2011 IEEE International Conference on Smart Measurements of Future Grids (SMFG) Proceedings 2011
DOI: 10.1109/smfg.2011.6125758
|View full text |Cite
|
Sign up to set email alerts
|

A simulation framework for smart meter security evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…With SMs and growing grid distribution communication, AMI network is becoming more pervasive. Therefore AMI security ranging over a spectrum from resisting attacks aimed at supervisory and control systems; to end user privacy concerns [75,76]. This multi-faceted problem also includes vulnerabilities that arise from deployment of physical attack at SM location, with a potential to manipulate the measured energy consumption, and being massively deployed aiming at de-stabilization [20].…”
Section: Smart Meter Security Issues and Privacy-preserving Schemesmentioning
confidence: 99%
“…With SMs and growing grid distribution communication, AMI network is becoming more pervasive. Therefore AMI security ranging over a spectrum from resisting attacks aimed at supervisory and control systems; to end user privacy concerns [75,76]. This multi-faceted problem also includes vulnerabilities that arise from deployment of physical attack at SM location, with a potential to manipulate the measured energy consumption, and being massively deployed aiming at de-stabilization [20].…”
Section: Smart Meter Security Issues and Privacy-preserving Schemesmentioning
confidence: 99%
“…Common security attacks on computer network such as denial-of-service (DoS), user impersonation, sniffing, side-channel analysis, traffic hijacking, routing attacks, configuration manipulation and exploitation of insecure software can now be performed on smart meter [10], [11]. Furthermore, with the smart meter's ability to execute codes and communicate over the network, viruses, worms and Trojan horses can run on the smart meter and spread through its network connectivity [12], [13].…”
Section: Financial Impacts Of Smart Meter Security Breachmentioning
confidence: 99%
“…Security attacks to a smart meter can be done either through the smart meter's communication module, utility server, service provider or the communication network [13]. The attacks can be performed by various parties, where different party may benefit in different ways.…”
Section: Financial Impacts Of Smart Meter Security Breachmentioning
confidence: 99%
See 2 more Smart Citations