A Security Standard for AMI Smart Meters

نویسنده

  • Darren Highfill
چکیده

There is a growing interest in ‘Smart Grid’ technologies in both industry and academic circles. Few attempts have been made to develop a written specification consummated with standards agreed upon by members of both coteries, due to lack of government support. Utilities in the state of California are obligated, by state legislature, to create a more: efficient, reliable, and intelligent electric power system. This initiative along with Florida Power & Lighting’s ‘Smart Grid’ pilot program has created a sense of exigency within the industry regarding smart grid technologies and standardizations. Their accomplishments are beginning to shape the policies and standards with marginal input from academic societies, ushering in a very lopsided, and business acclimatized set of standards. We will present and analyze, a SCE ‘Smart Grid’ use case, in which the utilities back office applications interact with the customer’s meter, and provide technical recommendations for system security improvements.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Key Management Scheme for Ami in Smart Grid

The smart grid has been introduced as the next generation power grid. Advanced Metering Infrastructure (AMI) is one of the key components in this grid. It provides bidirectional communication between consumers and management entities in the utility side. This bidirectional nature communication flow has made AMI vulnerable to various cyber attacks. So, cyber security has become an important conc...

متن کامل

Advanced Metering Infrastructure Security Issues and its Solution: A Review

Advanced metering infrastructure (AMI) is the core component in smart grid. Moreover, two-way communication between the user and the power utility is realized through AMI. Composition of AMI is described. AMI security requirements are illustrated. The threats on the smart meters, communications network, and data collector are analyzed, respectively. Passive and active defenses are investigated....

متن کامل

PUF-based solutions for secure communications in Advanced Metering Infrastructure (AMI)

In this paper, by considering the constraints of Advanced Metering Infrastructure (AMI) systems, we propose an authenticated key exchange protocol and an authenticated message broadcasting protocol. The proposed protocols are based on two well-known protocols, Okamoto and Schnorr, and inherit their security features. For providing the security of the system against physical attacks, we utilize ...

متن کامل

Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining

Advanced metering infrastructure (AMI) is an imperative component of the smart grid, as it is responsible for collecting, measuring, analyzing energy usage data, and transmitting these data to the data concentrator and then to a central system in the utility side. Therefore, the security of AMI is one of the most demanding issues in the smart grid implementation. In this paper, we propose an in...

متن کامل

A New Framework for Increasing the Sustainability of Infrastructure Measurement of Smart Grid

Advanced Metering Infrastructure (AMI) is one of the most significant applications of the Smart Grid. It is used to measure, collect, and analyze data on power consumption.  In the AMI network, the smart meters traffics are aggregated in the intermediate aggregators and forwarded to the Meter Data Management System (MDMS). The infrastructure used in this network should be reliable, real-time an...

متن کامل

Efficient and fault-diagnosable authentication architecture for AMI in smart grid

The recently emerging advanced metering infrastructure (AMI) is envisioned to be one of the most prominent features of smart grid. Security, especially authentication, is crucial for the success of large-scale AMI deployment. Unfortunately, AMI’s natural requirements—efficiency, scalability, fault diagnoses, and reliability—cannot be fully satisfied by existing authentication schemes. To valida...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008