Advertisement

A Secure Architecture for Smart Meter Systems

  • Daniel Angermeier
  • Konstantin Böttinger
  • Andreas Ibing
  • Dieter Schuster
  • Frederic Stumpf
  • Dirk Wacker
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7672)

Abstract

We present a new architecture for a secure smart metering system. Our architecture is based on a special purpose hardware security module that encapsulates all security critical operations and provides the main functionality of the system in an active role. This new approach enables secure meter data handling within the smart grid. As a result, our architecture preserves the privacy of sensitive consumer data and the integrity of meter data. Additionally, our proposed solution enhances the security of components critical to the operation of the power grid.

Keywords

Smart Card Smart Grid Wide Area Network Secure Architecture Secure Storage 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    AMI-SEC Task Force: AMI System Security Requirements v1.01 (December 2008)Google Scholar
  2. 2.
    Federal Energy Regulatory Commission: Assessment of Demand Response and Advanced Metering (December 2008)Google Scholar
  3. 3.
    Carpenter, M., Goodspeed, T., Singletary, B., Skoudis, E., Wright, J.: Advanced Metering Infrastructure Attack Methodology v1.0 (January 2009)Google Scholar
  4. 4.
    Ericsson, G.: Cyber security and power system communication – essential parts of a smart grid infrastructure. IEEE Trans. Power Delivery 25(3) (July 2010)Google Scholar
  5. 5.
    McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security and Privacy 7(3) (2009)Google Scholar
  6. 6.
    McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 107–116. ACM (2010)Google Scholar
  7. 7.
    McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy Theft in the Advanced Metering Infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 176–187. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    LeMay, M., Gross, G., Gunter, C., Garg, S.: Unified architecture for large-scale attested metering. In: Hawaiian Int. Conf. System Sciences (January 2007)Google Scholar
  9. 9.
    Jawurek, M., Johns, M., Kerschbaum, F.: Plug-In Privacy for Smart Metering Billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    BSI: Protection profile for the gateway of a smart metering system v01.01.01 (final draft) (August 2011)Google Scholar
  11. 11.
    Hu, W., Corke, P., Shih, W.C., Overs, L.: secFleck: A Public Key Technology Platform for Wireless Sensor Networks. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 296–311. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  12. 12.
    Krauß, C., Stumpf, F., Eckert, C.: Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy 7(3), 75–77 (2009)CrossRefGoogle Scholar
  14. 14.
    Lawson, N.: Side-channel attacks on cryptographic software. IEEE Security and Privacy 7, 65–68 (2009)CrossRefGoogle Scholar
  15. 15.
    Hsueh, M., Tsai, T., Iyer, R.: Fault injection techniques and tools. IEEE Computer 30(4), 75–82 (1997)CrossRefGoogle Scholar
  16. 16.
    Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: Attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, vol. 2, p. 1119 (2000)Google Scholar
  17. 17.
    Shacham, H., Buchanan, E., Roemer, R., Savage, S.: Return-oriented programming: Exploits without code injection. In: Black Hat USA Briefings (August 2008)Google Scholar
  18. 18.
    beagleboard.org: BeagleBoard System Reference Manual Rev C4 (December 2009)Google Scholar
  19. 19.
    Sun Microsystems: The Java Card 3 Platform (August 2008)Google Scholar
  20. 20.
    Sun Microsystems: Java Card Platform Specification, Version 3.0, Connected Edition (March 2008)Google Scholar
  21. 21.
    Samsung Electronics: Security Target Lite of S3FS9CI 32-bit RISC Microcontroller For S-SIM, Version 1.0 (June 2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Daniel Angermeier
    • 1
  • Konstantin Böttinger
    • 1
  • Andreas Ibing
    • 1
  • Dieter Schuster
    • 1
  • Frederic Stumpf
    • 1
  • Dirk Wacker
    • 2
  1. 1.Fraunhofer Research Institution AISECMunichGermany
  2. 2.Giesecke & DevrientMunichGermany

Personalised recommendations