TY - GEN
T1 - The Not-So-Smart Grid
T2 - 2012 IEEE Globecom Workshops, GC Wkshps 2012
AU - Rana, Shehla
AU - Zhu, Huaiyu
AU - Lee, Cheol W.
AU - Nicol, David M.
AU - Shin, Incheol
PY - 2012
Y1 - 2012
N2 - Advanced Metering Infrastructure (AMI) is envisioned to have the potential to revolutionize the power grid making it the 'Smart Grid'. AMI, through the use of 'smart meters' and high-speed networks, promises to strengthen both the stability and sustainability of the grid. The vision of AMI is to enhance and improve the grid by providing fine grained control over pricing and usage to both the utility and the customers. The promise is so convincing that there have been rapid large scale deployments all over the world in a very short time. In this frenzy of excitement, security of AMI, an issue of utmost importance may have been overlooked. In this paper, we present preliminary work of an in-depth study of vulnerabilities in AMI against cyber attacks. We point out vulnerabilities in ANSI C12.22, the protocol specification for interfacing smart meters with data networks. We also show how these vulnerabilities can be used to launch denial of service (DoS) attacks on the AMI and then propose potential solutions.
AB - Advanced Metering Infrastructure (AMI) is envisioned to have the potential to revolutionize the power grid making it the 'Smart Grid'. AMI, through the use of 'smart meters' and high-speed networks, promises to strengthen both the stability and sustainability of the grid. The vision of AMI is to enhance and improve the grid by providing fine grained control over pricing and usage to both the utility and the customers. The promise is so convincing that there have been rapid large scale deployments all over the world in a very short time. In this frenzy of excitement, security of AMI, an issue of utmost importance may have been overlooked. In this paper, we present preliminary work of an in-depth study of vulnerabilities in AMI against cyber attacks. We point out vulnerabilities in ANSI C12.22, the protocol specification for interfacing smart meters with data networks. We also show how these vulnerabilities can be used to launch denial of service (DoS) attacks on the AMI and then propose potential solutions.
UR - http://www.scopus.com/inward/record.url?scp=84875670261&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84875670261&partnerID=8YFLogxK
U2 - 10.1109/GLOCOMW.2012.6477810
DO - 10.1109/GLOCOMW.2012.6477810
M3 - Conference contribution
AN - SCOPUS:84875670261
SN - 9781467349413
T3 - 2012 IEEE Globecom Workshops, GC Wkshps 2012
SP - 1514
EP - 1519
BT - 2012 IEEE Globecom Workshops, GC Wkshps 2012
Y2 - 3 December 2012 through 7 December 2012
ER -