ISSE 2012 Securing Electronic Business Processes pp 252-259 | Cite as
Applying a Security Kernel Framework to Smart Meter Gateways
Chapter
First Online:
Abstract
New challenges for the electrical grid need complex IT systems and networking of most of all entities intoday’s power grid. Smart grids are a heavily discussed topic in the European Union and many other countries. Smart Meter Systems are going to be deployed worldwide. However, due to their complexity and interconnectivity, they have to deal with strict security and privacy requirements. As a result, German regulatory bodies decided a proactive approach and developed a protection profile for Common Criteria evaluation, i.e., specifying explicitly security requirements for gateway components.
Keywords
Smart Card Smart Grid Security Requirement Trusted Platform Module Wide Area Network
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
Literatur
- [Alpe11]Alperovitch, Dmitri: Revealed: Operation Shady RAT, McAfee Labs, 2011. Available online at: http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf
- [ASSS + 06]A. Alkassar, M. Scheibel, C. Stüble, A.-R. Sadeghi, M. Winandy: “Security Architecture for Device Encryption and VPN”, Proceedings of Information Security Solutions Europe (ISSE 2006).Google Scholar
- [BSI12]Bundesamt für Sicherheit in der Informationstechnik (BSI): Protection Profile for the Gateway of a Smart Metering System, v 1.1.1 (final draft), 2012, URL: https://www.bsi.bund.de/Shared-Docs/Downloads/DE/BSI/SmartMeter/PPSmartMeter.pdf?__blob=publicationFile
- Common Criteria for Information Technology Security Evaluation (CC), Version 3.1, Release 3, 2009. http://www.commoncriteriaportal.org/cc/
- L. Catuogno, H. Löhr, M. Manulis, A.-R. Sadeghi, C. Stüble, M. Winandy: „Trusted Virtual Domains: Color Your Network“, Datenschutz und Datensicherheit (DuD), 2010, pp. 289-298.Google Scholar
- [EMSCB]European Multilaterally Secure Computing Base, http://www.emscb.de
- [GJPS + 05]J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, R. Cáceres: “Trusted Virtual Domains: Toward Secure Distributed Services”, Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep’05), 2005.Google Scholar
- [KKSW + 08]H. Kurth, G. Krummeck, C. Stüble, M. Weber, M. Winandy: HASK-PP: Protection Profile for a High Assurance Security Kernel, 2008, http://www.sirrix.com
- [OpenTC]Open Trusted Computing, http://www.opentc.net/
- [Sirrix12]Sirrix AG security technologies. TURAYA.SecurityKernel. 2012 http://www.sirrix.com/content/pages/securitykernel_en.htm
- [SSFG10]M. Selhorst, C. Stüble, F. Feldmann, U. Gnaida: „Towards a trusted mobile desktop“, Trust and Trustworthy Computing (TRUST 2010), Volume 6101 of LNCS, Springer, 2010, pp. 78–94.Google Scholar
- [TPM11]Trusted Computing Group (TCG), TPM Main Specification, Version 1.2, Revision 116, March 2011.Google Scholar
Copyright information
© Springer Fachmedien Wiesbaden 2012