2014 2nd International Symposium on Wireless Systems Within the Conferences on Intelligent Data Acquisition and Advanced Comput 2014
DOI: 10.1109/idaacs-sws.2014.6954628
|View full text |Cite
|
Sign up to set email alerts
|

Integrity protection in a smart grid environment for wireless access of smart meters

Abstract: To meet future challenges of energy grids, secure communication between involved control systems is necessary. Therefore the German Federal Office for Information Security (BSI) has published security standards concerning a central communication unit for energy grids called Smart Meter Gateway (SMGW). The present security concept of the SPIDER project takes these standards into consideration but extends their level of information security by integrating elements from the Trusted Computing approach. Additionall… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Hence, adding certain external component assists in retaining the security was evident in various research works. Similar cases were found in Germany where Detken et al [49] has introduced a grid that is resilient against tamper and was integrated with the hardware model. The authors have designed a core integrated with WLAN in order resist threat.…”
Section: Technqiue Towards Securitymentioning
confidence: 48%
“…Hence, adding certain external component assists in retaining the security was evident in various research works. Similar cases were found in Germany where Detken et al [49] has introduced a grid that is resilient against tamper and was integrated with the hardware model. The authors have designed a core integrated with WLAN in order resist threat.…”
Section: Technqiue Towards Securitymentioning
confidence: 48%
“…Malicious users misuse the information to harm others or take advantages from it. 2) Cyber Attacks Targeting Integrity Main motivation of these types of attacks is to disrupt the data exchange in the smart grid by illegally modifying or inserting false information [25]- [28]. 3) Cyber Attacks Targeting Availability Attackers' main motivation is to block or delay the communication in the smart grid so that the power delivery could be interrupted.…”
Section: B Attack Classifications Based On Network Layersmentioning
confidence: 99%
“…To prevent integrity attacks, a power fingerprinting technique has been proposed in [25], a volt-var control (VVC) based scheme has been proposed in [27], and a Trusted Network Connect (TNC) base approach had been studied in [28].…”
Section: Cyber Defense Solutions For Smart Grid Systemsmentioning
confidence: 99%
“…Electricitytheftrepresentsamajorchallengetoutilitycompaniesandhasaprofoundeffectonenergy cost,utilityrevenue,andreliabilityofthegrid.Aspointedoutby (Smith,2004),amaliciousconsumer To protect the smart meter gateway from ICT attacks (Detken, Genzel, Rudolph, & Jahnke, 2014),proposedatrustedcorenetworkarchitecture.Thenetworkusesatrustedplatformmodule,a trustedneighborhooddiscoveryprotocol,andatrustworthybootprocess.Thedrivingforcesbehind thedevelopmentofthesecuritysolutionarethe"chameleon"malwareandthesecuritystandards elaboratedbytheGermanFederalOfficeforInformationSecurityforthesmartmetergateway.…”
Section: Tamper Resistant Devicementioning
confidence: 99%