An Implementation of a High Assurance Smart Meter Using Protected Module Architectures View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2016-09-17

AUTHORS

Jan Tobias Mühlberg , Sara Cleemput , Mustafa A. Mustafa , Jo Van Bulck , Bart Preneel , Frank Piessens

ABSTRACT

Due to ongoing changes in the power grid towards decentralised and highly volatile energy production, smart electricity meters are required to provide fine-grained measurement and timely remote access to consumption and production data. This enables flexible tariffing and dynamic load optimisation. As the power grid forms part of the critical infrastructure of our society, increasing the resilience of the grid’s software components against failures and attacks is vitally important.In this paper we explore the use of Protected Module Architectures (PMAs) to securely implement and deploy software for smart electricity meters. Outlining security challenges and an architectural solution in the light of security features provided by PMAs, we evaluate a proof-of-concept implementation of a security-focused smart metering scenario. Our implementation is based on Sancus, an embedded PMA for low-power microcontrollers. The evaluation of our prototype provides strong indication for the feasibility of implementing a PMA-based high assurance smart meter with a very small software Trusted Computing Base, which would be suitable for security certification and formal verification. More... »

PAGES

53-69

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_4

DOI

http://dx.doi.org/10.1007/978-3-319-45931-8_4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1015034946


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "M\u00fchlberg", 
        "givenName": "Jan Tobias", 
        "id": "sg:person.010050720751.71", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010050720751.71"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ESAT-COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven-Heverlee, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "ESAT-COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven-Heverlee, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Cleemput", 
        "givenName": "Sara", 
        "id": "sg:person.012021773643.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012021773643.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ESAT-COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven-Heverlee, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "ESAT-COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven-Heverlee, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mustafa", 
        "givenName": "Mustafa A.", 
        "id": "sg:person.014212315243.43", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014212315243.43"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Van Bulck", 
        "givenName": "Jo", 
        "id": "sg:person.014305520745.73", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014305520745.73"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ESAT-COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven-Heverlee, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "ESAT-COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven-Heverlee, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Piessens", 
        "givenName": "Frank", 
        "id": "sg:person.014464203672.97", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014464203672.97"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2016-09-17", 
    "datePublishedReg": "2016-09-17", 
    "description": "Due to ongoing changes in the power grid towards decentralised and highly volatile energy production, smart electricity meters are required to provide fine-grained measurement and timely remote access to consumption and production data. This enables flexible tariffing and dynamic load optimisation. As the power grid forms part of the critical infrastructure of our society, increasing the resilience of the grid\u2019s software components against failures and attacks is vitally important.In this paper we explore the use of Protected Module Architectures (PMAs) to securely implement and deploy software for smart electricity meters. Outlining security challenges and an architectural solution in the light of security features provided by PMAs, we evaluate a proof-of-concept implementation of a security-focused smart metering scenario. Our implementation is based on Sancus, an embedded PMA for low-power microcontrollers. The evaluation of our prototype provides strong indication for the feasibility of implementing a PMA-based high assurance smart meter with a very small software Trusted Computing Base, which would be suitable for security certification and formal verification.", 
    "editor": [
      {
        "familyName": "Foresti", 
        "givenName": "Sara", 
        "type": "Person"
      }, 
      {
        "familyName": "Lopez", 
        "givenName": "Javier", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-45931-8_4", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-45930-1", 
        "978-3-319-45931-8"
      ], 
      "name": "Information Security Theory and Practice", 
      "type": "Book"
    }, 
    "keywords": [
      "Protected Module Architectures", 
      "smart electricity meters", 
      "software components", 
      "smart meters", 
      "trusted computing base", 
      "smart metering scenario", 
      "module architecture", 
      "electricity meters", 
      "power grid", 
      "low-power microcontroller", 
      "computing base", 
      "formal verification", 
      "security features", 
      "concept implementation", 
      "security certification", 
      "remote access", 
      "security challenges", 
      "architectural solutions", 
      "critical infrastructure", 
      "volatile energy production", 
      "load optimization", 
      "architecture", 
      "implementation", 
      "energy production", 
      "Sancus", 
      "grid", 
      "production data", 
      "meters", 
      "software", 
      "infrastructure", 
      "microcontroller", 
      "tariffing", 
      "attacks", 
      "verification", 
      "prototype", 
      "scenarios", 
      "optimization", 
      "access", 
      "challenges", 
      "proof", 
      "features", 
      "feasibility", 
      "solution", 
      "measurements", 
      "certification", 
      "data", 
      "consumption", 
      "base", 
      "ongoing changes", 
      "evaluation", 
      "resilience", 
      "components", 
      "use", 
      "part", 
      "failure", 
      "production", 
      "strong indication", 
      "light", 
      "society", 
      "changes", 
      "indications", 
      "paper"
    ], 
    "name": "An Implementation of a High Assurance Smart Meter Using Protected Module Architectures", 
    "pagination": "53-69", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1015034946"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-45931-8_4"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-45931-8_4", 
      "https://app.dimensions.ai/details/publication/pub.1015034946"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:52", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_111.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-45931-8_4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_4'


 

This table displays all metadata directly associated to this object as RDF triples.

167 TRIPLES      22 PREDICATES      87 URIs      79 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-45931-8_4 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 anzsrc-for:0806
4 schema:author N86de1b38a64b476da5a33b9df1755f28
5 schema:datePublished 2016-09-17
6 schema:datePublishedReg 2016-09-17
7 schema:description Due to ongoing changes in the power grid towards decentralised and highly volatile energy production, smart electricity meters are required to provide fine-grained measurement and timely remote access to consumption and production data. This enables flexible tariffing and dynamic load optimisation. As the power grid forms part of the critical infrastructure of our society, increasing the resilience of the grid’s software components against failures and attacks is vitally important.In this paper we explore the use of Protected Module Architectures (PMAs) to securely implement and deploy software for smart electricity meters. Outlining security challenges and an architectural solution in the light of security features provided by PMAs, we evaluate a proof-of-concept implementation of a security-focused smart metering scenario. Our implementation is based on Sancus, an embedded PMA for low-power microcontrollers. The evaluation of our prototype provides strong indication for the feasibility of implementing a PMA-based high assurance smart meter with a very small software Trusted Computing Base, which would be suitable for security certification and formal verification.
8 schema:editor Nea95bb626e584448b02eaa45bf1d96a6
9 schema:genre chapter
10 schema:isAccessibleForFree true
11 schema:isPartOf N7731a210f5ff425cbd62202975b90945
12 schema:keywords Protected Module Architectures
13 Sancus
14 access
15 architectural solutions
16 architecture
17 attacks
18 base
19 certification
20 challenges
21 changes
22 components
23 computing base
24 concept implementation
25 consumption
26 critical infrastructure
27 data
28 electricity meters
29 energy production
30 evaluation
31 failure
32 feasibility
33 features
34 formal verification
35 grid
36 implementation
37 indications
38 infrastructure
39 light
40 load optimization
41 low-power microcontroller
42 measurements
43 meters
44 microcontroller
45 module architecture
46 ongoing changes
47 optimization
48 paper
49 part
50 power grid
51 production
52 production data
53 proof
54 prototype
55 remote access
56 resilience
57 scenarios
58 security certification
59 security challenges
60 security features
61 smart electricity meters
62 smart metering scenario
63 smart meters
64 society
65 software
66 software components
67 solution
68 strong indication
69 tariffing
70 trusted computing base
71 use
72 verification
73 volatile energy production
74 schema:name An Implementation of a High Assurance Smart Meter Using Protected Module Architectures
75 schema:pagination 53-69
76 schema:productId N36918bc2dd7f41a4aeaa84565391add7
77 N71434384977e4001b5bcc280d621ac75
78 schema:publisher Nad258be189c44fa89f3c1f91012f8e70
79 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015034946
80 https://doi.org/10.1007/978-3-319-45931-8_4
81 schema:sdDatePublished 2022-10-01T06:52
82 schema:sdLicense https://scigraph.springernature.com/explorer/license/
83 schema:sdPublisher Nfb670acf3a334190bc2838e5c015956f
84 schema:url https://doi.org/10.1007/978-3-319-45931-8_4
85 sgo:license sg:explorer/license/
86 sgo:sdDataset chapters
87 rdf:type schema:Chapter
88 N36918bc2dd7f41a4aeaa84565391add7 schema:name dimensions_id
89 schema:value pub.1015034946
90 rdf:type schema:PropertyValue
91 N3edb038da6a14d37b36df805e992cd4d rdf:first sg:person.014212315243.43
92 rdf:rest N7be3d985c45d42d197372401f7df771e
93 N4f5f4e73ead74687807c8c4c6ee3243e rdf:first sg:person.011115044357.39
94 rdf:rest Ncea837ddb20045d1a906553d83bd9647
95 N661a0d7e0b2744b38d809296ddc57c60 schema:familyName Foresti
96 schema:givenName Sara
97 rdf:type schema:Person
98 N673e872ef0df4e1b8fe331404bc84d86 schema:familyName Lopez
99 schema:givenName Javier
100 rdf:type schema:Person
101 N71434384977e4001b5bcc280d621ac75 schema:name doi
102 schema:value 10.1007/978-3-319-45931-8_4
103 rdf:type schema:PropertyValue
104 N7731a210f5ff425cbd62202975b90945 schema:isbn 978-3-319-45930-1
105 978-3-319-45931-8
106 schema:name Information Security Theory and Practice
107 rdf:type schema:Book
108 N7be3d985c45d42d197372401f7df771e rdf:first sg:person.014305520745.73
109 rdf:rest N4f5f4e73ead74687807c8c4c6ee3243e
110 N8622cf4431094565bd777ced992863ab rdf:first N673e872ef0df4e1b8fe331404bc84d86
111 rdf:rest rdf:nil
112 N86de1b38a64b476da5a33b9df1755f28 rdf:first sg:person.010050720751.71
113 rdf:rest N87da6a74ea244211bf7d472610587b45
114 N87da6a74ea244211bf7d472610587b45 rdf:first sg:person.012021773643.08
115 rdf:rest N3edb038da6a14d37b36df805e992cd4d
116 Nad258be189c44fa89f3c1f91012f8e70 schema:name Springer Nature
117 rdf:type schema:Organisation
118 Ncea837ddb20045d1a906553d83bd9647 rdf:first sg:person.014464203672.97
119 rdf:rest rdf:nil
120 Nea95bb626e584448b02eaa45bf1d96a6 rdf:first N661a0d7e0b2744b38d809296ddc57c60
121 rdf:rest N8622cf4431094565bd777ced992863ab
122 Nfb670acf3a334190bc2838e5c015956f schema:name Springer Nature - SN SciGraph project
123 rdf:type schema:Organization
124 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
125 schema:name Information and Computing Sciences
126 rdf:type schema:DefinedTerm
127 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
128 schema:name Computer Software
129 rdf:type schema:DefinedTerm
130 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
131 schema:name Information Systems
132 rdf:type schema:DefinedTerm
133 sg:person.010050720751.71 schema:affiliation grid-institutes:grid.5596.f
134 schema:familyName Mühlberg
135 schema:givenName Jan Tobias
136 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010050720751.71
137 rdf:type schema:Person
138 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.5596.f
139 schema:familyName Preneel
140 schema:givenName Bart
141 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
142 rdf:type schema:Person
143 sg:person.012021773643.08 schema:affiliation grid-institutes:grid.5596.f
144 schema:familyName Cleemput
145 schema:givenName Sara
146 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012021773643.08
147 rdf:type schema:Person
148 sg:person.014212315243.43 schema:affiliation grid-institutes:grid.5596.f
149 schema:familyName Mustafa
150 schema:givenName Mustafa A.
151 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014212315243.43
152 rdf:type schema:Person
153 sg:person.014305520745.73 schema:affiliation grid-institutes:grid.5596.f
154 schema:familyName Van Bulck
155 schema:givenName Jo
156 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014305520745.73
157 rdf:type schema:Person
158 sg:person.014464203672.97 schema:affiliation grid-institutes:grid.5596.f
159 schema:familyName Piessens
160 schema:givenName Frank
161 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014464203672.97
162 rdf:type schema:Person
163 grid-institutes:grid.5596.f schema:alternateName ESAT-COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven-Heverlee, Belgium
164 iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium
165 schema:name ESAT-COSIC and iMinds, KU Leuven, Kasteelpark Arenberg 10, 3001, Leuven-Heverlee, Belgium
166 iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium
167 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...