS Universal Mobile Telecommunication Systems UWB Ultra Wide Band VLR Visitor Location Register WAN Wide Area Network WDP Wireless Datagram Protocol WEP Wired Equivalent Privacy Wi-Fi Wireless Fidelity WiMAX Wireless Interoperability for Microwave Access xvii WMN Wireless Mesh Network WNAN Wireless Neighborhood Area Network WPA Wi-Fi Protected Access xviii 1 Chapter 1 INTRODUCTION 1.1.TRADITIONAL GRID The traditional power grid designed in the 1950’s had a primary and only objective of providing electricity. The traditional grid could be divided into two subsystems namely, transmission system and distribution system. The Figure 1 [1] shows the traditional power grid with the transmission system that includes the power generation plants, step up transformers, high voltage power lines and substations. The distribution system consists of substations; step down transformers, pole-top transformers, and medium voltage power lines. The power plants generate electricity and step up the voltage for long distance transmissions using step-up transformers. Further, electricity is transmitted across the high power transmission lines over long distances to substations where the voltage is stepped down before transmitting over the medium voltage power lines to the customer premises. The pole-top transformers further step down the voltage to suit the residential and commercial specifications. 2 Figure 1: Traditional Grid The traditional power grid infrastructure is largely analog and electromechanical. It is built on a producer-controlled model where the power flows only in one direction that is from the grid to the consumers. Even with great advances in computer systems, technologies like internet, and electronic devices, there still remains a vast disconnect between the traditional grid’s infrastructure and these advances in technologies. Most of our day-to-day commodities directly rely on electricity whose infrastructure is aged out. Whether or not there is a need for the power supply to a particular region, a utility supplies a scheduled amount of power to the regions under its jurisdictions. This lack of communication informing the utilities, the demand for power and the utilities responding back to the consumer with an appropriate response is the missing component in our current grid. As the demand for power is increasing day-by-day, it becomes very 3 important that there be an effective communication from the consumer to the utilities demanding only the required amount of power and the utilities in turn responding back appropriately to the consumer based on the need. 1.2.NEED FOR SMART GRID [33] SUSTAINABILITY Since 1982, the demand for electricity has exceeded the transmission growth by 25% every year. Increase in demand, calls for increase in power generations which would directly affect the carbon dioxide emissions from the power generation plants. According to a study by U.S. Energy Information Administration [EIA] department [33], 40% of the carbon dioxide emissions are from electricity generation and 20% from transportation. A 5% improvement in electric efficiency is equivalent to carbon emissions from 53 million cars. Global warming of earth’s surface and lower atmosphere is a result of strengthening the greenhouse effect where the percentage contribution from carbon dioxide gas to greenhouse effect is anywhere from 9 – 26% [33]. The human-produced gasses as a result of electricity generation and transportation are the main cause for global warming. Hence, a smarter grid is needed, to support sustainability. RELIABILITY In the current electricity grid architecture, the utilities are informed of the blackouts or outages, if and only if, a customer rings them up notifying an outage. This aging infrastructure which lacks the outage management system is directly affecting the reliability of the grid. To explain the effects of these blackouts, consider the northeast 4 blackout of 2003 in the US, which resulted in a $6 billion economic loss. According to a study by U.S. Energy Information Administration [EIA] department [33], the US outages costs around $150 billion per year which is a $500 per person and these outages are getting worse. Also, from the first to the second half of the 1990’s, there were an added 41% of outages affecting more than 50,000 people and 15% increase in the average customers getting affected [33]. An intelligent grid with effective communications infrastructure detects an outage immediately and notifies a utility office about the outage; also they could be avoided when power is redirected to the place where the outage is predicted. To achieve an improved reliability, a smarter grid is the need of the hour. RENEWABLE ENERGY The main motivating factors for using renewable energy sources are to reduce the carbon emissions, reduce the dependency on oil and lower the cost of electricity over the longer run. Power from renewable energy sources like solar, wind, geothermal and tidal are low power and intermittent when compared to the one from traditional power generation. These intermittent sources need a distributed generation to harness the power and sell it to the utility offices close by. To handle both the distributed and intermittent power sources, we need a smarter grid. SECURITY The current centralized grid is vulnerable to terrorist attacks because in case of attacks there would be a complete outage and reconstruction of such huge centralized electricity 5 infrastructure in a short time would be impractical. In case of attacks, a significant area is affected with lack of power supply. Having the power generation distributed would help us reduce the devastating effect of terror attacks or any natural disasters. Lastly, the average age of a skilled professional at the utilities is around 48 years. This would result in a 20% retirement of skilled labors in a span of 7 years. One way we could recover the loss of these skilled labors in a significant way is by introducing a smarter grid which could handle their loss. Also, smart grid deployment would directly create about 280,000 jobs in the US [33]. 1.3.SMART GRID Smart Grid could be thought of as the Internet for energy. Smart Grid is an electricity infrastructure consisting of devices installed at homes and businesses throughout the electricity distribution grid for the purpose of energy monitoring which utilizes the computer, networking and communications technologies all the way from the generation, transmission and distribution of electricity to consumer appliances and equipments. This set up provides consumers the ability to monitor and control energy consumption comprehensively in real time across the smart communication network. The consumers that generate energy from sources such as: solar, wind or other systems, can also carry out business with the utilities by outsourcing the surplus energy that they generate. 6 The actors of a Power Grid can be categorized into three main entities. They are i. Power Generators: Consisting of the centralized power plants, the small generators and solar panels. ii. Power Distributors: These are the utilities who are responsible for deliviering power to the customers. iii. Power Consumers: The end customers who utilize the services provided but the distributors and consume energy. The components of Smart Grid include: a centralized power plant, generators of renewable energy, demand management systems, processors, sensors and smart appliances. An example of such a Smart Grid is shown in Figure 2[2]. 7 Figure 2: Smart Grid In the Figure 2[2], the sensors detect the variations and fluctuations in the electricity and send information signals to the demand management systems. At the demand management system, decision signals are generated, so as to increase or decrease the electricity generation and these signals are sent out to the processors. The processors, without any need for human intervention, would execute these instructions and take appropriate actions instantaneously. To understand this process better, let us consider an example of a peak time scenario, where in, at a certain time in a day, the demand for electricity would be at its peak and the utilities might have to fire up the peak generators to meet the peak time demand. The sensors would sense these variations in the demand and would send out signals to demand management systems. Also, demand management systems could be connected to 8 a database with all the data relating to the peak times and other information, which are collected over a period of time. Based on the signals sent over by the sensors, the demand management system would send appropriate control signals to the processors and the processors in-turn would take appropriate actions like increasing the power generation, triggering the system to send out the peak time prices to the consumers. Also, based on customized power profiles registered by the consumers with the utilities, these processors could initiate shutting down of appliances or manage the appliances according to the power profiles. An analogy to the customized power profiles could be the different profiles available on a mobile phone where it would have different ring tone, message alert, vibrate, backlight settings for each profile based on whether the user is at work, home, meeting, or driving. Similarly, the power profiles could be a preset recommended profile set by the utilities, or a customized profile from the consumer wherein, the consumer specifies his requirements based on his/her need and the price information from the utilities. For example, he would want to turn off the air-conditioner every fifteen minutes for a ten minutes interval during the peak times of the day, maintaining the temperature at 75 degree Fahrenheit. Another example could be of turning on the television at 8:30pm every weekday and turning off the lights if no person is present in the room for a duration more than 20 minutes. Smart grid is intelligent as it is capable of sensing the system overload and rerouting power to prevent outages and give resolution to conditions or situations faster than a user could respond. It is efficient as it meets the user’s increasing demand without adding infrastructure. It is accommodating as the user can do business with the utilities by 9 pumping energy back to the utilities with renewable sources like wind, solar and other sources. The consumer has the ease to choose the energy consumption profile and customize it according to his/her preferences. For this reason along with the real-time communication between the customer and the utilities makes it motivating. It is capable of delivering power, free of sags, spikes, disturbances and interrupts which is the main requirement for the data centers and this could be termed as quality-focused. Since, the Smart Grid’s deployment would be made distributed and not centralized; it becomes secure and provides resistance to natural and terror attacks. All these features make Smart Grid intelligent, efficient, accommodating, motivating, opportunistic, qualityfocused, and resilient and lastly “green” as the carbon emissions are lowered with increased efficiency. 1.4.NEIGHBORHOOD AREA NETWORKS The efficiency of Smart Grid greatly relies on communication. Communication can be broadly classified into two types: DATA COMMUNICATION The utility offices collect the electricity usage information from consumers on a timely basis to build a future demand statistics. Example for this would be a smart device which is part of an air conditioner sending the usage or power consumption information every minute to the smart meter in kilo watt hour [kWh] units and the smart meters in turn send the information back to the utility office. 10 CONTROL COMMUNICATION These are real time communication signals to control the devices at the consumer or business premises. Example for this could be turning off the air conditioners for a certain period of time, on request from the consumer during the peak hours when the price per unit usage is high. To explain this in a better way, consider an example of IEEE 802.15.4 standard where the communication could between three main entities, reduced functional devices, fully functional devices and the utility offices. Reduced functional devices are those devices that carriers limited functionality to lower cost and complexity. Fully functional devices support all IEEE 802.15.4 functions and features specified by the standard. Further, the data communication could be between the reduced functional devices [RFD] (smart devices installed in homes like heater, refrigerators, air conditioners etc.) and the fully functional devices [FFD] (say smart meters), and, between the FFD’s to the utility office. Similarly, the control communication would be from the utility office to the FFD’s and from FFD’s to the RFD’s. The communication between the RFD’s and the FFD’s installed at home and business premises is part of Home Area Network [HAN] and the communication between the FFD’s and the utility offices is part of Neighborhood Area Network. A set of FFD’s (say smart meters from a group of houses) would communicate with a device on a pole and this device would in turn communicate with the utility offices over the neighborhood area network. And each such device on the pole is interconnected thereby forming a mesh like network constituting a neighborhood area network. 11 Neighborhood Area Networks [NAN] are a type of packet switched mobile data networks. NANs are flexible packet switched networks whose geographical coverage area could be anywhere from the coverage of a LAN, to MAN, to WAN. In Smart Grid, NAN has a role to play in the HOME-to-HOME or HOME-to-GRID communication. The order of the day in networking is to provide complete ubiquity, i.e., every device location is connected to millions of locations and across ten thousands of square miles. The solution for complete ubiquity is wireless neighborhood area network [WNAN]. The ubiquitous network requirements for Smart Grid are identified as follows: reliable, secure, power efficient, low latency, low cost, diverse path, scalable technology, ability to support bursty, asynchronous upstream traffic to name a few. In this report, we would mainly focus on the communication sector of Smart Grid, where analysis of communication, routing and transport protocols for neighborhood area network for Smart Grid in particular are carried out. 1.5. RELATED WORK In this section we will discuss the work done on communication infrastructure by other organizations. Electric Power Research Institute [EPRI] submitted a report on Smart Grid Interoperability Standards Roadmap to National Institutes of Standards and Technology [NIST], which lists the near-term actions that NIST proposes to take with regards to the Interoperability framework. Few of the highest priority tasks related to communication and cyber security are listed below [5]: 12 Conducting an analysis to select Internet Protocol Suite profiles for smart grid applications - NIST should commission a group to perform a comprehensive mapping of smart grid application requirements to the capabilities of protocols and technologies in the Internet Protocol Suite to identify Internet protocol Suite subsets as important for various applications in the various smart grid domains. Investigating Communications Interference in Unlicensed Radio Spectrums - NIST should commission a group of experts to study the issue of communications interference in unlicensed radio spectrums for smart grid applications. In the interim report, NIST suggests few standards/protocols to use in communication infrastructure to exchange meter data and control signals. Few protocols that are identified by NIST for network interoperability are TCP/IP, UDP, ANSI C12.22, IEC61850, Ethernet, ZigBee, LAN, WAN, WLAN, Metropolitan Area Network (MAN), IEEE 802.11x MAC, & IPv4, IPv6 Addressing, Distributed Network Protocol (DNP3) [5]. Number organizations such as Trilliant Inc. have come up with complete Smart Grid communication solutions coupled with head-end software to provide utilities with a solution to meet their Smart Grid networking demands. Few of the solutions that Trilliant 13 Inc. has implemented to the meet the demand-side management and smart metering solutions are SecureMesh WAN, SecureMesh NAN, SecureMesh HAN and UnitySuite HES [Head-End Software]. The SecureMesh solutions enable smart grid distribution, metering and home automation solutions and UnitySuite HES provides the scalable network operations and management packages [4]. As of today, there is no widely deployed technology in North America to be used for the implementation of neighborhood area network. The aim of this project is to find suitable standards/protocols that could be used for Neighborhood Area Network [NAN] for Smart Grid. Following chapters discuss the requirements for NAN and analyzes standards/protocols for NAN in Smart Grid. 1.6. SCOPE OF THE PROJECT The aim of this project is to provide a deep insight on the communication protocols used by the neighborhood area network for Smart Grid. Also, to analyze the protocols, compare and recommend the best suitable protocol that could be implemented in neighborhood area networks. And to study the security issues with the identified protocols, and make few recommendations to solve any open issues and identify the research areas based on this study. Chapter 1 introduces us to the traditional grid, need for Smart Grid, structure of Smart Grid and lays the foundation for neighborhood area network. Chapter 2 emphasizes on neighborhood area network, its requirements for Smart Grid and its significance in Smart Grid. Chapter 3 acquaints us with the protocols and standards that are in contention for the implementation in neighborhood area 14 networks. Chapter 4 discusses the different kinds of routing protocols that find their way into neighborhood area network. Following this would be the discussion on transport protocols used in neighborhood area network as part of Chapter 5. The next chapter will discuss the security issues and vulnerabilities associated with the protocols and standards discussed in Chapter 3. Also Chapter 6 lists the best practices and recommendations for the protocols or standards discussed in Chapter 3. Even with all the best practices and recommendations listed in Chapter 6, there would still be few open issues that need to be addressed; Chapter 7 would identify such research areas in neighborhood area network as part of the customer domain for Smart Grid. 15 Chapter 2 REQUIREMENTS FOR NEIGHBORHOOD AREA NETWORK There has been a steady progress in the communication requirements for utility applications, starting from the one-way communication for reading meter data or Automated Meter Reading [AMR] to advanced two-way communication of Advanced Metering Infrastructure [AMI], supporting the outage notification, demand response and other applications [See Figure 3] [3]. Figure 3: Evolution of Utility Communication Requirements 16 Smart Grid requirements that have extensions to these capabilities including distribution automation and control, power quality monitoring and substation automation, need a communication infrastructure that allows utilities to interact with devices on the electric grid as well as with the customers and distributed power generation and storage facilities [3]. The customer domain consists of a Neighborhood Area network connecting the utility to the smart meter installed in the homes of the consumer, the gateway and finally then home area network which connects all the appliances at home [See Figure 4 [34]]. Figure 4: Customer Domain: NAN, gateway and HAN The utilities should have the ability to support multiple communication networks like Home Area Network [HAN], Neighborhood Area Network [NAN] and Wide Area 17 Network [WAN] for various applications like consumer energy efficiency, advanced metering and distribution automation [See Figure 5] [4]. Figure 5: Smart Grid Building Blocks Figure 5[4] shows the building blocks of Smart Grid, which consists of Power System Layer, Control Layer, Communications Layer, Security Layer, IT Infrastructure Layer and the Application Layer. The Communications Layer is further divided into three sub divisions. They are: Home Area Network [HAN], which as the name indicates is part of the customer premises and involves the communication between the devices installed at the residential or commercial premises to their respective Smart Meters. 18 Neighborhood Area Network [NAN] is the communication network that aids the communications between the utilities and the Smart Meters installed at the customer premises. Wide Area Network [WAN] is the communication network responsible for the backhaul communications. The Smart Grid communication requirements at high level, is described below [2]: SECURE Privacy, Integrity and Confidentiality are the three main focus areas in communication across the network. Hence, an end-to-end security must be employed to protect user information and protect the network from unauthorized access. RELIABLE The network has to provide maximum availability by incorporating fault tolerance mechanisms and self-healing failover at each tier of the network. It must provide an “always-on” communication as part of the electric grid. FLEXIBLE The coverage has to be consistent over smaller rural regions to larger urban areas. The communication network has to have the flexibility to cover the same disparate territories as the grid itself. 19 SCALABLE The network needs to be scalable to meet the current and future requirements. It should be capable of supporting the changing requirements over time to accommodate the current simple meter reading to the future multi-application that span from demand-side management to distribution automation. Also, it should be upgradeable and interoperable to ensure future-proof solution. COST-EFFECTIVE The capital and operational expenses of a communication network needs to be within the potential savings. The typical characteristics of different communication network layers could be summarized as shown below in Table 1. Home Area Network Neighborhoo d Area Network Distribution/ Wide Area Network Core Scale of Coverage Bandwidth Required 1000 of Sq. Feet 1-10 Kbps Example for Communication Technologies ZigBee 1 – 10 Sq. Miles 10-100 Kbps 900 MHz 1000s Sq. Miles 500 Kbps – 10 Mbps 3G/802.11/WiMAX 10 – 100 Mbps Fiber Table 1: Network Types, Coverage and Bandwidth 20 A representation of the above table of information is shown in the Figure 6[2]. Figure 6: Hierarchical Organization of Communication Networks Limiting our scope of discussion to the requirements of Neighborhood Area Network, the Neighborhood Area Network [NAN] requires higher bandwidths ranging anywhere from 10 Kbps to 100Kbps to suffice the meter reading, demand response, remote disconnect and other capabilities. One of the main requirements is to support mesh networking, as the network needs to cover thousands of homes, essentially covering over a few square miles. These networks also have to provide low latencies, typically less than 10 seconds as control signals are part of the two way communication. They also have to support excellent signal propagation in the challenging RF environment. 21 Chapter 3 OVERVIEW OF CANDIDATE NETWORK PROTOCOLS AND STANDARDS Protocols can be categorized based on the type of connectivity namely wired and wireless. Each has its own advantages and disadvantages. Reliability, quality of service, security, cost effectiveness and speed are the advantages to wired networks. While the disadvantages are difficulty in installation, addition of computers or systems may slow down the network, looks disorganized and maintenance of cable are difficult. Wireless networks are neat and clean with no untidy cables hanging around, also the set up is very easy and does not need a great deal of networking experience. But the downside to wireless networks is that they are not as reliable and secure as wired networks. They also have potential radio interference due to obstacles, weather and other wireless devices. Wireless networks have many other advantages over wired networks which are mainly mobility, more flexible, easier to use and affordable to deploy and maintain. Every network transmits data over a medium and for wireless networks the medium is the electromagnetic radiation. Wireless devices are constrained to operate in a certain frequency band. Each band has an associated bandwidth, which is simply the amount of frequency space in the band. So, let us first consider the players in the wireless category for communication protocols for Smart Grid. For Smart Grid, a careful choice has to be made in selecting a protocol or a standard for the data and control information exchanges. This information exchange involves highly confidential consumer information so customer privacy has to be protected. As far as the 22 control information is concerned, security is at the highest priority, if misused, would lead to financial loss and sometimes could prove to be fatal. Keeping the above discussed points in mind, we could consider the following protocols that could find a place in the communication arena of Smart Grid. They are IEEE 802.11, 802.15.4 and 802.16, ANSI C12.22, 3G, Mesh Networks, optical fiber communication, and power line communication. 3.1. IEEE 802.11 IEEE 802.11 is the set of standards defining the wireless local area network communications operating in the 2.4GHz, 3.6GHz or 5GHz frequency bands. These are defined and amended by the IEEE LAN/MAN standards committee. IEEE 802.11 includes the Wi-Fi [Wireless Fidelity] and its faster cousin IEEE 802.11g. The current version is IEEE 802.11-2007 and other common and most implemented versions are IEEE 802.11a, b, g and n. IEEE 802.11 uses the radio wave physical layer. The bands of operation of these protocols are set by ITU [International Telecommunication Union] for radio communication. The ISM [Industry, Scientific and Medical] bands are usually license-free provided that the devices are low-power. IEEE 802.11b/g operates at 2.4GHz, while IEEE 802.11a operates at 5GHz. A short summary of the standard, speed associated and the frequency band is reported in Table 2 23 IEEE Standard 802.11 Speed 1Mbps , 2Mbps Frequency Band 2.4 GHz 802.11a Up to 54Mbps 5 GHz 802.11b 5.5 Mbps, 11 Mbps 2.4 GHz 802.11g Up to 54 Mbps 2.4GHz 802.11n Up to 300 Mbps 2.4/5 GHz Table 2: IEEE 802.11 Standards and its Variations IEEE 802.11 adds a number of management features to differentiate it from the wired networks. They have a 48 bit MAC [Media Access Control] address and they look like the Ethernet network interface cards. These addresses are from the same address pool as of the Ethernet, to maintain the uniqueness and compatibility when wireless networks are deployed in networks which contain the wired network too. Figure 7 [7] describes the IEEE 802 family and its relation to the OSI model. Figure 7: IEEE 802 family and its relation to the OSI model 24 IEEE 802 focuses mainly on the lowest two layers of the OSI model because it involves the physical and data link components. The MAC layer is responsible for setting the rules for sending data and specify how to access the, whereas, the physical layer is responsible for the transmission and reception of the data. 802.2 specify the link layer and logic link control [LLC] which could be used by any LAN technology. IEEE 802.11 is just another link layer that uses the 802.2/LLC encapsulation. IEEE 802.11 has MAC layer and two physical layer a FHSS [frequency hopping spread spectrum] and DHSS [direct hopping spread-spectrum]. Later revisions of the 802.11 standards also include OFDM [orthogonal frequency division multiplexing] for higher speed which is also backward compatible with IEEE 802.11b. IEEE 802.11 physical layer has two physical medium components [See Figure 8] [7]. They are i) Physical Layer Convergence Procedure [PCLP]: which maps the MAC frames ii) Physical Medium Dependent [PMD]: which transmits the MAC frames Figure 8: IEEE 802.11 Physical Layer Components IEEE 802.11 Design consists of four major components [See Figure 9] [7]. They are Station, Access Point, Wireless Medium and Distribution system. 25 Figure 9: IEEE 802.11 Design Components i) STATION: is a computing device with wireless network interface cards. Networks are built to transfer data between stations. ii) ACCESS POINT [AP]: Performs the bridging function, which converts the frames of 802.11 into another type (wireless-to-wired) of frame for delivery. iii) WIRELESS MEDIUM: is used to transfer the frames between stations. The architecture supports different physical layers to be developed to support 802.11 MAC. iv) DISTRIBUTION SYSTEM: Number of access points together form a larger network. The distribution system is a logical component which is responsible for forwarding the frames to the destination. CHALLENGES FOR THE MAC There is higher confidence of message reception at the destination with wired network when compared to wireless network, because wireless medium is susceptible to interception of radiations from other devices like microwave ovens, cordless phones etc. 26 IEEE 802.11 incorporates positive acknowledgement [See Figure 2Figure 10] [7]. Here all frames must be acknowledged else the transaction is flagged as failure and the frames are considered lost. Figure 10: Positive Acknowledgement Hidden node is another problem with wireless networks. The wireless medium spreads across indefinite boundaries. In Figure 11 [7], Node 1 is unreachable to Node 3, but Node 2 is reachable to both Node 1 and 3. If Node 1 and Node 3 simultaneously transmit to Node 2, it would not be able to make out any sense out of the transmission. 27 Figure 11: RTS/CTS clearing This results in collision. Because wireless communication is half-duplex, which is transmitting and receiving does not take place simultaneously, it is difficult to detect a collision. To prevent collision, 802.11 implements RTS [Request-to-Send] and CTS [Clear-to-Send] signals to clear the area [See Figure 12] [7]. Figure 12: RTS/CTS clearing 28 Node 1 initially sends a RTS frame. Upon reception of the RTS frame by Node 2, it then sends the CTS frame indicating that it is clear to send data. Node 1 sends the data frame to Node 2 and in turn Node 2 returns a positive acknowledgement. The RTS frames serve two purposes, firstly reserves the radio link and secondly notifies other stations that it is in information exchange with other stations. RTS and CTS frames could be an overhead, but the overhead could be reduced by setting a threshold for RTS/CTS. Any frames that are shorter than the threshold are simply sent and RTS/CTS exchanges are performed if a frame is larger than threshold. Thus it prevents collision with reduced overhead. 802.11 FRAMING Framing in wireless cannot be as simple as in case of wired as it involves several management features. There are three types of frames namely: DATA FRAMES Data frames could be of different type depending on the network and function, which carries data from station to station. One of the types could be data used for contentionbased service or contention-free service. The other type could be one which carries frames that performs management functions. A generic data frame format is shown in Figure 13 [7]. 29 Figure 13: Generic Data Frame As shown in Figure 13 [7], the data frame contains frame control, sequence control and FCS [Frame Check Sequence] fields. The FCS field is referred to as the cyclic redundancy check because of the underlying mathematical operations. The Sequence Control field is a 16 bit field which is used for defragmentation and disregarding duplicate frames. The Sequence Control field has two parts, A four bit field is the Fragment number and the rest 12 bits is the sequence number [See Figure 13] [7]. The Frame control field has many other components as show in Figure 14. Figure 14: Frame Control field Protocol Version field indicates the version of 802.11 MAC contained in the frame. The Type and Sub Type fields indicate the type and subtype of the frames. ToDS and FromDS indicate whether the frame is destined for a distribution system. Power Management field indicates whether the sender will be in a power saving mode or 30 not after the exchange of the current frame. The protected frame field indicates whether protection is enabled by the link layer or not. Order bit indicates whether strict ordering delivery is implemented or not. CONTROL FRAMES: This performs area-clearing operations, channel acquisition, positive acknowledgement and carrier sensing maintenance functions. These use the same fields as the frame control field [See Figure 14] [7]. MANAGEMENT FRAMES: These perform functions which take care of joining and leaving the networks and to move association from access points to access points. This is done by splitting the procedure into three parts. First, the mobile stations must locate a compatible wireless network to use for access. Next, it must be authenticated with the network to get itself identified and connect to the network. Finally a mobile station will be associated with a network to gain access. 802.11 PHYSICAL LAYER The physical layers are based on the radio technology and different spread spectrum techniques used. 802.11a uses orthogonal frequency division multiplexing [OFDM] PHY 802.11b uses direct sequence spread spectrum [DSSS] PHY 802.11g uses extended rate PHY[ERP] 31 Spread spectrum is a technique in which a signal in a particular bandwidth is spread in the frequency domain [8]. This result in a much greater bandwidth than the signal would have if its frequency were not varied. FREQUENCY HOPPING SPREAD SPECTRUM is a technique where signals are transmitted by switching the carrier among many frequency channels in a pseudo-random sequence which is known both to receiver and transmitter [9]. DIRECT SEQUENCE SPREAD SPECTRUM technique does not hop from one frequency to another, instead it is passed through a spread function and it is distributed over the entire band at once [10]. ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING is a technique where large numbers of closely spaced orthogonal sub-carriers are used to carry data. The data is divided into number of parallel data streams for each such sub-carrier. Then, conventional modulation techniques are used to modulate the sub-carriers [11]. 32 802.11 HARDWARE Figure 15: 802.11 Generic Wireless Cards Usually the wireless LAN cards [See Figure 15][7] have two antennas to improve the reception and provide antenna diversity. Transceivers are used to boost the outgoing signal and process the incoming signal. It also down-converts the high frequency to a more manageable frequency by extracting the data bits from the high frequency carrier. Next comes the baseband processor which converts bits from the computer to radio waves which is called modulation and the opposite process which is converting radio waves to bits is called demodulation. Heart of the device is the MAC controller which is responsible for taking the incoming frames from the host computer operating system’s networking stack and decides when to send the data out the antenna into the air. 33 802.11 SECURITY ARCHITECTURE One of the major features of wireless networks is the ease of connection. This is because 802.11 networks announce their existence with the aid of beacon frames. To protect against unauthorized access to the network we have to apply access control. It could be done at various steps as follows: STATION AUTHENTICATION: Before joining a 802.11 network station authentication is performed using shared key authentication or sometimes using MAC address filtering to filter out unauthorized client by MAC address. LINK LAYER SECURITY: Link-layer authentication is transparent to network protocols, and will work for any network protocol chosen. Networks are increasingly homogenous and are based on IP. Link-layer authentication can be used to secure both IP and IPX. Link Layer Security has a very small foot print and can be easily integrated with the network interface cards, access point devices and mobile devices. WPA is an industry standard for providing strong link layer security to WLANs, and supports two authenticated key management protocols using the Extensible Authentication Protocol [EAP]. WPA also requires data frame encryption using TKIP [Temporal Key Integrity Protocol] and message integrity using a Message Integrity Check [MIC]. NETWORK OR TRANSPORT LAYER SECURITY: Network layer security provides end-to-end security across a routed network and can provide authentication, data integrity, and encryption services. These services are provided for IP traffic only. IPSec is a standard network layer security protocol which provides a standard and extensible method to provide security to network layer (IP) and upper layer protocols such as TCP 34 and UDP. It can also be used between routers or IPSec gateways. Firewalls can be used to isolate untrusted networks and authenticate users. Also VPN termination devices can supply encryption over untrusted networks. 3.2. IEEE 802.16 [12][13] WiMAX [Worldwide Interoperability for Microwave Access] is a trade name for IEEE 802.16 standard. WiMAX provides wireless transmission of data in variety of modes from a point to multi-point links. It is also called as the Last Mile Connectivity of Broadband Wireless Access [BWA] with a range of around 30 miles and a data transfer rate of up to 280Mbps with the ability to support data, voice and video. Its operating range is anywhere from 2GHz to 66GHz. It does not require LOS [Line Of Sight]. A version of IEEE 802.16 which is IEEE 802.16e adds mobility features operating in the range of 2-11 GHz license bands. Hence it allows fixed and mobile non Line of Sight [NLOS] applications primarily to enhance OFDMA [Orthogonal Frequency Division Multiple Access]. To summarize the salient feature of WiMAX are: It enhances orthogonal Frequency Division Multiple Access [OFDMA] by allowing fixed and mobile Non Line of Sight [NLOS] applications. QUALITY OF SERVICE [QoS] HIGH DATA RATES: Multiple Input and Multiple Output [MIMO] along with flexible sub-channelization schemes, coding and adaptive modulation helps mobile WiMAX technology to support downlink [DL] data rates up to 128 Mbps per sector and peak uplink [UL] data rates up to 56Mbps per sector in 20MHz bandwidth. 35 SCALABILITY: The mobile WiMAX has the capability of operating in scalable bandwidths from 1.25 to 20MHz by utilizing Scalable [SOFDMA]. SECURITY: The most advanced security features includes Extensible Authentication Protocol [EAP], advanced Encryption Standard [AES], Cipher Based Message Authentication Code [CMAC] and Hashed Message Authentication Code [HMAC]. WiMAX system has two major components: They are: BASE STATION: consists of high speed electronics and tower like a cell-phone tower. Base station provides coverage over an area called cell, which has a maximum radius of upto 30 miles. RECEIVER: could be an antenna, stand-alone box or a PCMCIA [Personal Computer Memory Card International Association] card in a computer. This is also referred to as Customer Premise Equipment [CPE]. IEEE 802.16e just provides an air interface, but the end-to-end WiMAX network is defined by WiMAX forums Network Working Group [NWG], which is responsible for developing requirements, architecture and protocols for WiMAX using IEEE 802.16e2005 as the air interface. IP BASED WIMAX NETWORK ARCHITECTURE The overall network [See Figure 16] [13] could be divided into the following logical parts for an IP based WiMAX Network Architecture: 36 MOBILE STATIONS [MS]: used by end users to access the network. BASE STATIONS [BS]: is responsible for providing air interface to the mobile stations. Also responsible for features like key management, session management and dynamic host configuration protocol [DHCP] proxy. Figure 16: IP based WiMAX Network Architecture ACCESS SERVICE NETWORK [ASN]: comprises more than one base stations and more than one access service network gateway to form the radio access network [RAN]. Functions of Access Service Network gateway includes intra-ASN location management and paging, radio resource management and admission control, caching of subscriber profiles and encryption keys, establishment and management of mobility tunnel with base stations, Quality of Service [QoS] and policy enforcement, and routing to the selected connectivity service network [CSN]. CONNECTIVITY SERVICE NETWORK [CSN]: provides connectivity to internet, public networks and corporate networks. Also, manages per user policy management and security and IP address management. 37 WiMAX network is based on the following principles [10]: SPECTRUM: which allows WiMAX network to be deployed in both licensed and unlicensed spectra TOPOLOGY: Supports Radio Access Network [RAN] topologies INTERNETWORKING: Enables internetworking with WiFi, 3GPP [3rd Generation Partnership Project which is responsible for the specification, maintenance and development of global system for mobile communication [GSM]]. IP CONNECTIVITY: Supports IPv4 and IPv6 network interconnects in clients and application servers. MOBILITY MANAGEMENT: Supports both fixed and mobile access and broadband multimedia services delivery. Figure 17 [12] below shows the IEEE 802.16 Protocol Architecture that has 4 layers: Convergence, MAC, Transmission and physical, which can be mapped to two OSI lowest layers: physical and data link. WiMAX PHYSICAL LAYER WiMAX uses Orthogonal Frequency Division Multiplexing [OFDM] which uses number of sub-carriers to carry data to overcome multiple signals hitting the receiver. There are several standards associated to IEEE 802.16, one of them is IEEE 802.16-2004 which uses 256 carriers and IEEE 802.16e uses scalable OFDMA. 802.16 uses many modulation techniques like Binary Phase Shift Keying [BPSK], Quaternary Phase Shift Keying [QPSK] and Quadrature Amplitude Modulation [QAM]. It also supports two 38 types of duplexing. They are Time Division Duplexing [TDD] and Frequency Division Duplexing [FDD]. Figure 17: IEEE 802.16 Protocol Layer IEEE 802.16 MAC LAYER The primary task of the MAC layer is to provide interface between the higher transport layer and the physical layer. The MAC layer takes packets from the upper layer called MAC service data units (MSDUs) and organizes them into MAC protocol data units (MPDUs) for transmission over the air and does the reverse for the received transmission. The convergence service sublayer can interface with a variety of higher protocols such as ATM TDM Voice, Ethernet, IP and any other future protocols. Figure 18 [12] shows the generic form of the MAC PDU. The MAC PDU is the data unit exchanged between the MAC layers of the BS and its SSs. A MAC PDU consists of a fixed-length MAC header, a variable-length payload, and an optional cyclic redundancy 39 check (CRC). Two header formats, distinguished by the HT field, are defined: the generic header and the bandwidth request header. Except for bandwidth request MAC PDUs, which contain no payload, MAC PDUs contain either MAC management messages or convergence sublayer data. The encryption Control field indicates whether the data payload in the header is encrypted or not. The Type field indicates the subheaders and special payload types present in the message payload. Cyclic Redundancy Check [CRC] Indicator [CI] field indicates if and how the CRC error check is used for the data. Encryption Key Sequence [EKS] is an index value that is used to identify the location of a data packet within a sequence of packets to enable the decryption of the packet. A connection identifier [CID] is a unique number that is used to identify the logical path of a communication system. Header Check Sequence [HCS] is a calculated code that is used to check whether the header is received correctly or not. Figure 18: Generic MAC PDU Format 40 The MAC incorporates several features such as the following: Privacy key management (PKM) for MAC layer security. PKM version 2 incorporates support for extensible authentication protocol (EAP). Broadcast and multicast support. High-speed handover and mobility management primitives. Three power management levels, normal operation, sleep and idle. Header suppression, packing and fragmentation for efficient use of spectrum. WiMAX SECURITY Security is handled by the Privacy Sublayer of the WiMAX MAC. The primary features of WiMAX security are as follows: PRIVACY: Most advanced encryption standards like Advanced Encryption Standard [AES] and 3DES [Triple Data Encryption Standard] are supported. In addition to the above, 128 bit and 256 bit keys are used for deriving the cipher during the authentication phase and also these are periodically refreshed. AUTHENTICATION: To prevent unauthorized access, a flexible means for authenticating the subscriber stations and users is provided. This authentication is based on the Internet Engineering Task Force [IETF] Extensible Authentication Protocol [EAP] 41 which provides different types of credentials such as username and password, digital certificates like X.509 (which has the username and MAC address) and smart cards. KEY MANAGEMENT: The keys are transferred securely from the base stations to the mobile stations using the Privacy and Key Management Protocol version 2 [PKMv2] which involves periodical reauthorizing and refreshing of the keys. INTEGRITY: The integrity of the control messages is protected using different message digest schemes like AES-based CMAC [Cipher Based Message Authentication Code] or MD5-based HMAC [Hashed Message Authentication Code]. 3.3. IEEE 802.15.4 IEEE 802.15.4 based wireless networking standard has emerged as a key to robust, reliable and secure Home Area Network [HAN] deployments. One of the major players in HAN for Smart Grid is ZigBee which is based on IEEE 802.15.4 standard. IEEE 802.15.4 defines the physical and medium access control layers for low data rate, short range wireless communication. The operation is defined in both sub 1GHz and 2.4 GHz frequency bands, supporting Direct Sequence Spread Spectrum [DSSS] signaling with a raw data throughput of 250Kbps and can transmit point to point, ranging anywhere from tens to hundred of meters depending on the output power and receive sensitivity of the transceiver. Applications of IEEE 802.15.4 include light control systems, environmental and agricultural monitoring, consumer electronics, energy management and comfort 42 functions, automatic meter reading systems, industrial applications, and alarm and security systems. IEEE 802.15.4 DEVICES An IEEE 802.15.4 network has only one personal area network [PAN] coordinator. There are two types of devices described in the specification that communicate together to form different network topologies: full function device [FFD] and reduced function device [RFD]. An FFD is a device capable of operating as a coordinator and implementing the complete protocol set. An RFD is a device operating with a minimal implementation of the IEEE 802.15.4 protocol. An RFD can connect to only an FFD whereas an FFD can connect to both FFDs and RFDs. A PAN coordinator is the main controller of the network which can initiate or terminate a connection. IEEE 802.15.4 PHYSICAL LAYER The IEEE 802.15.4 has two PHY options based on direct sequence spread spectrum [DSSS]. The PHY adopts the same basic frame structure for low-duty-cycle low-power operation at both sub 1GHz bands (868/915 MHz) and at high band (2.4 GHz). The low band implements binary phase shift key [BPSK] modulation and operates in the 868MHz band with a raw data rate of 20 kbps and in the 915MHz ISM band with a raw data rate of 40 kbps. The high band adopts offset quadrature phase shift key [O-QPSK] modulation, operates in 2.4GHz with a raw data rate of 250 kbps. 43 IEEE 802.15.4 MAC LAYER The MAC sublayer provides two services namely MAC data service and the MAC management service interfacing to the MAC sublayer management entity [MLME] service access point [SAP] [MLMESAP]. The MAC data service is responsible for the transmission and reception of MAC protocol data units [MPDU] across the PHY data service. The features of MAC sublayer are beacon management, channel access, GTS management, frame validation, acknowledged frame delivery, association and disassociation. IEEE 802.15.4 SECURITY [19] IEEE 802.15.4 supports both secure and non secure mode. Secure mode devices use AES to implement the following services: ACCESS CONTROL: This enables the device to accept frames from authentic sources only. DATA INTEGRITY: The beacon, data, and command frames are encrypted using AES encryption algorithm. The AES algorithm is not only used to for encryption but also to validate data sent. This is achieved using Message Integrity Code [MIC] also called as Message Authentication Code [MAC]. The MAC can be of different sizes: 32, 64 and 128 bits. This MAC is created encrypting parts of the MAC frame using the Key of the network, so if we receive a message from a non trusted node, the MAC generated for the sent message does not correspond to the one what would be generated using the message with the current secret Key, so the message is discarded. 44 FRAME INTEGRITY: Ensures that the frames are received from the device that has the key and the data is protected from modification without the key. Frame integrity is provided to the beacon, data and command payload using a message integrity code [MIC]. SEQUENTIAL FRESHNESS: This is to prevent the replay attacks using a replay counter which will reject a frame which has a value equal or less than the previous obtained counter value. 3.4. ANSI C12.22 [23] Earlier the data from the memory of electronic devices would be transported using a proprietary protocol which was unique to a manufacturer. With the introduction of ANSI C12.22, an effort to standardize the data formats and transport protocols and desire for interoperability and support for multiple manufacturers are provided. ANSI C12.22 defines the message services of Advanced Metering Infrastructure [AMI] for Smart Grid. The concept of ANSI C12.18, ANSI C12.19 and C12.21 are extended to come up with ANSI C12.22. ANSI C12.18 standard is a point-to-point protocol developed to transport the meter data over an optical connection. ANSI C12.19 defines the table data format and ANSI C12.21 standard is developed to transfer the data over telephone modems. An example for ANSI C12.22 could be described as follows, a C12.22-compliant message could be sent on a RF mesh network to reach an access point, and then use 45 GSM/CDMA 3G or WiMAX network backhaul and metro fiber networks WAN to move data from end devices to utility control center/head ends. The main advantage of the ANSI C12.22 open standards is that it enables interoperability among smart meters, intelligent field devices and others devices so that smart meter data can be collected, analyzed and C12.22 devices are controlled over any NAN/AMI/Backhaul/WAN communication networks as long as the message conforms to the ANSI protocol. ANSI C12.22 can be transported over IP for Smart Grid Last Mile and other network segments. If IP and ANSI C12.22 are combined, C12.22-compliant system avoids utilities from the risk of single AMI/NAN network and smart meter technologies lock-in. It provides adaptation to the rapid changes in communications technologies that the utilities choose to communicate with their end devices. If the meter or the network changes, the overall end-to-end communication system is not affected, as long as the new solution provides interoperability at the C12.22/IP layer. The reason ANSI C12.22 is discussed is for the flexibility that it provides for the interoperability to the Last Mile network for Smart Grid. ANSI C12.22 defines the communication between IP nodes and its communication devices and it’s interface that connects the ANSI C12.22 Network (TCP or UDP). In Smart Grid, ANSI C12. 22 find its application more appropriately in Smart Grid gateway devices which defines the interface to communicate the meter data to the utility over the Smart Grid Last Mile network. 46 3.5. CELLULAR COMMUNICATION One way to meet the requirements for neighborhood area network is through cellular communication. Cellular communication is ubiquitous, easy to install and incurs low maintenance cost. The coverage is excellent because it corresponds to the population concentration and hence ubiquitous. Cellular communication is already established and has 95% coverage extended to consumers and hence no additional efforts for installations are required. Cellular technology is also price-competitive solution because it leverages the existing carriers and quantity of devices. Advances in IP cellular technology and competitive pricing among carriers create an ideal environment for the smart grid. Cellular communication could broadly be categorized into two types namely GSM [Global System for Mobile Communication] and CDMA [Code Division Multiple Access]. Each of these platforms has several technology implementations based on their increasing throughput. The variants of GSM [22] are i. GPRS [General Packet Radio Service] ii. EDGE [Enhanced Data Rates for GSM Evolution] iii. HSDPA/UMTS [High Speed Downlink Packet Access / Universal Mobile Telecommunication System] The variants of CDMA are i. cdmaOne ii. CDMA2000/1xRTT iii. EV-DO Rev A 47 A careful selection has to be made while choosing a hardware design with a cellular technology which would result in long product development cycle time and short deployment time. A mistake while choosing a cellular technology will lead to delay in system development and expensive cellular network certifications. GSM system was designed as a second generation (2G) cellular phone technology. The aim was to provide a system that would enable greater capacity than the previous first generation analog systems which was achieved by using a digital TDMA [time division multiple access] approach. TDMA technique accommodates more users within the available bandwidth. In addition to TDMA, ciphering of the digitally encoded speech was adopted to retain privacy. GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at 900 MHz or 1,800 MHz frequency band. In Smart Grid, if GSM is considered then, SIM cards could be inserted in the smart meters which would easily transmit the meter data over the already built-in wireless network. To summarize, the Table 3 [24] shows the GSM specifications Multiple access technology Duplex technique Band Channel spacing Modulation Speech coding Speech channels per RF channel Channel data rate Frame duration FDMA / TDMA FDD 450, 480, 850, 900, 1800, 1900 200 kHz GMSK Various - original was RPE-LTP/13 8 270.833 kbps 4.615 ms Table 3: Summary of GSM Specifications 48 GSM SECURITY [25] GSM is one of the most secure cellular telecommunications available because of the standardized security methods it offers. The confidentiality of the communication is offered by the radio link with the application if encryption algorithms and frequency hopping. The anonymity of the user is ensured by using temporary identification numbers. For the first time when the device is switched on, the real identity, which is International Mobile Subscriber Identity [IMSI] is used and then a temporary identifier, that is the temporary IMSI [TIMSI] is issued. This temporary identifier is valid till the end of a session [37]. The following section describes few basic security methods used in GSM which are: MOBILE STATION AUTHENTICATION: GSM network authenticates the identity of a user using a challenge response mechanism. Here the GSM network sends a 128 bit Random Number [RAND] to the Mobile Station [MS]. The MS then computes a signed response [SRES] based on the encryption of the random number with an authentication algorithm called A3 using an individual user authentication key (Ki). The MS sends this SRES to the GSM network, which repeats the calculation to verify the identity of the subscriber. The user authentication key is never sent over the radio channel providing enhanced security. The user authentication key is present in the Subscriber Identity Module [SIM]. The A3 or similar algorithms like A8 are implemented in the SIM which contains both programming and information. The Figure 19 [25] shows the pictorial representation of the user authentication process. 49 Figure 19: GSM User Authentication Process SIGNAL AND DATA CONFIDENTIALITY: The SIM contains the A8 algorithm which is used to generate the 64 bit ciphering key (Kc). Ciphering key (Kc) is computed by the same random number RAND that is used in the authentication process. This ciphering key (Kc) is used to encrypt and decrypt the data between the mobile station [MS] and the base station [BS]. Based on security consideration and network design, the interval at which the ciphering key may be changed is decided. The Figure 20 [25] explains the algorithm flow used for signal and data confidentiality. 50 Figure 20: Signal and Data Confidentiality in GSM Figure 21 [25] explains the encryption of the data using A5 algorithm and ciphering key (Kc). Figure 21: Ciphering in GSM SUBSCRIBER IDENTITY CONFIDENTIALITY: A very commonly used identity which is exchanged between the mobile station and the network called Temporary Mobile Subscriber Identity [TMSI] is used to ensure subscriber identity confidentiality. 51 TMSI is a pseudo random number generated and issued by the Visitor Location Register [VLR] and TMSI is valid only in the area it was issued. 3.6. POWER LINE COMMUNICATION [26] Power line communication [PLC] uses the existing power lines from utility office to home and within a home/building to transmit data from one device to another. With better power line solutions, one can communicate using the existing wiring infrastructure without rewiring or modifications which makes it a cost effective means of networking devices. One of the requirements of PLC is that it requires high frequency. The current lines are designed at 50Hz to 400Hz and are noisy and unreliable. The legal restrictions on frequency band limit the data rates. There are quite a few challenges associated with communicating over the power lines. Power loss on these lines is directly proportional to square of current and distance. Different protocols like X10 protocol, CE bus protocol and Lon works protocol were used but due to poor bandwidth utilization, low data rate (60bps t0 10Kbps) and frequency band restrictions made them unqualified for implementation. Home Plug 1.0 was introduced to mitigate the unpredictable noise and provides Ethernet class network on the existing power lines with a data rate in the range of 1 to 14 Mbps. Currently research is carried out to achieve higher data rates upto 100 Mbps which are necessary for applications like HDTV. The quality of the transmitted signal depends on number of devices (air conditioner, television, hair dryer) that are switched on at a particular time. The quality of signal may also depend on the wiring architecture and the distance between the receiver and the transmitter. The key 52 characteristics that are considered to evaluate the performance of power line communications are: 1) Total number of components to complete a communication device and the cost associated with it. This includes the cost of implementing an appropriate power supply. 2) The frequency spectrum it uses for communication and its compliance with regulations. 3) Communication performance in the presence of noisy devices like televisions, computers and hair dryers which sometimes makes it impossible for the receivers to decode the transmitted signal, due to high signal distortion. The applications of power line communication could be as follows: 1) HOME AUTOMATION: PLC could be used to connect home devices that have an Ethernet port using Powerline adapters. The Powerline adapters plug into the wall outlet and then are connected using CAT5 cables to the home routers. All the devices would have a receiver system and each receiver in the system has an address that can be individually commanded by the signals transmitted over the household wiring and decoded at the receiver. 2) INTERNET ACCESS (Broadband over PowerLine [BPL]): BPL is internet over power lines and has many advantages over DSL or cable internet. The most obvious is the already existing ubiquitous wiring architecture. The wiring architecture reduces the cost of running Ethernet cables in buildings, overcomes the disadvantage of wireless networks which are security, limited maximum throughput and inability to power devices efficiently. 53 3) AUTOMOTIVE: Power-line technology enables in-vehicle communication network of data, voice, music and video signals by digital means over direct current [DC] battery power-line. Major disadvantages of PLC are signal errors due to interference and attenuation. Interference from nearby device causes signal degradation and Active devices like transformers, DC-DC converters and passive devices like relays and transistors causes signal attenuation. This might corrupt the data and/or control signals from/to the utility offices to the customers. 3.7. OPTICAL FIBER COMMUNICATION [27] Optical Fiber Communication [OFC] is a technique of sending data or information from one place to another by sending light pulses through an optical fiber. The light acts as the carrier wave which is used in modulation to carry the information signal. The transmission of information involves basic steps which are creating an optical signal to carry the information using a transmitter, relaying the signal over the optical fiber, ensuring the signal does not weaken before it reaches the destination and receiving the data and converting it to electrical signal at the destination. Optical fiber communication offers lower attenuation and interference and hence is an advantage over electrical transmission for long distances. OFC finds it application in telecommunication, television and internet signal transmissions. However the disadvantage with OFC is that it is very complex and expensive to install the required infrastructure. OFC is chosen when the system requirements are high bandwidth and long 54 distance communication. OFC can replace thousands of electrical links with a single higher bandwidth fiber. OFC is extremely low loss and effectively no crosstalk which are the major advantages over electrical transmission lines. Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH) are multiplexing WAN protocols, which enable transport of multi digital bit streams across the same optical fiber by using Light Emitting Diodes (LEDs) or lasers. SONET and SDH are closely related protocols that are based on circuit mode communication. SONET/SDH enables various ISPs to share the same optical fiber simultaneously without interrupting each other’s traffic load. They are physical layer protocols, which offer continuous connections without involving packet mode communication, and are distinguished as time division multiplexing (TDM) protocols. Optical Carriers are typically known by their OC-x number where x is a multiple of the OC-1 rate of 51.84 Mbps and OC-768 rate of 40Gbits/s. 3.8. WIRELESS MESH NETWORKS [29] Wireless Mesh Networks [WMN] [See Figure 22] [28] are multi-hop wireless networks formed by the mesh routers and mesh clients [See Figure]. Wireless mesh networking has emerged as a promising concept to meet the challenges in net-generation wireless networks such as providing flexibility, adaptive and reconfigurable architecture while offering cost-effective solutions to service providers. 55 Figure 22: Wireless Mesh Network The core nodes are the mesh routers which form a wireless mesh backbone among the nodes. The mesh routers provide a rich radio mesh connectivity which significantly reduces the up-front deployment cost and subsequent maintenance cost. They have limited mobility and forward the packets received from the clients to the gateway router which is connected to the backhaul network/internet. In addition to the conventional router functions, mesh routers enable mesh networking and have multiple interfaces of the same or different communications technologies based in the requirement. They achieve more coverage with the same transmission power by using multi-hop communication through other mesh routers. 56 The physical layer in a WMN uses some of the techniques like orthogonal frequency division multiplexing [OFDM], ultra wide band [UWB], Multiple-input Multiple-output [MIMO] and Smart Antenna technologies to improve the capacity of the WMNs. The medium Access Control protocols for wireless networks are limited to single-hop communication while the routing protocols use multi-hop communication. Hence, the MAC protocols are categorized as single channel and multi channel MAC. The single channel MAC protocols make use of use a few variations of Contention based protocols like a general contention based protocol, contention based protocol with reservation mechanism and/or a contention based protocol with a scheduling mechanism. Multi-channel MAC protocol is a link layer protocol where each node is provided with only one interface, but to utilize the advantage of multi-channel communication, the interface switches among different channels automatically [18]. Wireless mesh networks are considered for a wide range of applications such as backhaul connectivity for cellular radio access networking, building automation, intelligent transport system networks, defense systems and surveillance systems. The existing wireless networking technologies such as IEEE 802.11, IEEE 802.15 and IEEE 802.16 are used to implement WMNs. 57 The Table 4 & Table 5 summarizes the technologies discussed above which are considered for implementation of neighborhood area network for Smart Grid. Technology Features IEEE Data Transfer Rate: 22 802.11 (Wi- Mbps – 128 Mbps Fi) Range: up to ½ mile Operating Frequency: 2.4 GHz to 5 GHz Applications: Meters (AMI), Distribution Automation [DA] IEEE Data Transfer Rate: 802.16 (Wi- 30Mbps Max) Range: up to 50 km Operating Frequency: 2 GHz to 3 GHz Applications: Meters([AMI), DA, Mobile workforce management IEEE Data Transfer Rate: 802.15.4 250 Kbps Range: 100+ meters Operating Frequency: 1 GHz to 2.4 GHz Applications: Meters (AMI), HAN Advantages Low device cost Suitable to Mesh topology Low latency Disadvantages Not yet proven for Smart Grid deployment Low latency High bandwidth High equipment or device cost Not yet proven for Smart Grid deployment Suitable for Mesh topology Low power consumption Lesser data rates Short range coverage Table 4: Summary of Technologies for NAN (continued) 58 Technology Cellular Features Range: up to 50 km Operating Frequency: 900 MHz to 2.4 GHz Applications: Meters (AMI), DA, Mobile workforce management RF Mesh Data Transfer Rate: up to 1 Mbps Range: Variable Operating Frequency: variable Applications: Meters (AMI), DA Leased Data Transfer Rate: Lines (e.g. 1.5 Mbps – 155 Mbps SONET) Range: Variable Operating Frequency: Wired (Fiber or copper cables) Applications: Substations, DA Broadband Data Transfer Rate: over power 256 Kbps – 10 Mbps lines Range: Variable Operating Frequency: 1.8 to 80 MHz (electric carrier) Applications: Substations, DA Narrowband Data Transfer Rate: 1 over power Kbps – 100+ Kbps lines Range: Variable Operating Frequency: 9 KHz to 95 KHz Applications: Meters (AMI), DA Advantages Uses existing networks Low capital investment Short time-tomarket Low module cost Customizable based on specific need Self healing and organizing Low cost High Performance Robust Low recurring cost Robust Widely deployed in Europe Proven and Robust Disadvantages No direct utility control over the network Moderate performance Proprietary Expensive devices Unpredictable Latencies High recurring cost No direct utility control Not available at all sites High initial investment Expensive devices Not widely implemented Not reliable Low performance High latency Table 5: Summary of Technologies for NAN 59 Chapter 4 ROUTING PROTOCOLS Wireless network have become accustomed to enable mobility and also gained popularity in the computing industry. Currently there are two variations in mobile wireless networks. They are: INFRA-STRUCTURED NETWORK: This network consists of fixed and wired gateways. The bridges of these networks are called Base stations. A mobile unit is connected within the network which is connected to and communicates with the nearest base station [See Figure 23]. INFRA-STRUCTURELESS MOBILE NETWORK: This network is commonly known as AD-HOC network and contains no fixed routers. All nodes are in motion and connect in an arbitrary manner. Nodes present in these networks function as routers which in turn discovers and maintains paths to other nodes in a network [See Figure 23 [36]]. 60 Figure 23: Infra-Structured and Infra-Structuredless Networks There are numerous protocols developed for AD-HOC mobile networks since the beginning of Defense Advanced Research Projects Agency [DARPA] packet radio networks. These protocols had several limitations including power consumption, higher error rates, and low bandwidth. AD-HOC routing protocols are mainly categorized into [See Figure 24] [32]: Table- Driven Demand- Driven (Source initiated) 61 Figure 24: Ad-Hoc Routing Protocols 4.1. TABLE-DRIVEN ROUTING PROTOCOL [32] This protocol maintains up to date and consistent routing information from each and every node in a network. To perform this, each node has to maintain one or more tables to save the routing information. They also propagate updates throughout the network in order to maintain consistent network view. Some of the existing Table-Driven AD-HOC routing protocols are: Destination-Sequenced Distance- Vector Routing [DSDVR] Clusterhead Gateway Switch Routing [CGSR] Wireless Routing Protocol [WRP] 62 4.1.1. DESTINATION-SEQUENCED DISTANCE-VECTOR ROUTING [DSDVR] [32] This is a distance-vector protocol which is used in MANET [Mobile AD-HOC Network] with some extensions added to it. A routing table is maintained by each node with one route entry for each destination by recording the shortest route and a destination sequence number is used to avoid routing loops. The sequence number is incremented by the node whenever a change like a new node getting added or if a node gets dropped in its neighborhood. These numbers are also used to select alternative routes to reach the same destination. Nodes collect the most recent information by choosing the route with the greatest number. Routing updates can generate two types of packets: Full Dump packets: This packet carries all available routing information along with multiple Network Protocol Data Units [NPDUs]. In times of occasional movement, these packets are transmitted infrequently. Smaller Incremental packets: These packets are used depending on the information which has changed since the last full dump. Each of these broadcasts must fit into a standard- size NPDU which helps in reducing the traffic generated. Mobile nodes also maintain an additional table where the data is stored which is then sent as incremental routing information packets. Each new route broadcast contains the destination address, number of hops to reach the destination and unique sequence number to each broadcast. In the event that two updates have the same sequence number then the route with the smaller metric is used to shorten the path. 63 4.1.2. CLUSTERHEAD GATEWAY SWITCH ROUTING [CGSR] [32] This protocol follows different type of addressing and network organization scheme adopted when compared to DSDVR protocol. It is a multiple hop mobile wireless network with several heuristics schemes. Channel access, routing, bandwidth allocation can be achieved by having a cluster-head controlling a group of AD-HOC networks. A node is elected as a cluster head using Cluster head selection algorithm and a distributed algorithm is used within the cluster. The main disadvantage in following cluster head scheme is that it causes an adverse affect on routing protocol performance due to frequent cluster head changes. This is because nodes are busy in cluster head selection instead of packets relaying. To overcome cluster head selection affect, a Least Cluster Change [LCC] clustering algorithm is used. This algorithm allows cluster head changes only when two come in contact or when one node moves out of contact from all other cluster heads. 64 Figure 25: Cluster Head Gateway Switch Routing DSDVR is used as the underlying routing scheme by CGSR and hence CGSR has the same overhead as DSDVR. However, CGSR modifies the use of DSDVR by using a hierarchical cluster-head-to-gateway protocol approach to route traffic from source to destination. Gateway nodes are those which are within the communication range of two or more cluster heads. The packet initially is sent by the node to the cluster head which is then sent to another cluster head through gateway until the cluster head of the destination node is reached. The packet is then finally transmitted to the destination. An example of this routing scheme is described in Figure 25 [32] 4.1.3. WIRELESS ROUTING PROTOCOL [32] The wireless protocol is a table based protocol with the perception of maintaining routing information of all nodes in a network. Each node in the network will maintain the following four tables: Distance Table 65 Routing Table Link-Cost Table Message Retransmission List [MRL] Table In case of an event where a link is lost between two nodes, the nodes send update messages to their neighbors and update the distance table and checks for new possible paths and updates the routing table. The link cost table maintains the cost of the link to its nearest neighbors, and the number of timeouts since successfully receiving a message from the neighbor. Every entry in the MRL Table contains the sequence number of the update message, a retransmission counter, an acknowledgement-required flag vector with entry per neighbor and the list of updates sent in the update message. The MRL Table decides which updated message has to be retransmitted and which neighbor should acknowledge the retransmission. 4.2. SOURCE INITIATED ON-DEMAND [32] Source-initiated On-demand routing provides a different approach when compared to the table-driven routing. Source-initiated on-demand routing creates routes only when required by the source node. A route discovery process takes place within the network whenever a node requires route to a destination. This process is completed once the route is traced or all possible route permutation is found. A route maintenance procedure maintains the established route until the destination becomes inaccessible along every path from the source or till the route is no longer required. Some of the existing Source Initiated On-Demand routing protocols are: Ad Hoc On – Demand Distance Vector Routing [AODV] 66 Dynamic Source Routing Temporally Ordered Routing Algorithm Signal Stability Routing Associativity Based Routing 4.2.1. AD HOC ON –DEMAND VECTOR ROUTING [AODV] [32] Ad Hoc On-Demand Vector routing protocol builds on the Destination-Sequenced Distance- Vector [DSDV] algorithm. AODV creates routes on demand basis by minimizing the number of required broadcasts unlike the DSDV algorithm which maintains a list of routes. This algorithm is an improvement to DSDV algorithm. AODV is also called as a pure on-demand routing acquisition system because only the nodes which are on the selected path maintain the routing information are involved in routing table exchange. When a source node wants to communicate with some destination node but does not have a valid route to that destination, the source node then initiates a path discovery process to discover the other node. To achieve this, source node broadcasts Route Request [RREQ] packet to its neighbors. This request is in turn sent to its neighbors and so on until either the destination route or an intermediate node route to the destination is traced. 67 Figure 26: Propogation or RREQ packet The Figure 26(a) [32] illustrates the propagation of the broadcast RREQ’s across the network. To ensure all routes are loop free and contains the most recent route information, a destination sequence number is being maintained by AODV. Each node along with the broadcast ID maintains its own sequence number. For every RREQ that the node initiates, the broadcast ID is incremented and together with the node’s IP address, the RREQ is uniquely indentified. The source node along with its own sequence number and the broadcast ID includes the most recent sequence number it has for the destination to the RREQ. Intermediate nodes reply to the RREQ only if they have a route 68 to the destination and also the destination sequence number should be greater than or equal to the current destination sequence number contained in the RREQ. The intermediate nodes records the address of the neighbors from which the first copy of the broadcast packet is received in their route tables. This helps in establishing a reverse path. If nodes later receive additional copies of same RREQ, then such packets are discarded. Once the RREQ reaches the destination or an intermediate node with a new route to the destination, the destination or intermediate node replies by sending a Route Reply (RREP) packet back from which it first received the RREQ packet [See Figure 26(b)] [32]. 4.2.2. DYNAMIC SOURCE ROUTING [DSR] [32] Dynamic source routing protocol is an on-demand routing protocol and is based on the concept of source routing. A mobile node maintains route cache which contains source routes that is known by mobile nodes. The route cache is continually updated as new routes to the source are learnt by the mobile nodes. 69 Figure 27: Dynamic Source Routing DSR protocol maintains two major phases: Route discovery and Route maintenance. Whenever a mobile node has to send a packet to some destination, it initially checks the route cache to find out whether the route to the destination is already known. If the route to the destination is already present in the route cache, it uses the same route to transmit the packet. On the other hand, if the route to destination is not present in the route cache, then the node initiates route discovery by broadcasting a route request packet. This route request packet contains destination address, source node’s address and a unique identification number. Each and every node checks if it has the destination route to the address sent in the route request packet. If the node does not find the destination route in its route cache, it adds its own address to the route record packet and forwards the packet to the nodes among its outgoing links. A route reply is generated only when the route request packet reaches the destination or an intermediate node containing the route to the destination in its route cache. Figure 70 27(a) [32] illustrates the route record formation as the route request propagates through the network. If the route reply is generated by the destination, then the destination places the route record contained in the route request into the route reply. If the route request is responded by an intermediate node, then it will append its cache route to the route record to generate the route reply. The responding node must have a route to the initiator in order to send the route reply. If the responding node has the route to the initiator in its route cache, then it should use that route. Otherwise, if symmetric link is supported, then the node must send the route reply by using the reverse route in the route record. If the symmetric link is also not supported, then the responding node can initiates its own route discovery and piggyback the route reply on the new route request [32]. Figure 27(b) [32] illustrates the transmission of the route reply with its associated route record back to the source node. 4.2.3. TEMPORALLY ORDERED ROUTING ALGORITHM [TORA] Temporally ordered routing algorithm is based on the concept of link reversal and is proposed to operate in a highly dynamic mobile networking environment. It is a highly adaptive loop-free distributed routing algorithm. This protocol is source initiated and provides many desired routes for any source or destination pair. The main concept in TORA is that it provides localization of control messages to a very small set of nodes near the occurrences of a topological change [32]. To achieve this, each node has to maintain routing information about adjacent nodes. 71 TORA performs the following basic functions: Route creation Route maintenance Route erasure Nodes during route creation and maintenance phase establish a Directed Acyclic Graph [DAG] which is rooted at the destination by using Height metrics as shown in Figure 28(a) [32]. 72 Figure 28: Temporally Ordered Routing Algorithm In case of node mobility a DAG route is broken and route maintenance is required to reestablish a DAG rooted at the same destination. Figure 28(b) [32] explains that upon failure of last downstream link, a node creates a new reference level and all the neighboring nodes propagate through the new reference level by providing a coordinating structured reaction to failure. The change in adapting the new reference level is reflected by link reversal which has the same effect as reversing the direction one or more links when a node has no downstream links [32]. 73 Timing is a major factor in TORA because the “height” metric is dependent on the logical time of link failure. TORA also assumes that nodes have synchronized clocks. TORA’s height metric is quintuple which comprises of five elements, they are: Logical time of a link failure. A reflection indicator bit. The unique ID of the node that defines the new reference level A propagation ordering parameter The unique ID of the node 4.2.4. ASSOCIATIVITY- BASED ROUTING [ABR] [32] Associativity-Based Routing is also called as Degree of association stability. This protocol has a different approach in mobile routing, because it is free from loops, deadlocks, packet duplicates and defines new routing metrics for ad hoc mobile networks. A route is selected based on the degree of association stability of mobile nodes. Each node to signify its existence periodically generates a beacon. This beacon when received by the neighboring nodes causes their associativity tables to be updated. The associativity tick of the current node with respect to the beacon node is incremented for every beacon received. Association stability is defined by connection stability of one node with respect to another node over time and space. High degree of association stability indicates low state of node mobility and vice versa. Associativity ticks are set when the node or the neighboring nodes move out of proximity. 74 The fundamental objective of ABR is to derive longer- lived routes for ad hoc mobile networks. ABR follows three main phases, they are: Route Discovery Route Reconstruction [RRC] Route Deletion Route Discovery phase is achieved by a broadcast query and await-reply [BQ-REPLY] cycle. Any node that is looking for a route, broadcasts the BQ message to all the mobile nodes in order to find the route to the destination. Nodes which are not the destination, append their addresses and their associativity ticks with their neighbors along with QoS information to the query packet. The upstream node neighbor’s associativity tick entries are erased by the successor node by retaining only the concerned entry itself and its upstream node. In this way, every resultant packet will contain the associativity ticks of the nodes and route to the destination while arriving at the destination. The destination chooses the best route by examining the associativity ticks along each path. But, when the overall degree of association stability is the same along multiple paths, then the route with the minimum number of hops is selected. The destination replies to the source by sending a REPLY packet back along the same path. Nodes propagating the REPLY, mark their route as valid and the rest routes remain inactive. Hence the possibility of duplicate packets arriving to the destination is avoided. 75 Chapter 5 TRANSPORT PROTOCOL Smart Grid’s success heavily lies in the communication infrastructure underneath it. Smart Grid communications are broadly divided into two types namely data communication and control communication [as discussed in Chapter 1]. These communications could be achieved through several layers with reference to the OSI reference model. The OSI model has seven layers namely, application, presentation, session, transport, network, data link and physical layers. In this chapter, our focus is on the transport protocols which are part of the transport layer. Transport layer provides two types of service to an application. They are connection oriented and connection-less service. Connection oriented service provides reliable, full duplex connection ensuring end-to-end error detection and correction. While a connectionless service provides higher speeds as they do not provide flow control and error correction. The requirements for the transport protocols for Smart Grid are identified as: Secure Reliable High Availability Real Time Scalable Few of the important transport protocols that find its place in Smart Grid are listed below. Transmission Control Protocol [TCP] 76 Stream Control Transmission Protocol [SCTP] User Datagram Protocol [UDP] Wireless Datagram Protocol [WDP] Split TCP Cyclic UDP [CUDP] Wireless Profiled TCP [WP-TCP] 5.1. TRANSMISSION CONTROL PROTOCOL [15] TCP is a connection oriented protocol where an application process must first “handshake” with the other processes before sending data. Both the application processes must exchange some of the preliminary segments to establish the parameters for ensuring the data transfer. TCP provides full duplex service, that is, two senders can send information to each other at the same time. But it cannot multicast, that is, a single sender cannot send it to many receivers at once. The process of establishing connection is also referred to as a “three-way handshake”, as the client first sends a special TCP segment to the server and the server then responds with a second TCP segment and once the connection is established, the third segment is exchanged which is the data payload. The first two segments do not carry any data payload. TCP is a connection oriented network and the advantage of it being connection oriented is that it provides reliable service by incorporating congestion control, sequence number detection and acknowledgment mechanisms. An orderly delivery of messages is guaranteed using TCP as it implements sequence number and messages are requested to be retransmitted if the messages arrive out of sequential order. Also, the messages are 77 retransmitted if the sender does not receive an acknowledgement before the timeout period. Usually in wired networks, messages get dropped or fail to reach the destination due to network congestion. TCP implements congestion control mechanisms to overcome this network congestion problem. At the same time, for wireless networks, congestion control mechanism of TCP is an overhead because when a packet or a message is lost due to disturbances in the communication medium (which is the main cause for packet loss in wireless networks), TCP assumes that the packet loss is due to the network congestion and implements congestion control mechanism which lowers the data rate and also delay delivery of the data to the destination. This would lead to another problem that points to real time application of TCP. Also, TCP is prone to SYN Flood attacks, where in a malicious computer sends many requests to the server with spoofed IP addresses and fills up the connection table that result in dropping of some valid requests. This could be controlled to an extent by dropping packets from unknown IP addresses. To summarize the advantages of TCP are it is reliable and efficient in wired networks and disadvantages however are that TCP does not guarantee a timely delivery of data, it cannot be used in time critical applications. In Smart Grid, the control information such as pricing, control signals to medical equipments and so on are time critical and usage of TCP in time critical applications become a bottle neck. Hence TCP confines its usage in Smart Grid to transmitting only non time critical data. 78 5.2. USER DATAGRAM PROTOCOL UDP is the core component of the Internet Protocol Suite. Computer systems use UDP to send messages across hosts and these messages are referred to as Datagrams. Unlike TCP, UDP does not add overheads like communication channel establishment, error correction, flow control or congestion control. UDP rather drops the packet instead of waiting for a delayed packet. Hence it is a good candidate for time critical applications. UDP supports multicast and broadcast, that is, a message can be sent simultaneously by a sender to many receivers. Also, UDP is advantageous whenever there are link failures or when routes keep changing, since a UDP packet has all the information required by itself to reach the destination. As mentioned earlier, UDP does not account for the overhead as compared to TCP, implementing flow control, congestion control and acknowledgement mechanisms which make it unreliable. Also, UDP packets are lost due to the fact that routers choose to drop UDP packets first to TCP packets in case of insufficient memory. UDP is faster and hence faces problems in a fast sender and slow receiver scenario since flow control is not implemented. UDP is susceptible to intrusions because a socket receives data from any host whether it is participating in the communication or not, hence it makes UDP unsuitable for time sensitive applications. In Smart Grid, UDP could be used to broadcast or multicast the pricing changes information to the subscribers which are not time critical. UDP could also be used to send 79 control signals which are not time critical, like turning on the air conditioning system few minutes before entering a premise. 5.3. SPLIT TCP Proxies split a TCP connection into multiple local segments. These proxies buffer packets and deliver them to the next proxy or to the destination. Here, each segment by itself is a complete TCP connection. TCP segregates the effect of packet errors and delay in wireless links from the wired connections, so that, TCP congestion control, timeout and retransmission mechanisms in the wired link do not suffer from the fluctuating quality of the radio channel. The advantage with Split TCP is that it hides the problems associated with the wireless links from the wired links and vice versa and provides better TCP performance when deployed in wireless networks. Split TCP lacks the security aspect in the end-to-end communication between sender and the receiver. In Smart Grid Split TCP could be used in a situation where wireless and wired networks bridge together, since TCP in wired and Wireless Profiled TCP [WP-TCP] in wireless are performance efficient. 5.4. STREAM CONTROL TRANSMISSION PROTOCOL [31] A mix of TCP and UDP features give rise to another transport protocol called Stream Control Transmission Protocol [SCTP]. Unlike TCP’s 3-way handshake, SCTP implements a 4-way handshake to establish a connection between end points. The use of TCP has two major problems which are: 80 HEAD-OF-LINE BLOCKING - This is a problem where the delivery of the new message is delayed when a packet of an earlier message sequence arrives late or lost during transmission. The new message is held within the receiver’s transport layer buffers until the lost packet of the earlier message is retransmitted. MULTIHOMING – This is a problem when a host implementing TCP is forced to wait (in the order of minutes) to communicate critical information to its destination end-point even when alternative routes exist. Since TCP implements handshaking before the message transfer phase it sticks to the single point of attachment at the other end. SCTP implements Multi-Streaming to overcome the head-of-line blocking problem of TCP. In Multi-Streaming each data associated with SCTP is assigned a particular stream for data transmission. In every stream the packets or messages are delivered in order but this order is independent of the order in the other stream. Thus SCTP provides a partial order delivery by parallel ordered streams. SCTP is message oriented, meaning a message of 100 bytes is sent as a single message and the receiver receives it as a single read. It is similar to UDP but with added reliability. Unordered Service is another positive aspect of SCTP, where unordered reliable delivery would be useful when ordering is taken care at the application level and hence reduces the TCP overhead for ordering. TCP is prone to SYN Flood attacks, where a malicious host would send many connection requests with spoofed IP addresses, there-by using up all the resources of the server by putting entries in the connection table. SCTP uses SYN cookies wherein during the connection establishment phase the server presents a cookie to the client that is requesting a 81 connection and the client has to return this cookie during handshake. The server then verifies the cookie sent by client and if it is the expected cookie then the server allocates buffer for the new association. The disadvantage of SCTP is very high set-up time for communication as it involves 4way handshake. SCTP is more complex as it involves integrity check mechanism based on cryptographic hash functions, and validating state cookies, hence the processing power of the systems should be bit higher compared to normal TCP or UDP processing systems. High availability is provided by SCTP as it avoids multi-homing and implements multi-streaming. Also it could be used on high bandwidth as it supports high receiver window size. In Smart Grid, SCTP could be used for time critical applications as it has high availability, and could also be used on communication medium which has low bandwidth and high latency. 5.5. WIRELESS DATAGRAM PROTOCOL [30] One of the protocols of Wireless Application Protocol [WAP] architecture is Wireless Datagram Protocol [WDP], which covers the transport layer protocols in an internet model. WDP is similar to UDP, except for the fact that WDP does not depend on the IP addresses [28]. WDP provides the upper layers an invisible interface which is independent of the underlying network technology used. WDP also supports port level addressing, segmentation and reassembly. UDP could be used as WDP for the link layers that support IP. This concludes that, in Smart Grid if IP is not supported then WDP could be used instead of UDP, else UDP is a strong player for wireless communication. 82 Chapter 6 SECURITY ISSUES, VULNERABILITIES AND BEST PRACTICES In this chapter, the focus is on the security issues and vulnerabilities of the protocols or standards discussed in chapter 3. Wireless networks are prone to attacks for obvious reasons that the communication medium is easily accessible. 6.1. IEEE 802.11 6.1.1. VULNERABILITIES AND SECURITY ISSUES 1. CONVENIENT ACCESS: 802.11 networks announce their existence with the aid of beacon frames which are also inviting threats. “War Drivers” use software to log these appearances of beacon frames and find the locations using GPS. This cannot be avoided in any means other than protecting the network with strong access control and using VPN for sensitive traffic. 2. ROGUE ACCESS POINTS: One of the common security risks is with the rogue access points which are easy to setup and does not even require authorization. End users are mostly affected as they are not security experts and minimal changes would be done by the end users on the default settings. Walking through the campus with network analyzers like NetStumbler is the only way to check for rogue access points around your premises. 83 3. MAC SPOOFING: The management frames are not authenticated in 802.11. Every frame has a source address. The attackers take advantage of the spoofed frame to redirect the traffic and corrupt the ARP tables. To avoid such attacks strong user authentication has to be provided to allow potential users to access and unauthorized users can be kept away from the network. 4. DENIAL OF SERVICE ATTACKS: i. PHYSICAL ATTACKS: Unlike wired networks, physical attacks to wireless networks are easy as it does not require the attacker to be in the close proximity of the victim. Simple devices that operate in 2.4 GHz frequency band like cordless phones that support 802.11b can be used to take the network offline. This is done by reducing the signal to noise ratio of the channel to an unusable range, by inducing noise into the network. 802.11b is susceptible to interference from other protocols or technologies like bluetooth, microwave oven, cordless phones which operate at the same frequency band using different modulation techniques. ii. DATA-LINK ATTACKS: Even with WEP turned on, the attacker can perform DoS attacks by accessing the user information on the link layer. Without WEP, an attacker has full access to the user information to manipulate the associations between the stations and access points to terminate access to the network. If an access point is incorrectly utilizing the diversity antennas, an attacker can potentially deny access of the customer associated to that particular access point. 84 Also, by spoofing, if the association of APs what is AP? in a particular SSID is found out, then the client access to that AP can be denied using malicious AP by providing strong signals using a directional antenna or any other amplification means. iii. NETWORK ATTACKS: If a network allows any client to associate then DoS attacks at the network level is a possibility. An attacker can flood ICMP packets to the gateway, thereby creating a difficult time for clients associated to the same AP to send and receive packet. An example could be a huge file transfer or a bandwidth hungry application on a WLAN with slower speeds can hamper the access for all the stations. 5. MAN-IN-THE-MIDDLE ATTACKS: There are two versions of MIM attack. They are i. EAVESDROPPING: Since the medium is wireless, the data is easily accessible as the data is not confined to a physical area and hence the data could be examined at real time or stored for later examination. To prevent this several rounds of data protection (encryption) has to be applied before transmitted to avoid the access from attackers. ii. MANIPULATING: Even with WEP turned on, the attacker can log huge amounts of data from the WEP protected traffic, store it, examine it and break the protection. Manipulating is the next step to eavesdropping. ARP poisoning can be used to divert the traffic through a malicious computer which could stop forwarding the packets and incur a DoS attack. 85 6.1.2. BEST PRACTICES FOR 802.11 The following section describes the recommendations for the security of 802.11 networks: 1) Media access control (MAC) address filtering [13] would allow us to configure our wireless access points (APs) with the set of MAC addresses for authorized wireless clients. PROS: Helps receive information from authentic sources and prevents unauthorized access. CONS: Does not prevent a hacker from MAC spoofing, increases administrative overheads. 2) Wi-Fi Protected Access (WPA) [13] has an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP) which uses a unique key for every client and also uses longer keys that are rotated at configurable intervals. WPA also includes an encrypted message integrity check field in the packet to prevent denial-of-service and spoofing attacks. PROS: With the use of WPA2, VPN connections are not required to secure the wireless frames. 3) IEEE 802.11w-2009 [14]: The management information is sent in unprotected frames, which cause network disruption by malicious systems that forge disassociation requests that appear to be sent by valid equipment. IEEE 802.11w-2009 is an approved 86 amendment to IEEE 802.11 to increase security of the management frames. The objective of this protocol is to increase the security by providing data confidentiality of management frames, mechanisms that enable data integrity, data origin authenticity, and replay protection. 6.2. IEEE 802.16 6.2.1. VULNERABILITIES AND SECURITY ISSUES 1) AUTHENTICATION: The user authentication in Wi-Max uses X.509 certificate that will uniquely identify each subscriber and makes it difficult for the attacker to spoof the identity of the legitimate user. The drawback with WiMAX is that it does not have Base Station (BS) authentication which makes it prone to Man-in-the-middle attacks exposing subscribers to confidentiality and availability attacks. WiMAX uses privacy and key management (PKM) protocol mechanism for authentication. 802.16e is an amendment of 802.16 which uses Extensible Authentication Protocol (EAP) mechanism for authentication which is optional and rarely used by Service Providers. Since BS does not authenticate itself, the SS cannot be protected from rogue BS. 2) ENCRYPTION: 802.16e supports for Advanced Encryption Standard (AES) cipher providing strong confidentiality on user data. Again the drawback is with encryption not applied on the management frames thereby sufficing the attacker to gather information about the subscribers in the area and also about the network characteristics. 3) AVAILABILITY: Even though WiMAX uses a licensed RF spectrum, attackers can use easily available gadgets to jam the network. This is an example for physical layer 87 denial of service attacks whereas attackers can send legacy management frames to disconnect legitimate station, this is nothing but deauthenticate flood attacks. 4) WATER TORTURE ATTACK: This is a form of physical layer attack where in the attacker sends a series of frames to any node to drain the battery life of the victim node. 6.2.2. BEST PRACTICES FOR 802.16 The following section describes the recommendations for the security of 802.16 networks: 1. MESSAGE AUTHENTICATION CODE [MAC] TECHNIQUES [15]: For vulnerability of management message, message authentication code techniques can be applied during initial ranging. For example, one-key message authentication code [OMAC] may be preferable since it provides replay protection 2. PROTECTION AGAINST MASQUERADING PARTIES: A mutual authentication scheme is necessary, and Extensible Authentication Protocol (EAP), a generic authentication protocol used in wireless networks, is most commonly proposed. 3. AES-CCM5: AES in CCM mode constructs a unique nonce during the process of CBC-MAC. AES-CCM also has an advantage that the encryption scheme is also capable to protect authenticated but unencrypted data. 88 6.3. IEEE 802.15.4 6.3.1. VULNERABILITIES AND SECURITY ISSUES Many applications require confidentiality and data integrity, 802.15.4 addresses these with the link layer security package. 1) CONFIDENTIALITY: Same key in multiple ACL entries could completely break the confidentiality property. In this case if the user is using the same key to send two different messages to different destinations using different ACL entries, then the frame and key counter will be 0x0 and hence there is a possibility of reusing the nonce as each recipient will have their own ACL entry with its own nonce state. 2) LOSS OF ACL STATE: There are chances of ACL table getting cleared when there is a power failure or when the device operates in a low powered state. i) POWER FAILURE: In case of power failures the ACL entries are cleared, however, the ACL table is repopulated by the software with appropriate keys. But, the issue is with the nonce states. All the nonce states are reset to a known value say 0 (zero) and there by reuse of nonce is forced to occur which comprises security. In such cases, the application still seems to work but fails to secure the communication from eavesdropping. ii) LOW POWERED OPERATION: Again the issue is with how to retain the nonce states when the device enters the low powered state. To increase the power consumption efficiency, only few parts of the device is on for a small fraction of the time and hence 89 the possibility of the device emerging with a cleared ACL is high and hence incurred is the reuse of the nonce state. POSSIBLE FIX: Suitable fix to this problem could be saving and storing the nonce states in flash memories which incurs additional cost, power consumption and also is slow and energy inefficient. 3) KEY MANAGEMENT PROBLEMS: This problem arises due to the inability in the ACL tables to support different keying models. i) GROUP KEYING: There is no support for using the same key for multiple ACL entries. For example if a group of nodes (n0, n1, ..n4) wants to use a key k1 and group of nodes (n5, n6, .. n9) wants to use the key k2. As discussed earlier since each ACL entry can be associated to a single destination address, this type of model cannot be supported. If attempts are made to create separate ACL entries for each node then the reuse of nonce state problem arises. POSSIBLE FIX: Fix for this could be creating a single ACL entry for key k1. Before sending, changing the destination address associated with that ACL entry for a message would suffice. ii) NETWORK SHARED KEYING: The network cannot be protected from replay attacks when using a network wide shared key. to use the network shared keying model the application has to use the default ACL entry but a default ACL entry could be used only if there is no matching ACL entry. Now if a sender s1 sends 50 messages with 90 replay counter 0 – 49 along with the shared key with the default ACL entry and now when a sender s2 attempts to send a message with replay counter 0 (zero), the device would reject the message as the replay counter is not greater than 49. Hence network shared keying model cannot be implemented. 4) CONFIDENTIALITY AND INTEGRITY PROTECTION: proven that unauthenticated encryption modes can introduce risks of Researches have protocol level vulnerabilities compromising not only integrity but also confidentiality. An example for this could be AES-CTR which uses counter mode without a MAC. 5) DENIAL OF SERVICES: As discussed previously, the replay attacks could make the device to reject packets. For example consider a device that last received a packet with replay counter 99, now receives an illegitimate packet with a replay counter 0xffffffffh, with any payload with the key k. Since the replay counter is greater than 99 the device receives the packet and decrypts it, resulting in random garbage. Further the device rejects any legitimate packet with a valid replay counter resulting in denial of service attack. 6) NO ACKNOWLEDGEMENT PACKETS INTEGRITY: There is an option for the sender to request an acknowledgement for the packets sent from the recipients. But there is no confidentiality or integrity provided for the acknowledgement packets thereby attracting the attacker to forge the acknowledgement packets. For example, an attacker could make the recipient drop a packet sent by the sender, by making the CRC to be invalid by sending a short burst of interference. And now the attacker could forge a valid- 91 looking acknowledgement so the sender is assured of the receipt of the packet by the recipient. 6.3.2. BEST PRACTICES FOR 802.15.4 The following section describes the recommendations for the security of 802.15.4 networks: 1) MAC ADDRESS FILTERING [15]: This security mechanism is defined with the IEEE 802.15.4 standard and is defined in the Access Control List (ACL) mode. This feature should be enabled to accept the received MAC frames from authorized nodes listed in the ACL for the host device. 2) FLASH MEMORIES [15]: The loss of ACL entries during power failure or low powered operation could be fixed by saving and storing the nonce states in flash memories. But the use of such flash memories incur an additional cost, power consumption and also is slow and energy inefficient. 3) AES ENCRYPTION STANDARDS [15]: Data privacy protection mechanisms based on AES encryption standard should be used to protect the transmitted data. 4) SOURCE NODE AUTHENTICATION [15]: A concept similar to shared secret key or unique session key that is derived between two entities in order to secure data transmitted between them should be used to implement source node authentication. 92 6.4. GSM Security GSM was first implemented in 1991. GSM providers use a version of COMP128 for both the A3 authentication algorithm and the A8 key generation algorithm. In 1998, Smartcard Developer association [SDA] together with U.C. Berkeley researches cracked the COMP128 algorithm stored in SIM and succeeded to get individual user authentication key (Ki) within several hours. It was then discovered that ciphering Key (Kc) uses only 54 bits. The A8 algorithm takes a 64-bit key, but ten key bits were set to zero. COMP128-2 and COMP128-3 algorithms have been developed to address the security issues of COMP128-1. COMP128-2 and COMP128-3 are secret algorithms which have not been subject to cryptanalysis. COMP128-3 fixes the issue where 10 bits of the ciphering Key (Kc) were set to zero [35]. 93 Chapter 7 POTENTIAL RESEARCH TOPICS 7.1. CHOOSING A STANDARD FOR IMPLEMENTING NEIGHBORHOOD AREA NETWORK There are quite a few technologies in contention to be used to implement neighborhood area network (See Table 4 & Table 5). A preferred standard would be the one which is compatible or common across domains like HAN, NAN and WAN. This would decrease the equipment cost to a great extent as the radio to be used in the devices would need to support one single technology, which would also ease the implementation. If not a single technology, lesser the variations used across the domains, the better it is. To explain this in more detail let us consider an example. One of the technologies considered for HAN is ZigBee, which is based on IEEE 802.15.4. ZigBee derives the implementation of PHY layer and the MAC layer from the IEEE 802.15.4 standard. If IEEE 802.15.4 is considered for the implementation of NAN, the same radio could be used in the devices installed at homes and utilities. The same packet format could be maintained and so on. This would ease the implementation and lessen the equipment costs. Also, it would be more advantageous if an existing technology is chosen, or modifying an existing technology to satisfy the Smart Grid NAN deployment requirements. Few technologies like Narrowband over power lines, which are proven and robust in Europe, could be considered. The advantage of using such a technology would be no new 94 deployments as it uses the existing power lines for data transmission, also data could be modulated using the AC 60Hz frequency as a carrier. As of today, there is no widely deployed technology in North America to be used for the implementation of neighborhood area network. Hence research is required in this area to choose a protocol based the above discussion. 7.2. UNPREDICTABLE LATENCIES IN MESH NETWORKS An important advantage of mesh networks is that it is self-healing and self-organizing. Self-organizing is similar to the concept of a Plug and Play device. Add a new node and the network discovers the node and automatically incorporates it as part of the system. There is no human intervention required for configuring the new node to be a part of the network. Also, there is no human intervention required to re-route the messages in case of node or link failures in a mesh network. Routers choose an alternative path to send the messages to the destination in case of such failure and this is referred to as self-healing. The capacity of a network is dependent on number of factors like network architecture, node density, and number of channels used, node mobility, traffic pattern, and transmission range. If the number of hops taken to reach a destination increases or the diameter of the network increases, the capacity (throughput) of the mesh network decreases due to interference. If n nodes tries to transmit simultaneously on the number of available channels, and not all the channels are orthogonal (non-overlapping), then the data gets corrupted at the receiving end. This causes the re-transmission of packets and creates unpredictable situations from a RF perspective leading to network suffering from 95 unpredictable latencies. A significant amount of research is required to overcome this problem as RF Mesh networks even if proprietary, are strong contenders for NAN implementation. 7.3. PLC FOR HOME AUTOMATION There have been a few failed approaches from vendors to develop interoperable profiles for HAN connectivity. An example for that is ZigBee alliance and HomePlug Powerline Alliance working together to implement ZigBee energy profile over power lines. However, due to changes and/or additions to the requirements, the implementation became very expensive, power hungry and/or considerably slow. Research in this area to increase the bandwidth to around 1 Mbps and reduce cost and power consumption to match the HAN requirements, could force PLC to be used instead of RF for HAN. If this is achieved then PLC could be implemented in both NAN and HAN. 7.4. IP BASED NETWORKS IP based networks are one of the key elements in Smart Grid information networks. The advantage with IP based networks is the availability of a large variety of tools and applications that could be applied to Smart Grid, which could be used in both private and public networks. It also serves as an interface to application and the underlying communication medium. IP based networks are very reliable with its dynamic routing abilities and bandwidth sharing properties. It also could satisfy the quality of service requirements of Smart Grid like minimum access delay and minimum bandwidth constraints with protocols like Multi Protocol Label Switching [MPLS]. 96 Research is required in this area to identify whether IP based network is suitable for a given set of Smart Grid requirements and whether cyber security could be achieved for the same. 7.5. SECURITY FOR ROUTING PROTOCOLS IN WIRELESS MESH NETWORKS The two types of path determination (routing) techniques in wireless mesh networks [WMN] are proactive and reactive routing protocols. Proactive protocols are one which finds the path irrespective of the demand. Reactive are those which find the path based on demand. There are threats associated with these routing protocols which might require knowledge about the routing protocols to inject erroneous packets to the network. The threats are summarized below: BLACK-HOLE: Here the attacker creates forged packets to imitate a valid node in the mesh network. The packets are attracted by advertizing low cost routes and further attacking by dropping the packets. GREY-HOLE: Here forged packets are used by the attacker to drop packets, route and inspect network traffic. WORM-HOLE: Disruption of routing is carried out by replaying the routing control messages from one network location to another. ROUTE ERROR INJECTION: An attacker by injecting erroneous packets to the mesh network can break the mesh links. 97 These threats greatly depend on the routing technology used. A proprietary routing protocol is less susceptible to these kinds of threats when compared to routing protocol like Ad-hoc On-Demand distance vector (AODV). These risks could be reduced by implementing message integrity checking for the routing messages and device authentication. Also, the routers in a mesh network are not power constrained but the clients which are mobile are power constrained. Hence there is a need of efficient routing mechanism for WMNs. Research in this area to secure the routing protocols is the need of the hour, as wireless mesh networks are integral part of Smart Grid communication networks. 7.6. LIMITATION ON WIRELESS INTRUSION DETECTION Detecting threats against wireless networks have become possible since the introduction of Intrusion Detection Systems [IDS]. The IDS alerts any kind of suspicious activities on the system. IDS differentiate these activities as either false positives or false negatives. False positives are false alarms and false negatives are attacks that were not detected. An IDS consists of three main functions namely event monitoring, analysis engine and response. Event monitoring is collection of data and performing some kind of pattern matching to detect an abnormal activity. The analysis engine has the intelligence to detect the malicious intent from the collected data. The response alerts the system administrator with the result of the investigation performed at the analysis engine stage. The analysis engine ha two types of attack detection methods namely misuse detection and anomaly detection. Misuse detection is also called as Signature-based detection as it 98 incorporates the pattern matching schema to detect attacks. The traffic is matched against signatures in the knowledge base and if pattern matches, implies there is an attack. In anomaly detection which is exactly opposite to misuse detection, the traffic is checked for normal behavior which is called as normal profile. If there is a deviation to the normal behavior, the administrator is alerted. Intrusion detection systems offer defense to an extent for the 802.11 MAC spoofing and denial- of-service [DoS] attacks using the above mentioned attack detection mechanism. Intrusion detection sensors are effective when deployed indoors but are not feasible when deployed outdoors with the increasing number of nodes participating in the mesh network as it becomes tedious to collect data for analysis from multiple nodes to feed it to the analysis engine. Neither of the two, misuse detection nor anomaly detection is perfect as in case of misuse detection if there is a new attack, there is no signature developed yet to match it with. Hence there is an increase rate of false negatives (failed to detect the attacks). Later a signature needs to be developed for future use and it’s a time consuming process. In anomaly detection, there is no need for new signatures to be developed as there is no pattern matching done for attacks. Instead pattern matching is done for the normal behavior (normal profile). But, in this case it is difficult to finalize on the normal behavior and nail the normal profile. Even a slight deviation to the normal profile, even though not with a malicious intent is detected as attack and the administrator is alerted. A lot of investigation has to be done and hence time consuming. 99 Hence here exists a limitation on the intrusion detection system which needs to be addressed. 7.7. 802.11 MAC MANAGEMENT ATTACKS MAC spoofing is one of the major concerns as the management frames are not encrypted. The protection of management frames is not addressed within 802.11 standards. An attacker could take advantage of the spoofed frames to redirect the traffic and corrupt the ARP tables. Work on protecting the MAC management frames is required. 7.8. PHYSICAL SECURITY Wireless networks when considered for NAN, the access points are required to be placed in environments which are not trustworthy (e.g. head-end devices on poles or buildings, smart meters outside homes). Hence these devices are not in the physical and administrator control of the network operator. At the same time, a wired network at some point in time requires wired media backhaul, which exposes sensitive network connections. 7.9. DENIAL OF SERVICE ATTACKS Denial-of-Service has always been the foremost concern in wireless networks. To address this issue, we have to first come up with an effective solution to prevent MAC spoofing (discussed above). 100 7.10. KEY MANAGEMENT IN IEEE 802.15.4 Asymmetric cryptographic algorithms like RSA and Diffie-Hellman use very long variables of sufficient length to ensure security. Sensor networks have very little memory and it is not sufficient to even hold these variables, let alone performing any operations on these variables. Also sensor networks are characterized to be supplied with limited energy. Hence the life span of a node is limited which in-turn limits the life span of a usable key. This hardware and energy constraint needs to be addressed and a better efficient key management protocols and solutions need to be designed keeping the above constraints in mind. To minimize the memory constraint and ease the management overhead, network-wide shared keying method was introduced. Here all the nodes in a network use a single key to communicate with one another. Thereby minimizes the memory requirement. But the management becomes trivial, as, if a single node in a network is compromised, an adversary could use the compromised node to undermine the security guarantees of the entire network. To avoid the problem with network-wide shared keying method, pair-wise keying was introduced. Here a pair of nodes in a network uses a unique key to establish secure communication. But this comes with the management and memory overhead. As the number of nodes increases in a network, each node’s memory requirement and key management abilities needs to be questioned and upgraded. 101 A low cost solution to the above discussed keying methods was provided with trade-off between network-wide shared keying and pair-wise keying, with partial resistance to node compromise. Here a common key was used to establish secure communication between a set of nodes belonging to a group. The groups are made based on the location, network topology and other similar functions. To summarize, firstly, if the same key is used in multiple ACL entries then it is likely to reuse a nonce value (unique key used for encryption) which could break the confidentiality. For example if a user sends a message m1 with a nonce value x1 to recipient r1 and sends a message m2 with the same nonce value x1 to recipient r2, then the adversary can retrieve the message as show below. (m1 Ek(x1) ) (m2 Ek(x1)) = m1 m2 Secondly, network-wide shared key is incompatible with replay protection. For example, if user A sends 100 messages to recipient r1, then the replay counter would have been incremented from 0 to 99 at the receiver end. Now if user B sends a message to recipient r1 with a replay counter 0, then recipient r1 rejects the message from user B as its replay counter is now set to 99 and the replay counter value from user B is less than its replay counter value. There has to be some form of co-ordination between the nodes in the replay counter space. This would not be feasible when the node density increases. Work on finding a solution that would solve the problem of the ACL tables’ inability to support different keying models is required in IEEE 802.15.4. 102 Chapter 8 CONCLUSION The project focuses on the Neighborhood Area Network protocols/standards for Smart Grid, where Neighborhood Area Networks [NAN] are a type of packet switched mobile data networks, whose geographical coverage area could be anywhere from the coverage of a LAN, to MAN, to WAN. In Smart Grid, NAN has a role to play in the HOME-toHOME or HOME-to-GRID communication. Few of the requirements for NAN for Smart Grid are identified as follows: reliable, secure, power efficient, low latency, low cost, diverse path, scalable technology, ability to support bursty, asynchronous upstream traffic to name a few. In this project, a few protocols/standards like IEEE 802.11, IEEE 802.16, IEEE 802.15.4, 3G (GSM), optical fiber communication, Powerline communication were selected as candidates for NAN and were analyzed. Also, a few Ad-hoc routing protocols like Destination-Sequnced Distance Vector [DSDV] protocol, Wireless Routing Protocol [WRP], Dynamic Source Routing [DSR] were discussed. The connection oriented transport protocols like TCP, SCTP and Split-TCP, and connectionless protocols like UDP, Cyclic UDP and WDP were also analyzed for their advantages and disadvantages along with their support for security. In all of the Transport Protocols discussed, UDP is a well suited protocol over all kinds of media which enable time critical communication capabilities. For non time critical 103 applications TCP or SCTP could be considered. Amongst the Routing Protocols discussed in Chapter 4, the table-driven DSDV protocol has the best performance and it outperforms both DSR and AODV but the delay experienced by DSDV packets are greater than the delay experienced by the on-demand routing protocols. For Neighborhood Area Networks, the protocols/standards that are recommended in this project are IEEE 802.11 [Wi-Fi] and Cellular technology [GSM] as these are better than the other protocols/standards in terms of security, range of coverage, availability and ease of implementation. The research done in this project can be extended to overcome some of the issues like unpredictable latencies in RF mesh networks. It can be further extended to come up with a protocol for Powerline communications that could provide higher data rates and which will have the ability to withstand distortions and interferences from other devices. Also, come up with ways to overcome the security issues with Ad Hoc On-demand Vector Routing [AODV]. Another area that would require an extended study would be to overcome the Key Management issue with IEEE 802.15.4 standard. 104 BIBLIOGRAPHY [1] Smart Grid News, “Smart Grid 101: The Traditional Grid”, [Online]. Available: http://www.smartgridnews.com/artman/publish/Business_Smart_Grid_101_Resources/Th e-Traditional-Grid-1599.html [2] Consumer Energy Report, Smart Grid Image, [Online]. Available: http://www.consumerenergyreport.com/wp-content/uploads/2010/04/smartgrid.jpg [3] Tropos GridCom, “A Wireless Distribution Area Network for Smart Grids”, White Paper, [Online]. Available: http://www.smartgridnews.com/artman/uploads/1/distribution_automation_tropos_maybe .pdf [4] Trilliant Inc., “The Multi-Tier Smart Grid Architecture”, [Online]. Available: http://www.trilliantinc.com/solutions/multi-tier-architecture/ [5] Available: http://www.nist.gov/smartgrid/upload/InterimSmartGridRoadmapNISTRestructure.pdf [6] Wikipedia, “IEEE 802.11”, [Online]. Available: http://en.wikipedia.org/wiki/IEEE_802.11 [7] “802.11 Wireless Networks, The Definitive Guide”, Mathew Gast, ISBN 0-59610052-3, O'Reilly Publications [8] Wikipedia, “Spread Spectrum”, [Online]. Available: http://en.wikipedia.org/wiki/Spread_spectrum 105 [9] Wikipedia, “Frequency Hopping Spread Spectrum”, [Online]. Available: http://en.wikipedia.org/wiki/Frequency-hopping_spread_spectrum [10] Arcelect, “Frequency Hopping Spread Spectrum”, [Online]. Available: http://www.arcelect.com/dsss_fhss-spead_spectrum.htm [11] Wikipedia, “Orthogonal Frequency Division Multiplexing”, [Online].Available: http://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexing [12] Available: http://scissec.scis.ecu.edu.au/proceedings/2006/aism/Hasan%20%20Security%20Issues%20of%20IEEE%20802.16%20(WiMAX).pdf [13] Available: http://www.tutorialspoint.com/WiMAX/WiMAX_technology.htm [14] Available: http://wirelessman.org/docs/02/C80216-02_05.pdf [15] “Computer Networking: a top down approach featuring the Internet”, James F. Kurose, Keith W. Ross, 3rd Edition [16] Available: http://technet.microsoft.com/en-us/library/bb457091.aspx [17] Available: http://en.wikipedia.org/wiki/IEEE_802.11w-2009 [18] Available: Yan Zhang, Jun Zheng, Honglin Hu, Security in Wireless Mesh Networks, CRC Press, 2009 [19] Naveen Shastry, David Wagner, Security Considerations for IEEE 802.15.4 Networks. UC Berkley. Year of Publication – 2004. 106 [20] Ghansah, Isaac, 2009. Smart Grid Cyber Security Potential Threats, Vulnerabilities and Risks California Energy Commission, PIER Energy-Related Environmental Research Program. CEC-500-2008-027 [21] Available: http://www.nist.gov/public_affairs/releases/smartgrid_interoperability.pdf [22] Available: http://industrial-embedded.com/connecting-smart-the-smart-grid [23] Available: http://osgug.ucaiug.org/utilisec/amisec/Meetings/20081119%20%20Telecon/ansic1222-CLEAN-20081116.doc [24] Available: http://www.radioelectronics.com/info/cellulartelecomms/gsm_technical/gsm_introduction.php [25] Available: http://www.netlab.tkk.fi/opetus/s38153/k2003/Lectures/g42GSM_security.pdf [26] Available: http://en.wikipedia.org/wiki/Power_line_communication [27] Available: http://en.wikipedia.org/wiki/Fiber-optic_communication [28] Available: http://www.nicta.com.au/research/project_list/completed_projects/smart_applications_for _emergencies/networks/mesh [29] A. Geriks, J. Purcell, A Survey of Wireless Mesh Networking Security Technology and Threats, SANS Institute, September 2006. 107 [30] Wikipedia, “Wireless Datagram Protocol”, [Online]. Available: http://wiki.wireshark.org/Wireless_Datagram_Protocol [31] RFC2960, “Stream Control Transmission Protocol”, [Online]. Available: http://www.ietf.org/rfc/rfc2960.txt [32] Available: http://www.eecs.harvard.edu/~mdw/course/cs263/papers/royerieeepc99.pdf [33] Office of Electricity Delivery and Energy Reliability, “The Smart Grid, An Introduction”, US Department of Energy. Available: http://www.oe.energy.gov/DocumentsandMedia/DOE_SG_Book_Single_Pages.pdf [34] Available: http://www.sensorsmag.com/files/sensor/nodes/2008/1526/Figure2.jpg [online] [35] Available: http://www.gsm-security.net/faq/gsm-a3-a8-comp128-brokensecurity.shtml [Online] [36] Available: http://osa.inria.fr/wiki/uploads/Developments/infrastructure.jpg [Image] [37] Comparative Analysis of GSM and CDMA technologies. [Online] Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.11.3538&rep=rep1&type=pdf
© Copyright 2026 Paperzz