{"title":"A secure way of exchanging the secret keys in advanced metering infrastructure","authors":"M. Thomas, I. Ali, N. Gupta","doi":"10.1109/POWERCON.2012.6401418","DOIUrl":null,"url":null,"abstract":"Advanced metering infrastructure (AMI) security has become a challenging issue now days because of its integration with the external networks, remote system, and internet world. Today's metering infrastructure employs computer based monitoring and control operations to enable application of one network to exchange data with other application of different network. Communication protocol, network topologies, and computerization plays crucial roles to make the metering infrastructure advanced and further make a grid smarter. On the other hand, cyber attacks already associated with such computer networks and communication protocol can easily affect the communication of AMI applications. Therefore, from trespasser point of view, in this paper, we explore the various possible types of undesirable security threats followed by desirable security attributes required for the AMI. The paper further describes and implements a signature based station-to-station protocol for exchanging the secret shared keys among the AMI applications to get rid from undesirable security threats.","PeriodicalId":176214,"journal":{"name":"2012 IEEE International Conference on Power System Technology (POWERCON)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Power System Technology (POWERCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/POWERCON.2012.6401418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
Advanced metering infrastructure (AMI) security has become a challenging issue now days because of its integration with the external networks, remote system, and internet world. Today's metering infrastructure employs computer based monitoring and control operations to enable application of one network to exchange data with other application of different network. Communication protocol, network topologies, and computerization plays crucial roles to make the metering infrastructure advanced and further make a grid smarter. On the other hand, cyber attacks already associated with such computer networks and communication protocol can easily affect the communication of AMI applications. Therefore, from trespasser point of view, in this paper, we explore the various possible types of undesirable security threats followed by desirable security attributes required for the AMI. The paper further describes and implements a signature based station-to-station protocol for exchanging the secret shared keys among the AMI applications to get rid from undesirable security threats.