Identifying the Cyber Attack Surface of the Advanced Metering Infrastructure

As AMI is deployed throughout the power grid, identifying the attack surface is a necessary step in achieving cyber security in smart grids and AMI. An important first step to attaining cyber security is to define and illustrate the Cyber Attack Surface with respect to hardware and network configurations, protocols, and software.

[1]  Ward Jewell,et al.  Wireless AMI application and security for controlled home area networks , 2011, 2011 IEEE Power and Energy Society General Meeting.

[2]  Justin Searle HAN Attack Surface and the Open Smart Energy Gateway Project , 2014 .

[3]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[4]  Roger Meyer Security issues and vulnerability assessment of Zigbee enabled home area network implementations , 2012 .

[5]  Ross Anderson,et al.  Who Controls the off Switch? , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[6]  G. Manimaran,et al.  Cyber Attack Exposure Evaluation Framework for the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[7]  Jianhua Li,et al.  A denial of service attack in advanced metering infrastructure network , 2014, 2014 IEEE International Conference on Communications (ICC).

[8]  Eric D. Knapp,et al.  Chapter 3 – Hacking the Smart Grid , 2013 .

[9]  M. Schukat Securing critical infrastructure , 2014, The 10th International Conference on Digital Technologies 2014.

[10]  Siddharth Sridhar,et al.  Cyber attack-resilient control for smart grid , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[11]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[12]  William H. Sanders,et al.  AMI threats, intrusion detection requirements and deployment recommendations , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[13]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[14]  Eric A. M. Luiijf,et al.  Understanding Cyber Threats and Vulnerabilities , 2012, Critical Infrastructure Protection.

[15]  Christoph Sorge,et al.  Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.