Applying a Security Kernel Framework to Smart Meter Gateways

Chapter

Abstract

New challenges for the electrical grid need complex IT systems and networking of most of all entities intoday’s power grid. Smart grids are a heavily discussed topic in the European Union and many other countries. Smart Meter Systems are going to be deployed worldwide. However, due to their complexity and interconnectivity, they have to deal with strict security and privacy requirements. As a result, German regulatory bodies decided a proactive approach and developed a protection profile for Common Criteria evaluation, i.e., specifying explicitly security requirements for gateway components.

Keywords

Smart Card Smart Grid Security Requirement Trusted Platform Module Wide Area Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. [Alpe11]
    Alperovitch, Dmitri: Revealed: Operation Shady RAT, McAfee Labs, 2011. Available online at: http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf
  2. [ASSS + 06]
    A. Alkassar, M. Scheibel, C. Stüble, A.-R. Sadeghi, M. Winandy: “Security Architecture for Device Encryption and VPN”, Proceedings of Information Security Solutions Europe (ISSE 2006).Google Scholar
  3. [BSI12]
    Bundesamt für Sicherheit in der Informationstechnik (BSI): Protection Profile for the Gateway of a Smart Metering System, v 1.1.1 (final draft), 2012, URL: https://www.bsi.bund.de/Shared-Docs/Downloads/DE/BSI/SmartMeter/PPSmartMeter.pdf?__blob=publicationFile
  4. Common Criteria for Information Technology Security Evaluation (CC), Version 3.1, Release 3, 2009. http://www.commoncriteriaportal.org/cc/
  5. L. Catuogno, H. Löhr, M. Manulis, A.-R. Sadeghi, C. Stüble, M. Winandy: „Trusted Virtual Domains: Color Your Network“, Datenschutz und Datensicherheit (DuD), 2010, pp. 289-298.Google Scholar
  6. [EMSCB]
    European Multilaterally Secure Computing Base, http://www.emscb.de
  7. [GJPS + 05]
    J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, R. Cáceres: “Trusted Virtual Domains: Toward Secure Distributed Services”, Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep’05), 2005.Google Scholar
  8. [KKSW + 08]
    H. Kurth, G. Krummeck, C. Stüble, M. Weber, M. Winandy: HASK-PP: Protection Profile for a High Assurance Security Kernel, 2008, http://www.sirrix.com
  9. [OpenTC]
    Open Trusted Computing, http://www.opentc.net/
  10. [Sirrix12]
    Sirrix AG security technologies. TURAYA.SecurityKernel. 2012 http://www.sirrix.com/content/pages/securitykernel_en.htm
  11. [SSFG10]
    M. Selhorst, C. Stüble, F. Feldmann, U. Gnaida: „Towards a trusted mobile desktop“, Trust and Trustworthy Computing (TRUST 2010), Volume 6101 of LNCS, Springer, 2010, pp. 78–94.Google Scholar
  12. [TPM11]
    Trusted Computing Group (TCG), TPM Main Specification, Version 1.2, Revision 116, March 2011.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden 2012

Authors and Affiliations

  1. 1.Sirrix AG security technologies Im StadtwaldSaarbrückenGermany
  2. 2.Horst Görtz Institute for IT-SecurityRuhr-University BochumBochumGermany

Personalised recommendations