Security Threats in Advanced Metering Infrastructure
dc.contributor.author | Ruan, HM | |
dc.contributor.author | Yang, YS | |
dc.contributor.author | Fan, IA | |
dc.contributor.author | Chai, CP | |
dc.contributor.author | Huang, CY | |
dc.contributor.author | Lei, CL | |
dc.coverage.spatial | Taipei, Taiwan | |
dc.date.accessioned | 2017-05-06T00:38:07Z | |
dc.date.available | 2017-05-06T00:38:07Z | |
dc.date.issued | 2011 | |
dc.description.abstract | Advanced metering infrastructure (AMI) is drawing more and more attention due to various benefits which it brings. Compared to traditional power grid systems or advanced meter reading (AMR) systems, AMI systems possess capabilities to provide improved management and predictability of power utilization, to monitor and detect fault occurrences, and to conserve energy. However, behind the various benefits brought by AMI, there still exist plenty of security threats. The open network used by AMIs is an extremely convenient interface for malicious attackers or network hackers to damage the AMI systems; on the other hand, the immature hardware design for AMI devices might cause physical breach points. | |
dc.identifier | ||
dc.identifier.uri | ||
dc.source | Joint Workshop on Information Security | |
dc.title | Security Threats in Advanced Metering Infrastructure | |
dc.type | Conference | |
pubs.author-url | ||
pubs.finish-date | 2011-10-06 | |
pubs.organisational-group | Duke | |
pubs.organisational-group | Statistical Science | |
pubs.organisational-group | Student | |
pubs.organisational-group | Trinity College of Arts & Sciences | |
pubs.publisher-url | ||
pubs.start-date | 2011-10-05 |
Files
Original bundle
- Name:
- Security Threats in Advanced Metering Revised.pdf
- Size:
- 125.72 KB
- Format:
- Adobe Portable Document Format