Security Vulnerability and Technology Status of AMI |
Jo, Han-Seong
(Commuications and Computing Lab. (CCL))
Lee, Yong-Gu (Commuications and Computing Lab. (CCL)) Jeong, Sang-In (Commuications and Computing Lab. (CCL)) Choe, Jin-Ho (Commuications and Computing Lab. (CCL)) |
1 | Available: http://www.boannews.com/plan/plan_view.asp?idx=20523. Accessed on June. 2017. |
2 | Available: http://www.koreatimes.com/article/20090409/515926. Accessed on June. 2017. |
3 | Travis Goodspeed, "AMI Hacking Demonstration", Control System Cyber Security Conference 2009, Oct. 2009. |
4 | Available: http://www.blackhat.com/html/bh-us-10/bh-us-10-home.html. Accessed on June. 2017 |
5 | Available: https://www.cyberscoop.com/blackout-ukraineprobably-bigger-deal-think/. Accessed on June. 2017. |
6 | Telecontrol equipment and systems-Part 5-104:Transmission protocols-Network access for KS C IEC 60870-5-101 using standard transport profiles. KS C IEC 60870-5-104. 2012. |
7 | Information technology - Security techniques - Information security management systems - Requirements. KS X ISO/IEC 27001. 2014. |
8 | The Smart Meter-Part 1:Function requirements. KS C 1231-1. 2016 |
9 | Security Requirements for Smart Grid. TTAK.KO-12.0182. 2011. |
10 | Security Mechanism of HAN Devices for Smart Grid. TTAK. KO-12.0258. 2014. |
11 | Security functional architecture for smart grid services using telecommunication networks. TTAE.IT-X.1111sup26. 2016. |
12 | Available: http://www.koit.co.kr/news/articleView.html?idxno=60595. Accessed on June. 2017. |
13 | Available: http://www.etnews.com/20170328000244. Accessed on June. 2017. |
14 | Security Standards for the Power System Information Infrastructure. IEC 62351. 2012. |
15 | IEEE Standards for Intelligent Electronic Devices Cyber Security Capabilities. IEEE Std 1686-2013. 2014. |
16 | Security and Privacy Controls for Federal Information Systems and Organizations. NIST SP 800-53. 2013. |
17 | Protection Profile for the Security Module of a Smart Metering System. BSI-CC-PP-0077-2013. 2013. |
18 | Guide to Industrial Control Systems (ICS) Security. NIST SP 800-82. 2011. |
19 | Available: https://phys.org/news/2009-11-brazil-blackouts-result-cyber-hacking.html. Accessed on June. 2017. |
20 | Guidelines for Smart Grid Cybersecurity. NISTIR 7628. 2014. |
21 | Farhangi, Hassan. "The path of the smart grid." IEEE power and energy magazine 8.1 (2010). |
22 | McDaniel, Patrick, and Stephen McLaughlin. "Security and privacy challenges in the smart grid." IEEE Security & Privacy 7.3 (2009). |
23 | Khurana, Himanshu, et al. "Smart-grid security issues." IEEE Security & Privacy 8.1 (2010). |
24 | Anderson, Ross, and Shailendra Fuloria. "Smart meter security: a survey." University of Cambridge Computer Laboratory, United Kingdom (2011). |
25 | 이재환, and 조성선. "스마트그리드의 기반 스마트미터 추진 동향 및 시사점, 정보통신산업진흥원." (2011). |
26 | Choi, Tae-Seop, et al. "Analysis of energy savings using smart metering system and IHD (in-home display)." Transmission & Distribution Conference & Exposition: Asia and Pacific, 2009. IEEE, 2009. |
27 | Prakash, Punya. "Data concentrators: The core of energy and data management." White paper, Texas Instruments (2013). |
28 | 윤성국, "스마트그리드 통신 네트워크 구성과 전력선 통신의 역할." 한국통신학회지 (정보와통신) 31.11 (2014): 95-101. |
29 | Hossain, Ekram, Zhu Han, and H. Vincent Poor. Smart grid communications and networking. Cambridge University Press, 2012. |
30 | Yu, Rong, et al. "Cognitive radio based hierarchical communications infrastructure for smart grid." IEEE network 25.5 (2011). |
31 | Available: http://blogs.gartner.com/it-glossary/home-areanetwork-han/. Accesed on June. 2017. |
32 | Available: http://www.najunews.kr/news/articleView.html?idxno=213258. Accessed on June. 2017. |
33 | Balakrishnan, Meera. "Smart Energy Solutions for Home Area Networks and Grid-End Applications." Proc. Smart Energy (2012): 67-73. |
34 | Carpenter, M., et al. "Advanced metering infrastructure attack methodology." InGuardians white paper (2009). |
35 | 남궁완, et al. "스마트미터 보안 연구." 정보보호학회지 20.5 (2010): 20-30. |
36 | 김신규, 전유석, and 서정택. "AMI 보안 취약점 점검 항목에 관한 연구." 정보보호학회지 22.5 (2012): 73-78. |
37 | Available: http://news.chosun.com/site/data/html_dir/2011/01/17/2011011700132.html. Accessed on June. 2017. |
38 | Available: http://www.boannews.com/media/view.asp?idx=23041. Accessed on June. 2017. |
39 | Available: http://thehackernews.com/2016/01/Ukraine-power-system-hacked.html. Accessed on June. 2017. |
40 | Available: https://krebsonsecurity.com/2012/04/fbi-smartmeter-hacks-likely-to-spread/.Accessed on June. 2017. |