Security Threats in Advanced Metering.dvi

نویسندگان

  • He-Ming Ruan
  • Yu-Sheng Yang
  • I-An Fan
  • Christine Peijinn Chai
  • Chun-Ying Huang
  • Chin-Laung Lei
چکیده

Advanced metering infrastructure (AMI) is drawing more and more attention due to various benefits which it brings. Compared to traditional power grid systems or advanced meter reading (AMR) systems, AMI systems possess capabilities to provide improved management and predictability of power utilization, to monitor and detect fault occurrences, and to conserve energy. However, behind the various benefits brought by AMI, there still exist plenty of security threats. The open network used by AMIs is an extremely convenient interface for malicious attackers or network hackers to damage the AMI systems; on the other hand, the immature hardware design for AMI devices might cause physical breach points.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards an Operational Semantic Theory of Cyber Defense Against Advanced Persistent Threats

This paper presents current work on developing an operational semantic theory of cyber defense against advanced persistent threats (APTs), which is grounded in cyber threat analytics, science of evidence, knowledge engineering, and machine learning. After introducing advanced persistent threats, it overviews a systematic APT detection framework and the corresponding APT detection models, the fo...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Pakistan Extremist Groups’ Security Threats against Islamic Revolution

Abstract In the wake of the 1979 Islamic Revolution in Iran and the ensuing dominance of political Islam discourse and its impact on Pakistani society, the ground was prepared for the spread of Wahhabism and anti-Shiism in that country due to the failure of the Islamabad government to manage the reactive conduct of extremist Salafist groups as well as its engagement in internal dis...

متن کامل

A Review and Analysis of the United States' Aggressive Intentions and Security Threats following the Islamic Revolution of Iran

Having reviewed and evaluated the aggressive intentions security threats in United States' behavior against the Islamic Republic of Iran, this article puts the greatest emphasis on aggressive intention especially "national security doctrine" and mentioning some of its characteristics so by categorizing different approaches toward national security clarify some of vague aspects of this concept. ...

متن کامل

A Threat Table Based Approach to Telemedicine Security

Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper presents a high level analysis of a telemedicine applicati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011