Browse > Article
http://dx.doi.org/10.18770/KEPCO.2017.03.02.073

Security Vulnerability and Technology Status of AMI  

Jo, Han-Seong (Commuications and Computing Lab. (CCL))
Lee, Yong-Gu (Commuications and Computing Lab. (CCL))
Jeong, Sang-In (Commuications and Computing Lab. (CCL))
Choe, Jin-Ho (Commuications and Computing Lab. (CCL))
Publication Information
KEPCO Journal on Electric Power and Energy / v.3, no.2, 2017 , pp. 73-78 More about this Journal
Abstract
Recently, a number of foreign electric power companies including domestic Korea Electric Power Corporation (KEPCO) have actively engaged in the construction of a power grid with the concept of a smart grid. The Smart grid is a technology that increases the efficiency of the power by converging the information network with the power grid. It can maximize the energy efficiency through the two-way communication between the utility and the consumer. However, as the power grid converges with the information and communication network, security threats are increasing more than existing power grids. Due to the nature of the power grid, the damage caused by security threats is not only personal privacy but also economic loss of society. So smart grid becomes the target of hackers. In this paper, we discuss security vulnerabilities of Advanced Metering Infrastructure (AMI), which is a core technology of smart grid construction, and the corresponding security technologies to prevent security damage of smart grid.
Keywords
Smart Grid; Advanced Metering Infrastructure; AMI; Security;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Available: http://www.boannews.com/plan/plan_view.asp?idx=20523. Accessed on June. 2017.
2 Available: http://www.koreatimes.com/article/20090409/515926. Accessed on June. 2017.
3 Travis Goodspeed, "AMI Hacking Demonstration", Control System Cyber Security Conference 2009, Oct. 2009.
4 Available: http://www.blackhat.com/html/bh-us-10/bh-us-10-home.html. Accessed on June. 2017
5 Available: https://www.cyberscoop.com/blackout-ukraineprobably-bigger-deal-think/. Accessed on June. 2017.
6 Telecontrol equipment and systems-Part 5-104:Transmission protocols-Network access for KS C IEC 60870-5-101 using standard transport profiles. KS C IEC 60870-5-104. 2012.
7 Information technology - Security techniques - Information security management systems - Requirements. KS X ISO/IEC 27001. 2014.
8 The Smart Meter-Part 1:Function requirements. KS C 1231-1. 2016
9 Security Requirements for Smart Grid. TTAK.KO-12.0182. 2011.
10 Security Mechanism of HAN Devices for Smart Grid. TTAK. KO-12.0258. 2014.
11 Security functional architecture for smart grid services using telecommunication networks. TTAE.IT-X.1111sup26. 2016.
12 Available: http://www.koit.co.kr/news/articleView.html?idxno=60595. Accessed on June. 2017.
13 Available: http://www.etnews.com/20170328000244. Accessed on June. 2017.
14 Security Standards for the Power System Information Infrastructure. IEC 62351. 2012.
15 IEEE Standards for Intelligent Electronic Devices Cyber Security Capabilities. IEEE Std 1686-2013. 2014.
16 Security and Privacy Controls for Federal Information Systems and Organizations. NIST SP 800-53. 2013.
17 Protection Profile for the Security Module of a Smart Metering System. BSI-CC-PP-0077-2013. 2013.
18 Guide to Industrial Control Systems (ICS) Security. NIST SP 800-82. 2011.
19 Available: https://phys.org/news/2009-11-brazil-blackouts-result-cyber-hacking.html. Accessed on June. 2017.
20 Guidelines for Smart Grid Cybersecurity. NISTIR 7628. 2014.
21 Farhangi, Hassan. "The path of the smart grid." IEEE power and energy magazine 8.1 (2010).
22 McDaniel, Patrick, and Stephen McLaughlin. "Security and privacy challenges in the smart grid." IEEE Security & Privacy 7.3 (2009).
23 Khurana, Himanshu, et al. "Smart-grid security issues." IEEE Security & Privacy 8.1 (2010).
24 Anderson, Ross, and Shailendra Fuloria. "Smart meter security: a survey." University of Cambridge Computer Laboratory, United Kingdom (2011).
25 이재환, and 조성선. "스마트그리드의 기반 스마트미터 추진 동향 및 시사점, 정보통신산업진흥원." (2011).
26 Choi, Tae-Seop, et al. "Analysis of energy savings using smart metering system and IHD (in-home display)." Transmission & Distribution Conference & Exposition: Asia and Pacific, 2009. IEEE, 2009.
27 Prakash, Punya. "Data concentrators: The core of energy and data management." White paper, Texas Instruments (2013).
28 윤성국, "스마트그리드 통신 네트워크 구성과 전력선 통신의 역할." 한국통신학회지 (정보와통신) 31.11 (2014): 95-101.
29 Hossain, Ekram, Zhu Han, and H. Vincent Poor. Smart grid communications and networking. Cambridge University Press, 2012.
30 Yu, Rong, et al. "Cognitive radio based hierarchical communications infrastructure for smart grid." IEEE network 25.5 (2011).
31 Available: http://blogs.gartner.com/it-glossary/home-areanetwork-han/. Accesed on June. 2017.
32 Available: http://www.najunews.kr/news/articleView.html?idxno=213258. Accessed on June. 2017.
33 Balakrishnan, Meera. "Smart Energy Solutions for Home Area Networks and Grid-End Applications." Proc. Smart Energy (2012): 67-73.
34 Carpenter, M., et al. "Advanced metering infrastructure attack methodology." InGuardians white paper (2009).
35 남궁완, et al. "스마트미터 보안 연구." 정보보호학회지 20.5 (2010): 20-30.
36 김신규, 전유석, and 서정택. "AMI 보안 취약점 점검 항목에 관한 연구." 정보보호학회지 22.5 (2012): 73-78.
37 Available: http://news.chosun.com/site/data/html_dir/2011/01/17/2011011700132.html. Accessed on June. 2017.
38 Available: http://www.boannews.com/media/view.asp?idx=23041. Accessed on June. 2017.
39 Available: http://thehackernews.com/2016/01/Ukraine-power-system-hacked.html. Accessed on June. 2017.
40 Available: https://krebsonsecurity.com/2012/04/fbi-smartmeter-hacks-likely-to-spread/.Accessed on June. 2017.