Featured Research

from universities, journals, and other organizations

Is your utility meter getting personal?

Date:
October 31, 2012
Source:
University of South Carolina
Summary:
As of 2010, more than a third of all utility meters in the United States used wireless automatic meter reading (AMR) technology -- 47 million in all. They make it a lot easier for the utility company to gather data on electricity, natural gas and water usage. But as a University of South Carolina research team has shown, it's possible for their unencrypted broadcasts to be intercepted, giving a sophisticated eavesdropper a window into household activities.

As of 2010, more than a third of all utility meters in the United States used wireless automatic meter reading (AMR) technology -- 47 million in all. They make it a lot easier for the utility company to gather data on electricity, natural gas and water usage. But as a University of South Carolina research team has shown, it's possible for their unencrypted broadcasts to be intercepted, giving a sophisticated eavesdropper a window into household activities.

Lead researcher Wenyuan Xu, a professor in USC's College of Engineering and Computing, says that much of the focus in the research security community right now is on the next generation of devices, the so-called "smart" meters. Utilities hope in the future they will be able to use these smart meters to match electricity flow to individual houses with overall demand, enabling much more efficient allocation of resources.

"There's been a lot of discussion about smart meters and whether they're secure or not," said Xu. "But smart meters are not yet widespread. So we wanted to look at the wireless readers common now. Are they secure? Will they leak private information?"

Wireless meters greatly reduce the need for human operators. A single truck can drive through a neighborhood and collect usage information on hundreds of dwellings that previously required a reader to walk to each meter and record data by hand.

Xu and her team reported at October's Association for Computing Machinery (ACM) conference on Computer and Communications Security that they found neither security nor privacy in the representative AMR systems they tested. AMR systems use proprietary devices and communications protocols, and Xu's team was able to reverse-engineer the transmissions to obtain access to the usage data.

Once they understood how to read the data, they conducted an eavesdropping experiment in a local apartment complex. Using a modestly priced antenna and laptop located inside one of her graduate student's apartment, they were able to detect dozens of nearby electricity meters. By adding an inexpensive amplifier to the system, they were able to gather electrical data from every apartment in the complex -- hundreds of units up to 500 yards away.

"We were able to detect even further than we expected," said Xu. "The complex had 408 units, but we were able to see 485, so we were seeing beyond the complex itself."

The data being transmitted had the potential to be matched to the individual dwellings because the transmitted packets contained an identification number that was stamped on the meter itself.

The team's analysis showed that, beyond raw usage data, a range of information could be deduced from analyzing the meter's activity, particularly when it came to electricity. "Most electrical meters broadcast data every 30 seconds," said Xu. "The gas and water meters, because they run on batteries, only transmit data after a wake-up call."

The detailed electricity data gave information about activities within the household -- when the inhabitants got up, went to work and got home, for example. The team was able to deduce that 27 of the apartments within the complex were unoccupied.

That sort of information could be harmful in the wrong hands. Xu is careful not to reveal too much detail in her publications, she said. "We don't want the bad guys to know too much. It's about letting the right people know what needs to be better protected."

The good news is that reliance on what's often called "security through obscurity" appears to be working. Obtaining personal household data through wireless meters is difficult. What Xu and her team hope is that drawing attention to the potential for problems might help the industry realize the necessity of designing systems with security in mind.

"The meter data should have been encrypted before transmission and authenticated by readers in the drive-by trucks to prevent the potential misuses that we've discovered," said Xu.


Story Source:

The above story is based on materials provided by University of South Carolina. Note: Materials may be edited for content and length.


Cite This Page:

University of South Carolina. "Is your utility meter getting personal?." ScienceDaily. ScienceDaily, 31 October 2012. <www.sciencedaily.com/releases/2012/10/121031110710.htm>.
University of South Carolina. (2012, October 31). Is your utility meter getting personal?. ScienceDaily. Retrieved August 27, 2014 from www.sciencedaily.com/releases/2012/10/121031110710.htm
University of South Carolina. "Is your utility meter getting personal?." ScienceDaily. www.sciencedaily.com/releases/2012/10/121031110710.htm (accessed August 27, 2014).

Share This




More Computers & Math News

Wednesday, August 27, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

ICREACH: NSA Built A Google Of Americans' Info

ICREACH: NSA Built A Google Of Americans' Info

Newsy (Aug. 26, 2014) The Intercept published an article Monday profiling what the online publication called NSA's very own Google of personal data. Video provided by Newsy
Powered by NewsLook.com
Australian Airlines Relax Phone Ban Too

Australian Airlines Relax Phone Ban Too

Reuters - Business Video Online (Aug. 26, 2014) Qantas and Virgin say passengers can use their smartphones and tablets throughout flights after a regulator relaxed a ban on electronic devices during take-off and landing. As Hayley Platt reports the move comes as the two domestic rivals are expected to post annual net losses later this week. Video provided by Reuters
Powered by NewsLook.com
Ralph Lauren Gets Into Wearables Game With 'Polo Tech'

Ralph Lauren Gets Into Wearables Game With 'Polo Tech'

Newsy (Aug. 25, 2014) Ralph Lauren, partnering with OMsignal, is testing out new biometric-reading shirts called "Polo Tech" on ball boys at the U.S. Open. Video provided by Newsy
Powered by NewsLook.com
What Makes Twitch Worth $1 Billion To Amazon?

What Makes Twitch Worth $1 Billion To Amazon?

Newsy (Aug. 25, 2014) Amazon is reportedly about to purchase Twitch, a streaming service for video game players, but why? Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

    Environment News

    Technology News



    Save/Print:
    Share:

    Free Subscriptions


    Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

    Get Social & Mobile


    Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

    Have Feedback?


    Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
    Mobile: iPhone Android Web
    Follow: Facebook Twitter Google+
    Subscribe: RSS Feeds Email Newsletters
    Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins