Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.6.111

Protection Profile for Smart Meters: Vulnerability and Security Requirements Analysis  

Jung, Chul-Jo (Dept. of Information Security, Hoseo University)
Eun, Sun-Ki (Dept. of Information Security, Hoseo University)
Choi, Jin-Ho (Dept. of Information Security, Hoseo University)
Oh, Soo-Hyun (Dept. of Information Security, Hoseo University)
Kim, Hwan-Koo (Dept. of Information Security, Hoseo University)
Abstract
There is a growing interest in "smart grid" technology, especially after the government recently announced "low-carbon green-growth industry" project. A smart grid uses "smart meters", which can be deployed in any power-consuming places like homes and factories. It has been shown that smart meters have several security weaknesses. There is, however, no protection profile available for smart meters, which means that safety with using them is not guaranteed at all. This paper analyzes vulnerabilities of smart meters and the relevant attack methods, thereby deriving the security functions and requirements for smart meters. Finally, we propose a protection profile based on Common Criterion v3.l for smart meters.
Keywords
Smart grid; Smart meters; Protection Profile;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 윤신숙, 장대석, 김환구, 오수현, 하재철, 김석우, "보호프로파일 개발을 위한 보증등급 산정 기준에 관한 연구," 정보보호학회지, 17(6), pp. 57-66, 2007년 12월.   과학기술학회마을
2 UCAIUG:ASAP-Smart Grid, "Security Profile for Advanced Metering infrastructure," 2009.
3 곽진, 홍순원, 이완석, "보안토큰의 취약성/보안요구사항 분석 및 CC v3.1기반 보호프로파일 개발," 정보보호학회논문지, 18(2), pp.139-149, 2008년 4월.   과학기술학회마을
4 UCAIUG:AMI-SEC-ASAP, "AMI System Security Requirements," 2008.
5 이경복, 독고지은, 유지연, 이숙연, 임종인, "스마트 그리드에서의 소비자 참여와 보안 이슈,"한국정보보호학회지, 19(4), pp. 21-35, 2009년 8월.   과학기술학회마을
6 NIST-SGIP:CSWG, "Introduction To NISTIR 7628 Guidelines for Smart Grid Cyber Security," 2010.
7 IOActive, "Securing the Smart Grid," 2010.
8 Common Criteria for Information Technology Security Evaluation, Version 3.1, CCMB, Setp. 2006.
9 Common Methodology for Information Technology Security Evaluation, Version 3.1, CCMB, Setp. 2006.
10 InGuardians, "Advanved Metering Infrastructure Attack Methodology," 2009.
11 지식경제부, "지능형 전력망 추진정책 및 로드맵수립 계획," 2009. 6.