Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Table 4

Summary of vulnerabilities, impact, and solutions.

Vulnerability Impact Solutions

Physical layer jammingSevere DoS in a part of the networkInstall filters that block the signal from the smart meter to the household.

CSMA/CA jammingSevere DoS in a part of the networkInstall filters that block the signal from the smart meter to the household.

Promotion Needed FloodingSaturates the traffic
Complicates the logical topology
Can result in DoS
Limit PNPDU bursts
Base node implementing whitelisting
Not accepting promotions triggered by PNPDUs from registered nodes
NIDS near the base node

Node registration overflowCan cause DoS in some nodesUse of encryption (Security Profile 1)
Base node implementing whitelisting
Base node implementing random LNID assignation after overflow

Node registration spoofingTargeted DoS Use of encryption (Security Profile 1)

LSID overflowCan cause DoS in several nodes Use of encryption (Security Profile 1)
Base node implementing random LSID assignation after overflow
NIDS near the base node

Base Node spoofingCan cause DoS in several nodes
Privacy issues
NIDS distributed along the network

SniffingPrivacy issues Use of encryption (Security Profile 1)

Demotion/unregistration/disconnection spoofingTargeted DoS (disconnection/unregistration)
Can cause DoS in several nodes (demotion)
Use of encryption (Security Profile 1)
NIDS near the base node

Security CRCMay cause DoSUse of encryption hardware

Traffic replayPrivacy issues
Take control of the smart meters
Use of encryption (Security Profile 1) drastically increases the difficulty of this attack