Security and Privacy Challenges in the Smart Grid
IEEE Security and Privacy
False data injection attacks against state estimation in electric power grids
Proceedings of the 16th ACM conference on Computer and communications security
Multi-vendor penetration testing in the advanced metering infrastructure
Proceedings of the 26th Annual Computer Security Applications Conference
Embedded firmware diversity for smart electric meters
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Privacy-preserving smart metering
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
S2A: secure smart household appliances
Proceedings of the second ACM conference on Data and Application Security and Privacy
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid
ICCPS '12 Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems
Securing advanced metering infrastructure using intrusion detection system with data stream mining
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Neighborhood watch: security and privacy analysis of automatic meter reading systems
Proceedings of the 2012 ACM conference on Computer and communications security
Evaluating electricity theft detectors in smart grid networks
RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
A secure architecture for smart meter systems
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Configuration-based IDS for advanced metering infrastructure
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Proceedings of the first ACM workshop on Smart energy grid security
Go with the flow: toward workflow-oriented security assessment
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.