Who Controls the off Switch?

Ross J. Anderson, Shailendra Fuloria
{"title":"Who Controls the off Switch?","authors":"Ross J. Anderson, Shailendra Fuloria","doi":"10.1109/SMARTGRID.2010.5622026","DOIUrl":null,"url":null,"abstract":"We're about to acquire a significant new cyber- vulnerability. The world's energy utilities are starting to install hundreds of millions of 'smart meters' which contain a remote off switch. Its main purpose is to ensure that customers who default on their payments can be switched remotely to a prepay tariff; secondary purposes include supporting interruptible tariffs and implementing rolling power cuts at times of supply shortage. The off switch creates information security problems of a kind, and on a scale, that the energy companies have not had to face before. From the viewpoint of a cyber attacker - whether a hostile government agency, a terrorist organisation or even a militant environmental group - the ideal attack on a target country is to interrupt its citizens' electricity supply. This is the cyber equivalent of a nuclear strike; when electricity stops, then pretty soon everything else does too. Until now, the only plausible ways to do that involved attacks on critical generation, transmission and distribution assets, which are increasingly well defended. Smart meters change the game. The combination of commands that will cause meters to interrupt the supply, of applets and software upgrades that run in the meters, and of cryptographic keys that are used to authenticate these commands and software changes, create a new strategic vulnerability, which we discuss in this paper.","PeriodicalId":106908,"journal":{"name":"2010 First IEEE International Conference on Smart Grid Communications","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"132","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 First IEEE International Conference on Smart Grid Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMARTGRID.2010.5622026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 132

Abstract

We're about to acquire a significant new cyber- vulnerability. The world's energy utilities are starting to install hundreds of millions of 'smart meters' which contain a remote off switch. Its main purpose is to ensure that customers who default on their payments can be switched remotely to a prepay tariff; secondary purposes include supporting interruptible tariffs and implementing rolling power cuts at times of supply shortage. The off switch creates information security problems of a kind, and on a scale, that the energy companies have not had to face before. From the viewpoint of a cyber attacker - whether a hostile government agency, a terrorist organisation or even a militant environmental group - the ideal attack on a target country is to interrupt its citizens' electricity supply. This is the cyber equivalent of a nuclear strike; when electricity stops, then pretty soon everything else does too. Until now, the only plausible ways to do that involved attacks on critical generation, transmission and distribution assets, which are increasingly well defended. Smart meters change the game. The combination of commands that will cause meters to interrupt the supply, of applets and software upgrades that run in the meters, and of cryptographic keys that are used to authenticate these commands and software changes, create a new strategic vulnerability, which we discuss in this paper.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
谁控制开关?
我们即将获得一个重要的新网络漏洞。世界各地的能源公司正开始安装数以亿计的“智能电表”,其中包含一个远程关闭开关。其主要目的是确保拖欠付款的客户可以远程切换到预付关税;次要目的包括支持可中断电价和在供应短缺时实施滚动停电。关闭开关带来的信息安全问题,在某种程度上和规模上,是能源公司以前从未遇到过的。从网络攻击者——无论是敌对的政府机构、恐怖组织,甚至是激进的环保组织——的角度来看,对目标国家的理想攻击是中断其公民的电力供应。这是一场相当于核打击的网络攻击;当电停止时,其他一切也会很快停止。到目前为止,唯一可行的方法是攻击关键的发电、输电和配电资产,而这些资产的防御越来越严密。智能电表改变了游戏规则。将导致电表中断供电的命令、运行在电表中的applet和软件升级,以及用于验证这些命令和软件更改的加密密钥的组合,创建了一个新的战略漏洞,我们将在本文中对此进行讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Spectrum for Smart Grid: Policy Recommendations Enabling Current and Future Applications Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures Quality of Service Networking for Smart Grid Distribution Monitoring The POWER of Networking: How Networking Can Help Power Management Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1