ieeexplore.ieee.org
Open in
urlscan Pro
2a02:26f0:6c00:28e::603
Public Scan
Submitted URL: http://ieeexplore.ieee.org/abstract/document/4596535/
Effective URL: https://ieeexplore.ieee.org/abstract/document/4596535/
Submission: On June 06 via manual from US — Scanned from DE
Effective URL: https://ieeexplore.ieee.org/abstract/document/4596535/
Submission: On June 06 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOM<form _ngcontent-dlu-c454="" novalidate="" class="search-bar-wrapper ng-untouched ng-pristine ng-valid">
<div _ngcontent-dlu-c454="" class="drop-down"><label _ngcontent-dlu-c454=""><select _ngcontent-dlu-c454="" aria-label="content type dropdown">
<option _ngcontent-dlu-c454="">All</option>
<option _ngcontent-dlu-c454="">Books</option>
<option _ngcontent-dlu-c454="">Conferences</option>
<option _ngcontent-dlu-c454="">Courses</option>
<option _ngcontent-dlu-c454="">Journals & Magazines</option>
<option _ngcontent-dlu-c454="">Standards</option>
<option _ngcontent-dlu-c454="">Authors</option>
<option _ngcontent-dlu-c454="">Citations</option><!---->
</select></label></div>
<div _ngcontent-dlu-c454="" class="search-field all">
<div _ngcontent-dlu-c454="" class="search-field-icon-container">
<div _ngcontent-dlu-c454="" class="global-search-bar"><xpl-typeahead-migr _ngcontent-dlu-c454="" placeholder="" name="search-term" ulclass="search-within-results ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all"
minchars="3" _nghost-dlu-c52="">
<div _ngcontent-dlu-c52="" class="Typeahead text-sm-md-lh"><input _ngcontent-dlu-c52="" type="text" autocomplete="off" aria-label="Enter search text" class="Typeahead-input ng-untouched ng-pristine ng-valid" placeholder=""><!----></div>
</xpl-typeahead-migr></div><!----><!---->
<div _ngcontent-dlu-c454="" class="search-icon"><button _ngcontent-dlu-c454="" type="submit" aria-label="Search" class="fa fa-search"></button></div><!---->
</div><!---->
</div>
</form>
Text Content
IEEE websites place cookies on your device to give you the best user experience. By using our websites, you agree to the placement of these cookies. To learn more, read our Privacy Policy. Accept & Close Skip to Main Content * IEEE.org * IEEE Xplore * IEEE SA * IEEE Spectrum * More Sites SUBSCRIBE SUBSCRIBE Cart Create AccountPersonal Sign In * Browse * My Settings * Help Institutional Sign In Institutional Sign In AllBooksConferencesCoursesJournals & MagazinesStandardsAuthorsCitations ADVANCED SEARCH Conferences >2008 IEEE Power and Energy So... CYBER SECURITY ISSUES FOR ADVANCED METERING INFRASTTRUCTURE (AMI) Publisher: IEEE Cite This PDF F. M. Cleveland All Authors Sign In or Purchase to View Full Text 129 Paper Citations 1 Patent Citation 5979 Full Text Views * * * * * Alerts ALERTS Manage Content Alerts Add to Citation Alerts -------------------------------------------------------------------------------- Abstract Document Sections * I. Generic Security Requirements and Threats * II. AMI Security Requirements and Threats * III. AMI Constraints Affecting Security Solutions * IV. Conclusion Authors Figures Citations Keywords Metrics More Like This * Download PDF * View References * * Request Permissions * Save to * Alerts Abstract:Advanced Metering Infrastructure (AMI) is becoming of increasing interest to many stakeholders, including utilities, regulators, energy markets, and a society concerned a...View more Metadata Abstract: Advanced Metering Infrastructure (AMI) is becoming of increasing interest to many stakeholders, including utilities, regulators, energy markets, and a society concerned about conserving energy and responding to global warming. AMI technologies, rapidly overtaking the earlier Automated Meter Reading (AMR) technologies, are being developed by many vendors, with portions being developed by metering manufacturers, communications providers, and back-office Meter Data Management (MDM) IT vendors. In this flurry of excitement, very little effort has yet been focused on the cyber security of AMI systems. The comment usually is "Oh yes, we will encrypt everything - that will make everything secure." That comment indicates unawareness of possible security threats of AMI - a technology that will reach into a large majority of residences and virtually all commercial and industrial customers. What if, for instance, remote connect/disconnect were included as one AMI capability - a function of great interest to many utilities as it avoids truck rolls. What if a smart kid hacker in his basement cracked the security of his AMI system, and sent out 5 million disconnect commands to all customer meters on the AMI system...? Published in: 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century Date of Conference: 20-24 July 2008 Date Added to IEEE Xplore: 12 August 2008 ISBN Information: Print ISSN: 1932-5517 INSPEC Accession Number: 10142293 DOI: 10.1109/PES.2008.4596535 Publisher: IEEE Conference Location: Pittsburgh, PA, USA Contents -------------------------------------------------------------------------------- I. GENERIC SECURITY REQUIREMENTS AND THREATS Generically, security requirements for managing data can be classified as follows: • Confidentiality - Requirement that data is accessible only to authorized entities, and that intentional or unintentional disclosures of the data do not occur. • Integrity - Requirement that data is authentic, correctly reflecting the source data, and complete, without unauthorized modifications, deletions, or additions. (This does not imply the data is valid, only that it is the same as the source.) • Availability - Requirement that data is accessible by authorized entities whenever they need it. • Non-Repudiation - Requirement that the entities receiving the data do not subsequently deny receiving it. The reverse is also true: that if the entities did not receive the data, then they cannot subsequently state that they did receive it. Sign in to Continue Reading Authors Figures Citations Keywords Metrics More Like This Remote Wireless Automatic Meter Reading System Based on Wireless Mesh Networks and Embedded Technology 2008 Fifth IEEE International Symposium on Embedded Computing Published: 2008 A Survey of Communication Protocols for Automatic Meter Reading Applications IEEE Communications Surveys & Tutorials Published: 2011 Show More IEEE PERSONAL ACCOUNT * Change username/password PURCHASE DETAILS * Payment Options * View Purchased Documents PROFILE INFORMATION * Communications Preferences * Profession and Education * Technical interests NEED HELP? * US & Canada: +1 800 678 4333 * Worldwide: +1 732 981 0060 * Contact & Support FOLLOW * * * About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | IEEE Ethics Reporting | Sitemap | Privacy & Opting Out of Cookies A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2022 IEEE - All rights reserved. IEEE ACCOUNT * Change Username/Password * Update Address PURCHASE DETAILS * Payment Options * Order History * View Purchased Documents PROFILE INFORMATION * Communications Preferences * Profession and Education * Technical Interests NEED HELP? * US & Canada: +1 800 678 4333 * Worldwide: +1 732 981 0060 * Contact & Support * About IEEE Xplore * Contact Us * Help * Accessibility * Terms of Use * Nondiscrimination Policy * Sitemap * Privacy & Opting Out of Cookies A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2022 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.