Security Architecture of Smart Metering Systems

Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 341)


The main goals of smart metering are the reduction of costs, energy and CO2 by the provision of actual metering information to the providers and the customer. They allow for flexible possibilities to influence the customers’ energy consumption behavior and to adapt dynamically the power generation and distribution to the requested energy by smart grids. Metering devices are under control of governmental organizations, which are responsible for the permanent correct delivery of metering data. The governmental organizations accept online metering, administration and even software download of regulated software only, if strong, lawful security requirements are fulfilled. This paper describes such a security system. It considers not only the security mechanisms of the metering devices, but also of the complete system hierarchy, which is planned for the communication system of smart metering. It supports also new use cases, which are caused by the liberalization of the energy and metering services markets.


Smart Metering Smart Grids Liberalization of Energy and Metering Market Power Line Communication Security Requirements Security Protocols Public Key Infrastructure Asymmetric and Symmetric Cryptography 


  1. 1.
    Hick, S., Ruland, C.: Security Aspects for Secure Download of Regulated Software. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.) TrustBus 2007. LNCS, vol. 4657, pp. 219–227. Springer, Heidelberg (2007)Google Scholar
  2. 2.
    International Organization of Legal Metrology: General Requirements for Software Controlled Measuring Instruments, OIML TC 5 / SC 2 – Committee Draft OIML CD 1 (May 2007),
  3. 3.
    WELMEC 7.1 (issue 2): Development of Software Requirements (May 2005),
  4. 4.
    WELMEC 7.2 (issue 1): Software Guide (Measuring Instruments Directive 2004/22/EC (May 2005),
  5. 5.
  6. 6.
    MID-Software: Software Requirements and Validation Guide, Version 1., European Growth Network,
  7. 7.
    Lo Iacono, L., Ruland, C., Zisky, N.: Secure Transfer of Measurement Data in Open Systems. Computer Standards & Interfaces 28, 311–326Google Scholar
  8. 8.
    Multi Utility Communication (MUC), Version 1.0, 8/2009, VDE,

Copyright information

© IFIP 2010

Authors and Affiliations

  1. 1.Institute for Data Communications SystemsUniversity of SiegenSiegenGermany

Personalised recommendations