SoutheastCon 2015 2015
DOI: 10.1109/secon.2015.7132989
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security assessment of metering infrastructure in Smart Grid systems

Abstract: Effective integration of renewable energy resources, energy management and better usage of the high voltage transmission system are major motivating forces for an improved electric grid regularly called the Smart Grid. Along with the soundless features of the Smart Grid, cyber security appears to be a serious issue because many electronic devices are connected via communication networks throughout critical power services, which has a direct impact on the reliability of such a common infrastructure. An assessme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(18 citation statements)
references
References 9 publications
0
18
0
Order By: Relevance
“…• Confidentiality: Confidentiality as from the perspective of AMI can be perceived as privacy of consumer's consumption pattern and information, i.e., consumption information must remain confidential. This means physical theft of meter to access the stored data, unauthorized access to the data by other connected automated systems through gateways, as well as customers access to other customers information should be prevented [45]. At AMI head end, customer information shall remain confidential and only authorized systems will have access to certain sets of data.…”
Section: B Ami Security Challengesmentioning
confidence: 99%
“…• Confidentiality: Confidentiality as from the perspective of AMI can be perceived as privacy of consumer's consumption pattern and information, i.e., consumption information must remain confidential. This means physical theft of meter to access the stored data, unauthorized access to the data by other connected automated systems through gateways, as well as customers access to other customers information should be prevented [45]. At AMI head end, customer information shall remain confidential and only authorized systems will have access to certain sets of data.…”
Section: B Ami Security Challengesmentioning
confidence: 99%
“…0 ≤ c B,ch (t) ≤ c l ∀t (6) Also, the amount of photovoltaic energy sold to the grid P PS (t) cannot exceed the amount of photovoltaic energy that is generated in each time period t P P (t).…”
Section: Household Nanogridmentioning
confidence: 99%
“…opportunities to inject cyber-attacks [6]. Due to these weaknesses, SMs make SGs vulnerable to malicious attempts to obtain, alter, or even destroy any cyber/physical component or subsystem [8].…”
Section: Introductionmentioning
confidence: 99%
“…Advanced Metering Infrastructure (AMI) has been regarded as a key component of the smart grid. It inherits the two-way communication capability of smart grid and introduces new opportunities for consumers and suppliers: it is responsible for collecting consumer's time-based data and transmitting them to the AMI host system, and it is also responsible for implementing price signals and control commands to perform necessary control actions [3]. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy.…”
Section: Introductionmentioning
confidence: 99%
“…AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. Consequently, security is one of the most challenging topics in AMI development Some of the key AMI security requirements are described below [3]:…”
Section: Introductionmentioning
confidence: 99%