Energy theft in the advanced metering infrastructure

Stephen McLaughlin, Dmitry Podkuiko, Patrick McDaniel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

183 Scopus citations

Abstract

Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

Original languageEnglish (US)
Title of host publicationCritical Information Infrastructures Security - 4th International Workshop, CRITIS 2009, Revised Papers
Pages176-187
Number of pages12
DOIs
StatePublished - 2010
Event4th International Workshop on Critical Information Infrastructures Security, CRITIS 2009 - Bonn, Germany
Duration: Sep 30 2009Oct 2 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6027 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Workshop on Critical Information Infrastructures Security, CRITIS 2009
Country/TerritoryGermany
CityBonn
Period9/30/0910/2/09

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Energy theft in the advanced metering infrastructure'. Together they form a unique fingerprint.

Cite this