Skip to main content

Securing the Smart Grid with Hardware Security Modules

  • Chapter
  • First Online:
ISSE 2012 Securing Electronic Business Processes

Abstract

Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns. Critical energy information flows through various interconnected networks like home network, public network, and utility network. Hence, it needs to be encrypted. Not only is it critical to encrypt the flow of information between the utility and devices on the grid, but it is also important to guarantee the integrity and the authenticity of each communication. Today’s cryptography guarantees the security of various data, so the way electronic transactions are processed completely meets demands for confidentiality, integrity, and identity (authenticity). However, the encrypted data are not protected effectively until the computer systems on which these electronic transactions get processed are also fully secured. Securing these computer systems clearly includes caring for the security of cryptographic keys being used to encrypt and sign respectively decrypt and verify transaction data. A solution to achieve this has been developed using Hardware Security Modules (HSM). This paper exposes some of the security features, requirements and best practices why utility industries should consider acquiring an HSM solution to better secure the smart grid.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. Federal Information Processing Standard 140-2 “Security Requirements for Cryptographic Modules”, National Institute of Standards and Technology

    Google Scholar 

  2. J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten: Lest We Remember: Cold Boot Attacks on Encryption Keys, 2008, published in Proc. 2008 USENIX Security Symposium

    Google Scholar 

  3. North American Electric Reliability Corporation, Reliability Standards, Critical Infrastructure Protection,

    Google Scholar 

  4. netbeheer nederland, Privacy and Security of the Advanced Metering Infrastructure, Version 1.50, 2010

    Google Scholar 

  5. NIST Special Publication 800-90 “Recommendation for Random Number Generation Using Deterministic Random Bit Generators”, National Institute of Standards and Technology

    Google Scholar 

  6. Protection Profile for the Gateway of a Smart Metering System, Bundesamt für Sicherheit in der Informationstechnik, Version 01.01.01 Final Draft, 2011

    Google Scholar 

  7. W. Schindler, W. Killmann: A proposal for Functionality classes for random number generators, Version 2.0, 2011

    Google Scholar 

  8. Technische Richtlinie BSI TR-03109 Smart Energy, Bundesamt für Sicherheit in der Informationstechnik

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dieter Bong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Bong, D., Philipp, A. (2012). Securing the Smart Grid with Hardware Security Modules. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_13

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics