Monitoring approach for detection compromise attacks in smart meter | IET Conference Publication | IEEE Xplore

Monitoring approach for detection compromise attacks in smart meter

; ;

Abstract:

The smart-metering system measures and manages the consumption of power, gas and water. Smart metering system is controlled by the remote provider of this service. Given ...Show More

Abstract:

The smart-metering system measures and manages the consumption of power, gas and water. Smart metering system is controlled by the remote provider of this service. Given that smart meters are installed in unsafe places (outside houses), there are some challenges in the physical security of these devices. In other words, according to the previous studies and our knowledge, one of strongest challenges facing the smart meters is JTAG interface. A potential adversary can reprogram the board through this interface and compromise the key components of this device including keys, privacy of consumers and other information. In this paper, a monitoring scheme for detecting compromise attack has been proposed. In this scheme, at least two smart meters are used for monitoring one smart meter. To ensure security, the ring architecture was designed to provide high security in a hierarchical structure.
Date of Conference: 10 June 2013 - 13 June 213
Date Added to IEEE Xplore: 16 December 2013
Electronic ISBN:978-1-84919-732-8
Conference Location: Stockholm

Contact IEEE to Subscribe