ACM Transactions on Computer Systems (TOCS)
Automata, Languages, and Machines
Automata, Languages, and Machines
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
On a formal framework for security properties
Computer Standards & Interfaces
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Analysis of the SYM2 smart meter remote software download using formal methods reasoning
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss
Hi-index | 0.00 |
Today's industries and households have a growing need for resources like electricity obtained and measured via house connections. For the future, european and national regulations require providers to enable additional services such as accurate monthly bills and consumption information regarding the actual time of use. Those regulations and future use cases like charging stations for E-Mobility or the need for accurate real-time consumption information in Smart Grids require the classical meters to be replaced by Smart Meters that utilize embedded systems providing network connectivity to the backend. These functionalities raise additional security concerns that are addressed by regulations and laws of the metrology domain. However, the current directives in this area rely only on verbal definitions of these security requirements. This paper analyses security requirements from the Measuring Instruments Directive 2004/22/EC (MID) and demonstrates a possible formal representation ruling out the drawbacks of textual descriptions and enabling formal reasoning and proving of lawful requirements.