ieeexplore.ieee.org Open in urlscan Pro
2a02:26f0:6c00:28e::603  Public Scan

Submitted URL: http://ieeexplore.ieee.org/abstract/document/4596535/
Effective URL: https://ieeexplore.ieee.org/abstract/document/4596535/
Submission: On June 06 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form _ngcontent-dlu-c454="" novalidate="" class="search-bar-wrapper ng-untouched ng-pristine ng-valid">
  <div _ngcontent-dlu-c454="" class="drop-down"><label _ngcontent-dlu-c454=""><select _ngcontent-dlu-c454="" aria-label="content type dropdown">
        <option _ngcontent-dlu-c454="">All</option>
        <option _ngcontent-dlu-c454="">Books</option>
        <option _ngcontent-dlu-c454="">Conferences</option>
        <option _ngcontent-dlu-c454="">Courses</option>
        <option _ngcontent-dlu-c454="">Journals &amp; Magazines</option>
        <option _ngcontent-dlu-c454="">Standards</option>
        <option _ngcontent-dlu-c454="">Authors</option>
        <option _ngcontent-dlu-c454="">Citations</option><!---->
      </select></label></div>
  <div _ngcontent-dlu-c454="" class="search-field all">
    <div _ngcontent-dlu-c454="" class="search-field-icon-container">
      <div _ngcontent-dlu-c454="" class="global-search-bar"><xpl-typeahead-migr _ngcontent-dlu-c454="" placeholder="" name="search-term" ulclass="search-within-results ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all"
          minchars="3" _nghost-dlu-c52="">
          <div _ngcontent-dlu-c52="" class="Typeahead text-sm-md-lh"><input _ngcontent-dlu-c52="" type="text" autocomplete="off" aria-label="Enter search text" class="Typeahead-input ng-untouched ng-pristine ng-valid" placeholder=""><!----></div>
        </xpl-typeahead-migr></div><!----><!---->
      <div _ngcontent-dlu-c454="" class="search-icon"><button _ngcontent-dlu-c454="" type="submit" aria-label="Search" class="fa fa-search"></button></div><!---->
    </div><!---->
  </div>
</form>

Text Content

IEEE websites place cookies on your device to give you the best user experience.
By using our websites, you agree to the placement of these cookies. To learn
more, read our Privacy Policy.
Accept & Close



Skip to Main Content


 * IEEE.org
 * IEEE Xplore
 * IEEE SA
 * IEEE Spectrum
 * More Sites

SUBSCRIBE
SUBSCRIBE

Cart 



Create AccountPersonal Sign In



 * Browse
 * My Settings
 * Help
   

Institutional Sign In

Institutional Sign In
AllBooksConferencesCoursesJournals & MagazinesStandardsAuthorsCitations

ADVANCED SEARCH
Conferences >2008 IEEE Power and Energy So...


CYBER SECURITY ISSUES FOR ADVANCED METERING INFRASTTRUCTURE (AMI)

Publisher: IEEE
Cite This
PDF

F. M. Cleveland
All Authors

Sign In or Purchase
to View Full Text
129
Paper
Citations
1
Patent
Citation
5979
Full
Text Views

 * 
   
 * 
   
 * 
   
 * 
   
 * Alerts
   
   
   ALERTS
   
   Manage Content Alerts
   Add to Citation Alerts
   

--------------------------------------------------------------------------------

Abstract
Document Sections
 * I.
   
   Generic Security Requirements and Threats
 * II.
   
   AMI Security Requirements and Threats
 * III.
   
   AMI Constraints Affecting Security Solutions
 * IV.
   
   Conclusion
   

Authors
Figures
Citations
Keywords
Metrics
More Like This
 * Download PDF
 * View References
 * 
 * Request Permissions
 * Save to
 * Alerts
   
   

Abstract:Advanced Metering Infrastructure (AMI) is becoming of increasing
interest to many stakeholders, including utilities, regulators, energy markets,
and a society concerned a...View more
Metadata
Abstract:
Advanced Metering Infrastructure (AMI) is becoming of increasing interest to
many stakeholders, including utilities, regulators, energy markets, and a
society concerned about conserving energy and responding to global warming. AMI
technologies, rapidly overtaking the earlier Automated Meter Reading (AMR)
technologies, are being developed by many vendors, with portions being developed
by metering manufacturers, communications providers, and back-office Meter Data
Management (MDM) IT vendors. In this flurry of excitement, very little effort
has yet been focused on the cyber security of AMI systems. The comment usually
is "Oh yes, we will encrypt everything - that will make everything secure." That
comment indicates unawareness of possible security threats of AMI - a technology
that will reach into a large majority of residences and virtually all commercial
and industrial customers. What if, for instance, remote connect/disconnect were
included as one AMI capability - a function of great interest to many utilities
as it avoids truck rolls. What if a smart kid hacker in his basement cracked the
security of his AMI system, and sent out 5 million disconnect commands to all
customer meters on the AMI system...?
Published in: 2008 IEEE Power and Energy Society General Meeting - Conversion
and Delivery of Electrical Energy in the 21st Century
Date of Conference: 20-24 July 2008
Date Added to IEEE Xplore: 12 August 2008
ISBN Information:
Print ISSN: 1932-5517
INSPEC Accession Number: 10142293
DOI: 10.1109/PES.2008.4596535
Publisher: IEEE
Conference Location: Pittsburgh, PA, USA

Contents

--------------------------------------------------------------------------------


I. GENERIC SECURITY REQUIREMENTS AND THREATS

Generically, security requirements for managing data can be classified as
follows: •

Confidentiality - Requirement that data is accessible only to authorized
entities, and that intentional or unintentional disclosures of the data do not
occur.

•

Integrity - Requirement that data is authentic, correctly reflecting the source
data, and complete, without unauthorized modifications, deletions, or additions.
(This does not imply the data is valid, only that it is the same as the source.)

•

Availability - Requirement that data is accessible by authorized entities
whenever they need it.

•

Non-Repudiation - Requirement that the entities receiving the data do not
subsequently deny receiving it. The reverse is also true: that if the entities
did not receive the data, then they cannot subsequently state that they did
receive it.



Sign in to Continue Reading
Authors

Figures

Citations

Keywords

Metrics


More Like This
Remote Wireless Automatic Meter Reading System Based on Wireless Mesh Networks
and Embedded Technology

2008 Fifth IEEE International Symposium on Embedded Computing

Published: 2008

A Survey of Communication Protocols for Automatic Meter Reading Applications

IEEE Communications Surveys & Tutorials

Published: 2011

Show More



IEEE PERSONAL ACCOUNT

 * Change username/password


PURCHASE DETAILS

 * Payment Options
 * View Purchased Documents


PROFILE INFORMATION

 * Communications Preferences
 * Profession and Education
 * Technical interests


NEED HELP?

 * US & Canada: +1 800 678 4333
 * Worldwide: +1 732 981 0060
 * Contact & Support


FOLLOW

 * 
 * 
 * 

About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use |
Nondiscrimination Policy | IEEE Ethics Reporting | Sitemap | Privacy & Opting
Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical
professional organization dedicated to advancing technology for the benefit of
humanity.

© Copyright 2022 IEEE - All rights reserved.


IEEE ACCOUNT

 * Change Username/Password
 * Update Address


PURCHASE DETAILS

 * Payment Options
 * Order History
 * View Purchased Documents


PROFILE INFORMATION

 * Communications Preferences
 * Profession and Education
 * Technical Interests


NEED HELP?

 * US & Canada: +1 800 678 4333
 * Worldwide: +1 732 981 0060
   
 * Contact & Support

 * About IEEE Xplore
 * Contact Us
 * Help
 * Accessibility
 * Terms of Use
 * Nondiscrimination Policy
 * Sitemap
 * Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical
professional organization dedicated to advancing technology for the benefit of
humanity.
© Copyright 2022 IEEE - All rights reserved. Use of this web site signifies your
agreement to the terms and conditions.