Skip to main content

A Secure Architecture for Smart Meter Systems

  • Conference paper
Cyberspace Safety and Security (CSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7672))

Included in the following conference series:

Abstract

We present a new architecture for a secure smart metering system. Our architecture is based on a special purpose hardware security module that encapsulates all security critical operations and provides the main functionality of the system in an active role. This new approach enables secure meter data handling within the smart grid. As a result, our architecture preserves the privacy of sensitive consumer data and the integrity of meter data. Additionally, our proposed solution enhances the security of components critical to the operation of the power grid.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AMI-SEC Task Force: AMI System Security Requirements v1.01 (December 2008)

    Google Scholar 

  2. Federal Energy Regulatory Commission: Assessment of Demand Response and Advanced Metering (December 2008)

    Google Scholar 

  3. Carpenter, M., Goodspeed, T., Singletary, B., Skoudis, E., Wright, J.: Advanced Metering Infrastructure Attack Methodology v1.0 (January 2009)

    Google Scholar 

  4. Ericsson, G.: Cyber security and power system communication – essential parts of a smart grid infrastructure. IEEE Trans. Power Delivery 25(3) (July 2010)

    Google Scholar 

  5. McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security and Privacy 7(3) (2009)

    Google Scholar 

  6. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 107–116. ACM (2010)

    Google Scholar 

  7. McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy Theft in the Advanced Metering Infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 176–187. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. LeMay, M., Gross, G., Gunter, C., Garg, S.: Unified architecture for large-scale attested metering. In: Hawaiian Int. Conf. System Sciences (January 2007)

    Google Scholar 

  9. Jawurek, M., Johns, M., Kerschbaum, F.: Plug-In Privacy for Smart Metering Billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. BSI: Protection profile for the gateway of a smart metering system v01.01.01 (final draft) (August 2011)

    Google Scholar 

  11. Hu, W., Corke, P., Shih, W.C., Overs, L.: secFleck: A Public Key Technology Platform for Wireless Sensor Networks. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 296–311. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Krauß, C., Stumpf, F., Eckert, C.: Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy 7(3), 75–77 (2009)

    Article  Google Scholar 

  14. Lawson, N.: Side-channel attacks on cryptographic software. IEEE Security and Privacy 7, 65–68 (2009)

    Article  Google Scholar 

  15. Hsueh, M., Tsai, T., Iyer, R.: Fault injection techniques and tools. IEEE Computer 30(4), 75–82 (1997)

    Article  Google Scholar 

  16. Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: Attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, vol. 2, p. 1119 (2000)

    Google Scholar 

  17. Shacham, H., Buchanan, E., Roemer, R., Savage, S.: Return-oriented programming: Exploits without code injection. In: Black Hat USA Briefings (August 2008)

    Google Scholar 

  18. beagleboard.org: BeagleBoard System Reference Manual Rev C4 (December 2009)

    Google Scholar 

  19. Sun Microsystems: The Java Card 3 Platform (August 2008)

    Google Scholar 

  20. Sun Microsystems: Java Card Platform Specification, Version 3.0, Connected Edition (March 2008)

    Google Scholar 

  21. Samsung Electronics: Security Target Lite of S3FS9CI 32-bit RISC Microcontroller For S-SIM, Version 1.0 (June 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Angermeier, D., Böttinger, K., Ibing, A., Schuster, D., Stumpf, F., Wacker, D. (2012). A Secure Architecture for Smart Meter Systems. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35362-8_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35361-1

  • Online ISBN: 978-3-642-35362-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics