TY - GEN
T1 - Hardware trojan based security issues in home area network
T2 - 61st IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2018
AU - Mohammed, Hawzhin
AU - Howell, Jimmy
AU - Hasan, Syed Rafay
AU - Guo, Nan
AU - Khalid, Faiq
AU - Elkeelany, Omar
N1 - Publisher Copyright:
© 2018 IEEE
PY - 2018/7/2
Y1 - 2018/7/2
N2 - Advanced Metering Infrastructure (AMI) is the main player in todays Smart Grid, and Home Area Network (HAN) is an important subsystem in AMI. HAN connects the smart home appliances (SHA) inside the home to the smart meter (SM), which is connected to the power utility company. In the last decade, hardware Trojans (HT), have been extensively studied in both academia and industry. Consequently, the vulnerability of integrated circuits (ICs) against HTs leads to the potential security threat to any system that contains ICs, and HAN is no exception. However, to the best of authors knowledge, the potential effect of HTs on HAN has not been studied in the literature so far. In this paper, we are investigating HT in HAN network. In the process, we developed a testbed which can be scalable up to 127 nodes using I2C interface to control and implement any kind of required network behavior. We introduced three possible scenarios of HTs in this HAN network testbed. These scenarios illustrate the manifestation of HTs in the HAN that leads to network performance degradation.
AB - Advanced Metering Infrastructure (AMI) is the main player in todays Smart Grid, and Home Area Network (HAN) is an important subsystem in AMI. HAN connects the smart home appliances (SHA) inside the home to the smart meter (SM), which is connected to the power utility company. In the last decade, hardware Trojans (HT), have been extensively studied in both academia and industry. Consequently, the vulnerability of integrated circuits (ICs) against HTs leads to the potential security threat to any system that contains ICs, and HAN is no exception. However, to the best of authors knowledge, the potential effect of HTs on HAN has not been studied in the literature so far. In this paper, we are investigating HT in HAN network. In the process, we developed a testbed which can be scalable up to 127 nodes using I2C interface to control and implement any kind of required network behavior. We introduced three possible scenarios of HTs in this HAN network testbed. These scenarios illustrate the manifestation of HTs in the HAN that leads to network performance degradation.
UR - http://www.scopus.com/inward/record.url?scp=85062224202&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85062224202&partnerID=8YFLogxK
U2 - 10.1109/MWSCAS.2018.8624048
DO - 10.1109/MWSCAS.2018.8624048
M3 - Conference contribution
AN - SCOPUS:85062224202
T3 - Midwest Symposium on Circuits and Systems
SP - 972
EP - 975
BT - 2018 IEEE 61st International Midwest Symposium on Circuits and Systems, MWSCAS 2018
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 5 August 2018 through 8 August 2018
ER -