2010 International Conference on Networking, Sensing and Control (ICNSC) 2010
DOI: 10.1109/icnsc.2010.5461569
|View full text |Cite
|
Sign up to set email alerts
|

Information security implementation difficulties in critical infrastructures: Smart metering case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Privacy [24] and security [25] form other areas that have to be considered in future work. Privacy in particular forms an obvious challenge in this context.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Privacy [24] and security [25] form other areas that have to be considered in future work. Privacy in particular forms an obvious challenge in this context.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Simply altering the smart meter reading to report a lower usage than the actual energy consumption will cause the utility company to lose money [12] - [15]. In the situation where the attacker is able to impersonate the smart meter, the attacker may be able to send erroneous data or control commands to the power grid, which may cause dire consequences.…”
Section: B Financial Impacts To Utility Companymentioning
confidence: 98%
“…Financial loss to the premise owner can occur is several ways. An attacker may cause the premise owner to pay a higher electrical bill by altering the meter reading so that the smart meter reports a higher usage than the actual energy consumption of the owner [13] - [15]. Altering the smart meter reading can be done by physically tampering the smart meter [10] or performing data manipulation on the smart meter remotely through its network connectivity [13].…”
Section: A Financial Impacts To Premise Ownermentioning
confidence: 99%
“…Based on the bugs reported and technological advancements, the protocols running on the installed SMs need to be updated. However, this is a challenging operation [32,33]. Therefore, we proposed two secure and reliable firmware update protocols for the AMI network.…”
Section: Ami Networkmentioning
confidence: 99%