Abstract
Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns. Critical energy information flows through various interconnected networks like home network, public network, and utility network. Hence, it needs to be encrypted. Not only is it critical to encrypt the flow of information between the utility and devices on the grid, but it is also important to guarantee the integrity and the authenticity of each communication. Today’s cryptography guarantees the security of various data, so the way electronic transactions are processed completely meets demands for confidentiality, integrity, and identity (authenticity). However, the encrypted data are not protected effectively until the computer systems on which these electronic transactions get processed are also fully secured. Securing these computer systems clearly includes caring for the security of cryptographic keys being used to encrypt and sign respectively decrypt and verify transaction data. A solution to achieve this has been developed using Hardware Security Modules (HSM). This paper exposes some of the security features, requirements and best practices why utility industries should consider acquiring an HSM solution to better secure the smart grid.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Literature
Federal Information Processing Standard 140-2 “Security Requirements for Cryptographic Modules”, National Institute of Standards and Technology
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten: Lest We Remember: Cold Boot Attacks on Encryption Keys, 2008, published in Proc. 2008 USENIX Security Symposium
North American Electric Reliability Corporation, Reliability Standards, Critical Infrastructure Protection,
netbeheer nederland, Privacy and Security of the Advanced Metering Infrastructure, Version 1.50, 2010
NIST Special Publication 800-90 “Recommendation for Random Number Generation Using Deterministic Random Bit Generators”, National Institute of Standards and Technology
Protection Profile for the Gateway of a Smart Metering System, Bundesamt für Sicherheit in der Informationstechnik, Version 01.01.01 Final Draft, 2011
W. Schindler, W. Killmann: A proposal for Functionality classes for random number generators, Version 2.0, 2011
Technische Richtlinie BSI TR-03109 Smart Energy, Bundesamt für Sicherheit in der Informationstechnik
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Bong, D., Philipp, A. (2012). Securing the Smart Grid with Hardware Security Modules. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_13
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)