Abstract
The power grid is currently undergoing changes towards highly volatile and localized energy production and storage, supported by IT and communication components. Smart Metering is going to provide fine-grained measurement and automatic remote reading of consumption and production amounts. It enables flexible tariffing and dynamic load optimization, ultimately aiming at cost and consumption reduction. The related security requirements are mainly authenticity, integrity, and privacy of metering data. Even more challenging is grid automation, which is critical for the safety and availability of the grid. The overall situation calls for an integrated security architecture that not only addresses all relevant security threats but also satisfies functional, safety, performance, process integration, and economic side conditions.
In this article, we summarize and evaluate the IT security architecture and security requirements prescribed by the German BSI in their Smart Meter Gateway Protection Profile and related documents. For instance, there are problems regarding the integration of the required security module and multicast communication. We contrast their requirements with alternatives offering better protection against sophisticated local attacks and with a much simpler approach to communication security, which focuses on the core security needs of smart metering and is suitable for grid automation in distribution networks as well. We provide a formal model and analysis of the latter solution w.r.t. communication security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., Fuloria, S.: On the security economics of electricity metering. In: Workshop on the Economics of Information Security, WEIS (June 2010), http://weis2010.econinfosec.org/papers/session5/weis2010_anderson_r.pdf
AVANTSSAR: Automated VAlidatioN of Trust and Security of Service-oriented ARchitectures (2008–2010), http://avantssar.eu
BSI: Federal Office for Information Security, Bonn, Germany, https://www.bsi.bund.de/EN/
BSI: Protection Profile for the Gateway of a Smart Metering System (December 2012), https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/PP-SmartMeter.pdf
BSI: Protection Profile for the Security Module of a Smart Meter Gateway (December 2012), https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/PP_Security_%20Module.pdf
BSI: TR-03109 Smart Energy (2012), https://www.bsi.bund.de/DE/Themen/SmartMeter/TechnRichtlinie/TR_node.html
CC: Common Criteria for Information Technology Security Evaluation. ISO/IEC 15408, http://www.commoncriteriaportal.org/
Continental Automotive GmbH: Digital Tachograph DTCO 1381, Release 2.0 (June 2012), https://www.bsi.bund.de/SharedDocs/Zertifikate/CC/Digitaler_Tachograph-Vehicle_Unit/0559.html
EIT ICT Labs: Smart energy systems, http://www.eitictlabs.eu/action-lines/smart-energy-systems/
Energie-Control Austria, Vienna: Intelligente Messgeräte-Anforderungs-Verordnung, IMA-VO (November 2011), http://www.ris.bka.gv.at/GeltendeFassung.wxe?Abfrage=Bundesnormen&Gesetzesnummer=20007497
Fries, S., Falk, R., Sutor, A.: Smart grid information exchange securing the smart grid from the ground. In: Cuellar, J. (ed.) SmartGridSec 2012. LNCS, vol. 7823, pp. 26–44. Springer, Heidelberg (2013)
Jehle, C.: Rohrkrepierer Intelligenter Stromzähler? Telepolis online magazine. Heise Zeitschriften Verlag (2012), http://www.heise.de/tp/artikel/38/38139/1.html
Klimke, M., Shire, C., Technologies, I.: Smart Grid cyber attacks – Germany steps up the protection (September 2011), http://silicontrust.wordpress.com/2011/09/23/smart-grid-cyber-attacks-%E2%80%93-germany-steps-up-the-protection/
Krebs, B.: FBI: smart meter hacks likely to spread (April 2012), http://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/
Marlinspike, M.: SSL and the future of authenticity. Talk held at Black Hat (August 2011), http://www.thoughtcrime.org/blog/ssl-and-the-future-of-authenticity/
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)
NESSoS: Network of Excellence on Engineering Secure Future Internet Software Services and Systems (2010–2014), http://www.nessos-project.eu/
von Oheimb, D., Mödersheim, S.: ASLan++ — a formal security specification language for distributed systems. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2010. LNCS, vol. 6957, pp. 1–22. Springer, Heidelberg (2011), http://ddvo.net/papers/FMCO2010.html
Open Smart Grid User’s Group: Advanced Metering Infrastructure Security, http://osgug.ucaiug.org/utilisec/amisec/
Paverd, A.J., Martin, A.P.: Hardware security for device authentication in the Smart Grid. In: Cuellar, J. (ed.) SmartGridSec 2012. LNCS, vol. 7823, pp. 72–84. Springer, Heidelberg (2013)
Petrlic, R.: A privacy-preserving concept for smart grids. In: Sicherheit in vernetzten Systemen: 18. DFN Workshop, pp. B1–B14. Books on Demand GmbH (2010)
SPaCIoS: Secure Provision and Consumption in the Internet of Services (2010–2013), http://spacios.eu/
Task force on Smart Grid privacy and security of the Smart Meters Coordination Group: Privacy and Security approach. Version 0.9 (November 2012)
Trusted Computing Group: Trusted Platform Module (TPM), http://www.trustedcomputinggroup.org/developers/trusted_platform_module
TÃœV Informationstechnik GmbH, Essen, Germany, ( https://www.tuvit.de/en/ )
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
von Oheimb, D. (2013). IT Security Architecture Approaches for Smart Metering and Smart Grid. In: Cuellar, J. (eds) Smart Grid Security. SmartGridSec 2012. Lecture Notes in Computer Science, vol 7823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38030-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-38030-3_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38029-7
Online ISBN: 978-3-642-38030-3
eBook Packages: Computer ScienceComputer Science (R0)