Page 16 - Smart Metering Handbook
P. 16
DATA PROTECTION
AND PRIVACY
Interest surrounding the security of communications and data storage is
increasing as higher volumes of data are being created and transmitted by
smart metering systems.
It is the goal of the security architecture for a smart metering system to
ensure the availability of the communications network, while also meet-
ing other critical security objectives such as the confidentiality, integrity
and authenticity of users, devices and data. By employing a system that
focuses on these objectives a utility can successfully minimize security
risks.
The availability of data is fundamental. Utilities need to have constant and
uninterrupted access to their meter and billing data. It is vital that they
identify and prevent misuse of software and hardware that could lead to
a compromised smart metering system and inhibit critical monitoring and
control functions.
Integrity can be achieved by implementing cryptographic mechanisms to
detect any unexpected changes to data that occur during its transmission
and retrieval.
Authentication is necessary as utilities need to restrict the access to data
only to those devices and users whose identity has been verified and who
are permitted to use the data. This authentication is provided by an iden-
tity management system in which the system assigns access permission
to identities, and by cryptographic mechanisms during data transmis-
sion. This prevents hackers from accessing a smart metering system via
devices in the field, or at the head-end application server and data center.
16
AND PRIVACY
Interest surrounding the security of communications and data storage is
increasing as higher volumes of data are being created and transmitted by
smart metering systems.
It is the goal of the security architecture for a smart metering system to
ensure the availability of the communications network, while also meet-
ing other critical security objectives such as the confidentiality, integrity
and authenticity of users, devices and data. By employing a system that
focuses on these objectives a utility can successfully minimize security
risks.
The availability of data is fundamental. Utilities need to have constant and
uninterrupted access to their meter and billing data. It is vital that they
identify and prevent misuse of software and hardware that could lead to
a compromised smart metering system and inhibit critical monitoring and
control functions.
Integrity can be achieved by implementing cryptographic mechanisms to
detect any unexpected changes to data that occur during its transmission
and retrieval.
Authentication is necessary as utilities need to restrict the access to data
only to those devices and users whose identity has been verified and who
are permitted to use the data. This authentication is provided by an iden-
tity management system in which the system assigns access permission
to identities, and by cryptographic mechanisms during data transmis-
sion. This prevents hackers from accessing a smart metering system via
devices in the field, or at the head-end application server and data center.
16

