Abstract
We present a new architecture for a secure smart metering system. Our architecture is based on a special purpose hardware security module that encapsulates all security critical operations and provides the main functionality of the system in an active role. This new approach enables secure meter data handling within the smart grid. As a result, our architecture preserves the privacy of sensitive consumer data and the integrity of meter data. Additionally, our proposed solution enhances the security of components critical to the operation of the power grid.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AMI-SEC Task Force: AMI System Security Requirements v1.01 (December 2008)
Federal Energy Regulatory Commission: Assessment of Demand Response and Advanced Metering (December 2008)
Carpenter, M., Goodspeed, T., Singletary, B., Skoudis, E., Wright, J.: Advanced Metering Infrastructure Attack Methodology v1.0 (January 2009)
Ericsson, G.: Cyber security and power system communication – essential parts of a smart grid infrastructure. IEEE Trans. Power Delivery 25(3) (July 2010)
McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security and Privacy 7(3) (2009)
McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 107–116. ACM (2010)
McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy Theft in the Advanced Metering Infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 176–187. Springer, Heidelberg (2010)
LeMay, M., Gross, G., Gunter, C., Garg, S.: Unified architecture for large-scale attested metering. In: Hawaiian Int. Conf. System Sciences (January 2007)
Jawurek, M., Johns, M., Kerschbaum, F.: Plug-In Privacy for Smart Metering Billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)
BSI: Protection profile for the gateway of a smart metering system v01.01.01 (final draft) (August 2011)
Hu, W., Corke, P., Shih, W.C., Overs, L.: secFleck: A Public Key Technology Platform for Wireless Sensor Networks. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 296–311. Springer, Heidelberg (2009)
Krauß, C., Stumpf, F., Eckert, C.: Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)
McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy 7(3), 75–77 (2009)
Lawson, N.: Side-channel attacks on cryptographic software. IEEE Security and Privacy 7, 65–68 (2009)
Hsueh, M., Tsai, T., Iyer, R.: Fault injection techniques and tools. IEEE Computer 30(4), 75–82 (1997)
Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: Attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, vol. 2, p. 1119 (2000)
Shacham, H., Buchanan, E., Roemer, R., Savage, S.: Return-oriented programming: Exploits without code injection. In: Black Hat USA Briefings (August 2008)
beagleboard.org: BeagleBoard System Reference Manual Rev C4 (December 2009)
Sun Microsystems: The Java Card 3 Platform (August 2008)
Sun Microsystems: Java Card Platform Specification, Version 3.0, Connected Edition (March 2008)
Samsung Electronics: Security Target Lite of S3FS9CI 32-bit RISC Microcontroller For S-SIM, Version 1.0 (June 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Angermeier, D., Böttinger, K., Ibing, A., Schuster, D., Stumpf, F., Wacker, D. (2012). A Secure Architecture for Smart Meter Systems. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-35362-8_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35361-1
Online ISBN: 978-3-642-35362-8
eBook Packages: Computer ScienceComputer Science (R0)