Skip to main content

Applying a Security Kernel Framework to Smart Meter Gateways

  • Chapter
  • First Online:
Book cover ISSE 2012 Securing Electronic Business Processes
  • 1237 Accesses

Abstract

New challenges for the electrical grid need complex IT systems and networking of most of all entities intoday’s power grid. Smart grids are a heavily discussed topic in the European Union and many other countries. Smart Meter Systems are going to be deployed worldwide. However, due to their complexity and interconnectivity, they have to deal with strict security and privacy requirements. As a result, German regulatory bodies decided a proactive approach and developed a protection profile for Common Criteria evaluation, i.e., specifying explicitly security requirements for gateway components.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. Alperovitch, Dmitri: Revealed: Operation Shady RAT, McAfee Labs, 2011. Available online at: http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf

  2. A. Alkassar, M. Scheibel, C. Stüble, A.-R. Sadeghi, M. Winandy: “Security Architecture for Device Encryption and VPN”, Proceedings of Information Security Solutions Europe (ISSE 2006).

    Google Scholar 

  3. Bundesamt für Sicherheit in der Informationstechnik (BSI): Protection Profile for the Gateway of a Smart Metering System, v 1.1.1 (final draft), 2012, URL: https://www.bsi.bund.de/Shared-Docs/Downloads/DE/BSI/SmartMeter/PPSmartMeter.pdf?__blob=publicationFile

  4. Common Criteria for Information Technology Security Evaluation (CC), Version 3.1, Release 3, 2009. http://www.commoncriteriaportal.org/cc/

  5. L. Catuogno, H. Löhr, M. Manulis, A.-R. Sadeghi, C. Stüble, M. Winandy: „Trusted Virtual Domains: Color Your Network“, Datenschutz und Datensicherheit (DuD), 2010, pp. 289-298.

    Google Scholar 

  6. European Multilaterally Secure Computing Base, http://www.emscb.de

  7. J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, R. Cáceres: “Trusted Virtual Domains: Toward Secure Distributed Services”, Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep’05), 2005.

    Google Scholar 

  8. H. Kurth, G. Krummeck, C. Stüble, M. Weber, M. Winandy: HASK-PP: Protection Profile for a High Assurance Security Kernel, 2008, http://www.sirrix.com

  9. Open Trusted Computing, http://www.opentc.net/

  10. Sirrix AG security technologies. TURAYA.SecurityKernel. 2012 http://www.sirrix.com/content/pages/securitykernel_en.htm

  11. M. Selhorst, C. Stüble, F. Feldmann, U. Gnaida: „Towards a trusted mobile desktop“, Trust and Trustworthy Computing (TRUST 2010), Volume 6101 of LNCS, Springer, 2010, pp. 78–94.

    Google Scholar 

  12. Trusted Computing Group (TCG), TPM Main Specification, Version 1.2, Revision 116, March 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Gröne .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Gröne, M., Winandy, M. (2012). Applying a Security Kernel Framework to Smart Meter Gateways. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_24

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics