We introduce a secure architecture called an attested me-ter for advanced metering that supports large-scale deploy-ments, flexible configurations, and enhanced protection for consumer privacy and metering integrity. Our study starts with a threat analysis for advanced metering networks and formulates protection requirements for those threats. The attested meter satisfies these through a unified set of system interfaces based on virtual machines and attestation for the software agents of various parties that use the meter. We argue that this combination provides a well-adapted archi-tecture for advanced metering and we take a step towards demonstrating its feasibility with a prototype implementa-tion based on the Trusted Platform Module (TP...
The electricity industry has been developed through the introduction of the smart grid. This has bro...
A recent large-scale deployment of IP-based metering infrastructure in a secondary distribution syst...
Measuring the integrity of critical operating system components and securely storing these measureme...
Abstract: Advanced metering systems are comprised of state-of-the-art electronic/digital hardware an...
This paper describes a high assurance architecture for smart metering. Hacking the smart metering in...
Part 2: Secure Hardware SystemsInternational audienceDue to ongoing changes in the power grid toward...
1 Abstract — The recently emerging Advanced Metering Infrastructure (AMI) is envisioned to be one of...
© IFIP International Federation for Information Processing 2016. Due to ongoing changes in the power...
Smart metering has emerged as the next-generation of energy distribution, consumption, and monitorin...
Abstract — Conventional utility meters are increasingly being replaced with smart meters as smart me...
Advanced Metering Infrastructure (AMI) is drawing more attention due to various benefits which it br...
. We consider an environment in which many servers serve an even larger number of clients (e.g. the ...
Operational security assurance of a networked system requires providing constant and up-to-date evid...
Advanced metering infrastructure (AMI) is envisioned to be able to revolutionize the power grid and ...
In the given research evaluations were conducted of the security level for Advanced Metering Infrast...
The electricity industry has been developed through the introduction of the smart grid. This has bro...
A recent large-scale deployment of IP-based metering infrastructure in a secondary distribution syst...
Measuring the integrity of critical operating system components and securely storing these measureme...
Abstract: Advanced metering systems are comprised of state-of-the-art electronic/digital hardware an...
This paper describes a high assurance architecture for smart metering. Hacking the smart metering in...
Part 2: Secure Hardware SystemsInternational audienceDue to ongoing changes in the power grid toward...
1 Abstract — The recently emerging Advanced Metering Infrastructure (AMI) is envisioned to be one of...
© IFIP International Federation for Information Processing 2016. Due to ongoing changes in the power...
Smart metering has emerged as the next-generation of energy distribution, consumption, and monitorin...
Abstract — Conventional utility meters are increasingly being replaced with smart meters as smart me...
Advanced Metering Infrastructure (AMI) is drawing more attention due to various benefits which it br...
. We consider an environment in which many servers serve an even larger number of clients (e.g. the ...
Operational security assurance of a networked system requires providing constant and up-to-date evid...
Advanced metering infrastructure (AMI) is envisioned to be able to revolutionize the power grid and ...
In the given research evaluations were conducted of the security level for Advanced Metering Infrast...
The electricity industry has been developed through the introduction of the smart grid. This has bro...
A recent large-scale deployment of IP-based metering infrastructure in a secondary distribution syst...
Measuring the integrity of critical operating system components and securely storing these measureme...