2013
DOI: 10.1007/978-3-642-40511-2_14
|View full text |Cite
|
Sign up to set email alerts
|

GPRS Security for Smart Meters

Abstract: Abstract. Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Thereafter, it receives an identity request and then sends its International Mobile Subscriber Identification Number (IMSI) and International Mobile Device Identity (IMEI) back to implement identity authentication and Home Location Register. After authentication and location updates are finished, the meter proceeds in attaching to the BS [21].…”
Section: B Threat From Rogue Bss In Wireless Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…Thereafter, it receives an identity request and then sends its International Mobile Subscriber Identification Number (IMSI) and International Mobile Device Identity (IMEI) back to implement identity authentication and Home Location Register. After authentication and location updates are finished, the meter proceeds in attaching to the BS [21].…”
Section: B Threat From Rogue Bss In Wireless Networkmentioning
confidence: 99%
“…As a result, it is likely for an adversary to take control of meter collectors by setting up a rogue BS [22]. What's more, according to [21], attackers could establish a rogue BS with modest budgets. The malicious adversary could measure and collect carrier frequency of the targeted cell.…”
Section: B Threat From Rogue Bss In Wireless Networkmentioning
confidence: 99%
See 2 more Smart Citations