We're about to acquire a significant new cyber- vulnerability. The world's energy utilities are starting to install hundreds of millions of 'smart meters' which contain a remote off switch. Its main purpose is to ensure that customers who default on their payments can be switched remotely to a prepay tariff; secondary purposes include supporting interruptible tariffs and implementing rolling power cuts at times of supply shortage. The off switch creates information security problems of a kind, and on a scale, that the energy companies have not had to face before. From the viewpoint of a cyber attacker - whether a hostile government agency, a terrorist organisation or even a militant environmental group - the ideal attack on a target country is to interrupt its citizens' electricity supply. This is the cyber equivalent of a nuclear strike; when electricity stops, then pretty soon everything else does too. Until now, the only plausible ways to do that involved attacks on critical generation, transmission and distribution assets, which are increasingly well defended. Smart meters change the game. The combination of commands that will cause meters to interrupt the supply, of applets and software upgrades that run in the meters, and of cryptographic keys that are used to authenticate these commands and software changes, create a new strategic vulnerability, which we discuss in this paper.
[1]
Raphael C.-W. Phan.
Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson
,
2009,
Cryptologia.
[2]
Frank A. Wolak,et al.
Diagnosing the California Electricity Crisis
,
2003
.
[3]
Ross J. Anderson.
Security engineering - a guide to building dependable distributed systems (2. ed.)
,
2001
.
[4]
Ross J. Anderson,et al.
On the Reliability of Electronic Payment Systems
,
1996,
IEEE Trans. Software Eng..
[5]
Steven B. Leeb,et al.
Power signature analysis
,
2003
.
[6]
G. W. Hart,et al.
Nonintrusive appliance load monitoring
,
1992,
Proc. IEEE.
[7]
Peter G. Neumann,et al.
The risks of key recovery, key escrow, and trusted third-party encryption
,
1997,
World Wide Web J..
[8]
Colette Cuijpers,et al.
Het wetsvoorstel 'slimme meters' : Een privacytoets op basis van art. 8 EVRM
,
2008
.
[9]
Ross J. Anderson,et al.
The snooping dragon: social-malware surveillance of the Tibetan movement
,
2009
.
[10]
Ross J. Anderson,et al.
On the Security Economics of Electricity Metering
,
2010,
WEIS.
[11]
M. Lisovich,et al.
Privacy Concerns in Upcoming Residential and Commercial Demand-Response Systems
,
2008
.