Page 10 - Landis+Gyr | pathway 05
P. 10
PAGE 10 | | STRATEGY protecting data flows The data flow in an Advanced Meter Management (AMM) system is exposed to the threat of intrusion. This is a risk in the field network, in the data center and at the system level. Currently, there are no widely applicable security standards for AMM systems. Vendors are tasked with providing their customers with comprehensive and future-proof security solutions. Questions about the safety of communication gateways security objectives such as confidentiality, integrity and data storage become more urgent as more data and authentication of data. By using a system that are sent by smart meters. The energy industry is focuses on these objectives, a utility can effectively concerned with the risk of widespread fraud. There manage security risks. is a danger that security vulnerabilities might be exploited on a significant scale. If meter readings can SECURITY OBJECTIVES be manipulated, whether by returning false readings The availability of data matters because utilities need from credit meters or forging authorization messages to be sure that they will have constant, uninterrupted to prepayment meters, this could lead to substantial access to their meter and billing data. It is vital that an losses. AMM system has the ability to identify and overcome denial-of-service (DoS) attacks or equipment Smart grid networks must have the capability to protect tampering that could be used to compromise an the integrity of data by implementing security controls AMM network and inhibit the monitoring and control that detect improper or unwanted modifications. functions the network provides. Network components must have a high degree of confidence that data are coming from a trusted Integrity can be achieved by implementing strategies source. Effective measures to ensure the security to detect any changes which have been made to the of the smart grid must be adoptable throughout the data. Changes can be made during data transmission utility, adaptable to current and future infrastructure and retrieval. Authentication is necessary because needs, and appropriate to the process or equipment utilities need to know who is accessing their data. This being secured. authentication is enabled by an identity management system. The system assigns access permission to Sending data between smart meters and the head-end identities. This prevents hackers from attempting system (HES) in an infrastructure that is not secure to access an AMM network through the physical is like sending postcards; potentially, everybody network in the field or at the head-end application can read them. The fundamental security challenge server and data center. is how to maintain the confidentiality, integrity, authenticity and availability of the smart meter Confidentiality is a universal concern because data which are transmitted over publicly accessible information privacy is a priority not only to the communication networks. Vendors need to offer utility, but also to the end customer. A utility needs a secure communication solution that allows their to ensure information such as scheduled customer customers to send specifically addressed letters billing data, meter alarm information and home area in sealed envelopes. The security architecture for network events, is protected against “unauthorized AMM systems should ensure system and network access”, which includes authenticated users lacking availability, while at the same time meeting critical the required permission as well as hackers.
   5   6   7   8   9   10   11   12   13   14   15