Abstract
Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.
Chapter PDF
Similar content being viewed by others
References
Tøndel, I.A., Jaatun, M.G., Line, M.B.: Threat Modeling of AMI. In: Proceedings of the 7th International Conference on Critical Information Infrastructures Security, CRITIS 2012 (2012)
Telenor: Smart metering white paper – Best practices recommendation by Telenor Connexion (2013)
Gungor, V., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., Hancke, G.: Smart grid and smart homes: Key players and pilot projects. IEEE Industrial Electronics Magazine 6(4), 18–34 (2012)
3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and system Aspects; Security related network functions (Release 12), 3GPP TS 43.020 V12.0.0 (2013)
SDA: Smartcard Developer Association Clones Digital GSM Cellphones (1998), http://www.isaac.cs.berkeley.edu/isaac/gsm-press.html
Rao, J.R., Rohatgi, P., Scherzer, H., Tinguely, S.: Partitioning attacks: or how to rapidly clone some gsm cards. In: Proceedings of 2002 IEEE Symposium on Security and Privacy, pp. 31–41 (2002)
3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Specification of the GSM-MILENAGE Algorithms: An example algorithm set for the GSM authentication and key generation functions A3 and A8 (Release 8), 3GPP TS 55.205 V8.0.0 (2008)
Køien, G.M.: An introduction to access security in UMTS. IEEE Wireless Communications 11(1), 8–18 (2004)
Niemi, V., Nyberg, K.: UMTS security. John Wiley & Sons (2003)
3GPP: Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 11), 3GPP TS 33.102 V11.0.0 (2012)
3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General (Release 1999), 3GPP TS 35.205 V3.0.0 (2001)
3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements (Release 4), 3GPP TS 41.061 V4.0.0 (2002)
Xenakis, C.: Security measures and weaknesses of the gprs security architecture. International Journal of Network Security 6(2), 158–169 (2008)
3GPP: Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Network Domain Security (NDS); IP network layer security (Release 12), 3GPP TS 33.210 V12.0.0 (2012)
3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Closed User Group (CUG) Supplementary Services - Stage 1 (Release 9), 3GPP TS 22.085 V9.0.0 (2009)
Mitchell, C.J.: The security of the GSM air interface protocol (2001), http://www.ma.rhul.ac.uk/static/techrep/2001/RHUL-MA-2001-3.pdf
Stanley, N.: Mobile Phone Hacking for £1000. ComputerWeekly (2010), http://www.computerweekly.com/blogs/Bloor-on-IT-security/2010/04/mobile-phone-hacking-for-1000.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Jaatun, M.G., Tøndel, I.A., Køien, G.M. (2013). GPRS Security for Smart Meters. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds) Availability, Reliability, and Security in Information Systems and HCI. CD-ARES 2013. Lecture Notes in Computer Science, vol 8127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40511-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-40511-2_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40510-5
Online ISBN: 978-3-642-40511-2
eBook Packages: Computer ScienceComputer Science (R0)