TY - GEN
T1 - Energy theft in the advanced metering infrastructure
AU - McLaughlin, Stephen
AU - Podkuiko, Dmitry
AU - McDaniel, Patrick
PY - 2010
Y1 - 2010
N2 - Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.
AB - Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.
UR - http://www.scopus.com/inward/record.url?scp=77955027376&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955027376&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-14379-3_15
DO - 10.1007/978-3-642-14379-3_15
M3 - Conference contribution
AN - SCOPUS:77955027376
SN - 3642143784
SN - 9783642143786
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 176
EP - 187
BT - Critical Information Infrastructures Security - 4th International Workshop, CRITIS 2009, Revised Papers
T2 - 4th International Workshop on Critical Information Infrastructures Security, CRITIS 2009
Y2 - 30 September 2009 through 2 October 2009
ER -