Abstract
New challenges for the electrical grid need complex IT systems and networking of most of all entities intoday’s power grid. Smart grids are a heavily discussed topic in the European Union and many other countries. Smart Meter Systems are going to be deployed worldwide. However, due to their complexity and interconnectivity, they have to deal with strict security and privacy requirements. As a result, German regulatory bodies decided a proactive approach and developed a protection profile for Common Criteria evaluation, i.e., specifying explicitly security requirements for gateway components.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literatur
Alperovitch, Dmitri: Revealed: Operation Shady RAT, McAfee Labs, 2011. Available online at: http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf
A. Alkassar, M. Scheibel, C. Stüble, A.-R. Sadeghi, M. Winandy: “Security Architecture for Device Encryption and VPN”, Proceedings of Information Security Solutions Europe (ISSE 2006).
Bundesamt für Sicherheit in der Informationstechnik (BSI): Protection Profile for the Gateway of a Smart Metering System, v 1.1.1 (final draft), 2012, URL: https://www.bsi.bund.de/Shared-Docs/Downloads/DE/BSI/SmartMeter/PPSmartMeter.pdf?__blob=publicationFile
Common Criteria for Information Technology Security Evaluation (CC), Version 3.1, Release 3, 2009. http://www.commoncriteriaportal.org/cc/
L. Catuogno, H. Löhr, M. Manulis, A.-R. Sadeghi, C. Stüble, M. Winandy: „Trusted Virtual Domains: Color Your Network“, Datenschutz und Datensicherheit (DuD), 2010, pp. 289-298.
European Multilaterally Secure Computing Base, http://www.emscb.de
J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, R. Cáceres: “Trusted Virtual Domains: Toward Secure Distributed Services”, Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep’05), 2005.
H. Kurth, G. Krummeck, C. Stüble, M. Weber, M. Winandy: HASK-PP: Protection Profile for a High Assurance Security Kernel, 2008, http://www.sirrix.com
Open Trusted Computing, http://www.opentc.net/
Sirrix AG security technologies. TURAYA.SecurityKernel. 2012 http://www.sirrix.com/content/pages/securitykernel_en.htm
M. Selhorst, C. Stüble, F. Feldmann, U. Gnaida: „Towards a trusted mobile desktop“, Trust and Trustworthy Computing (TRUST 2010), Volume 6101 of LNCS, Springer, 2010, pp. 78–94.
Trusted Computing Group (TCG), TPM Main Specification, Version 1.2, Revision 116, March 2011.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Gröne, M., Winandy, M. (2012). Applying a Security Kernel Framework to Smart Meter Gateways. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_24
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)