2021 IEEE Mysore Sub Section International Conference (MysuruCon) 2021
DOI: 10.1109/mysurucon52639.2021.9641595
|View full text |Cite
|
Sign up to set email alerts
|

Invasion Analysis of Smart Meter In AMI System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…According to Alfassa et al [7], a brief introduction of smart grid, AMI, and its communication networks with diagrams, alongside the requirements of network privacy and security in smart metering were stated. The study analyzed the potential security issues introduced by man-in-the-middle (MiTM) attacks and session hijacking attacks.…”
Section: Existing Review Papers On Ami Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…According to Alfassa et al [7], a brief introduction of smart grid, AMI, and its communication networks with diagrams, alongside the requirements of network privacy and security in smart metering were stated. The study analyzed the potential security issues introduced by man-in-the-middle (MiTM) attacks and session hijacking attacks.…”
Section: Existing Review Papers On Ami Securitymentioning
confidence: 99%
“…However, there have been several studies on the aforementioned AMI security and privacy issues. This is because a nation's security and economy alongside her public safety largely rely on it [7]. More so, its failure or inadequacies have been found to have debilitating impacts such as huge economic and property losses as experienced in 2003 when the United States of America (USA) blackout caused billions of dollars; which is also an example of similar security breach experiences in other nations [6].…”
Section: Introductionmentioning
confidence: 99%
“…References MITM [22], [25], [26], [27], [28], [29], [31], [32], [33], [34], [35], [37], [41], [42], [43], [44], [45] Session Hijacking [23], [24], [26], [30], [31], [34], [35], [36], [37], [38], [39], [40], [46], [47], [48], [49], [50], [51] hijacking occurs during the HTTP session when the user gets its ID, whereas in-network layer interception occurs during TCP and User Datagram Protocol (UDP) sessions [48]. Fig.…”
Section: Attack Domainmentioning
confidence: 99%
“…3) In a packet sniffer, the attacker uses an interface among the users to look at the interchanging data [47]. 4) In UDP hijacking, the attacker replies to the UDP request as a legitimate user before the server responds [48]. Following are the hijacking attacks that occur on the application layer.…”
Section: Attack Domainmentioning
confidence: 99%
See 1 more Smart Citation