Powerless Security A Security Analysis of In-Home Power Line Communications Based on HomePlug AV2

被引:0
|
作者
Hoffmann, Stefan [1 ]
Mueller, Jens [2 ]
Schwenk, Joerg [2 ]
Bumiller, Gerd [1 ]
机构
[1] Univ Appl Sci Ruhr West, Bottrop, Germany
[2] Ruhr Univ Bochum, Bochum, Germany
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II | 2020年 / 12147卷
关键词
Power line communications; PLC; Security; HomePlug;
D O I
10.1007/978-3-030-57878-7_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Power line communication (PLC) allows home users and industries to transfer data over power cables. Protection of transmitted data is crucial because signals are not limited to "one's own four walls". We provide a detailed and structured security analysis of the currently most widely used in-Home PLC standard, namely the Broadband-PLC specification HomePlug AV2 (part of IEEE 1901), and present a design weakness in the pairing process as well as a new offline dictionary attack that can be used to compute the main network key efficiently. We evaluated our attacks on 13 widely used PLC devices and found all of them be vulnerable. We provide different countermeasures and discuss their advantages and disadvantages. We responsibly disclosed the vulnerabilities and are currently supporting the vendors in fixing these issues.
引用
收藏
页码:213 / 232
页数:20
相关论文
共 50 条
  • [31] Security of Analysis Mutual Authentication And Key Exchange for Low Power Wireless Communications
    Liu, Chenglian
    Chen, Sisheng
    Sun, Shuliang
    2012 INTERNATIONAL CONFERENCE ON FUTURE ELECTRICAL POWER AND ENERGY SYSTEM, PT A, 2012, 17 : 644 - 649
  • [32] Assessment of Load Modeling in Power System Security Analysis Based on Static Security Regions
    Almeida, Felipe C. B.
    Passos Filho, Joao A.
    Pereira, Jose L. R.
    Henriques, Ricardo M.
    Marcato, Andre L. M.
    JOURNAL OF CONTROL AUTOMATION AND ELECTRICAL SYSTEMS, 2013, 24 (1-2) : 148 - 161
  • [33] Support Vector Machines for on-line Security Analysis of Power Systems
    Cortes-Carmona, M.
    Jimenez-Estevez, G.
    Guevara-Cedeno, J.
    2008 IEEE/PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION: LATIN AMERICA, VOLS 1 AND 2, 2008, : 506 - 511
  • [34] Security of Power Line Monitoring System Based on Wireless Sensor Network
    Yang, Xiaomei
    Zhang, Shuibao
    Li, Fengjie
    Xu, Shouzhi
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [35] Risk theory based on-line power system security assessment
    Bi, Tianshu
    Qin, Xiaohui
    He, Renmu
    Yang, Qixun
    2008 THIRD INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES, VOLS 1-6, 2008, : 704 - 708
  • [36] Analysis of Security Overhead in Broadcast V2V Communications
    Muhammad, Mujahid
    Kearney, Paul
    Aneiba, Adel
    Kunz, Andreas
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 251 - 263
  • [37] Study of Relay Deployment in Home Area Network Based on Power Line Communications
    Fu, Keyuan
    Zheng, Tao
    Zhang, Baohui
    Bai, Li
    Bo, Zhiqian
    2014 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2014,
  • [38] The design of power security system in smart home based on the stream data mining
    Ma, Shun
    Fang, Shenglong
    Yuan, Dingrong
    Wang, Xiangchao
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8933 : 716 - 724
  • [39] The Design of Power Security System in Smart Home Based on the Stream Data Mining
    Ma, Shun
    Fang, Shenglong
    Yuan, Dingrong
    Wang, Xiangchao
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2014, 2014, 8933 : 716 - 724
  • [40] IMPROVEMENTS ON THE LINE OUTAGE DISTRIBUTION FACTOR FOR POWER-SYSTEM SECURITY ANALYSIS
    CHANG, YC
    YANG, WT
    LIU, CC
    ELECTRIC POWER SYSTEMS RESEARCH, 1993, 26 (03) : 231 - 236