• norsk
    • English
  • English 
    • norsk
    • English
  • Login
View Item 
  •   Home
  • Fakultet for informasjonsteknologi og elektroteknikk (IE)
  • Institutt for informasjonssikkerhet og kommunikasjonsteknologi
  • View Item
  •   Home
  • Fakultet for informasjonsteknologi og elektroteknikk (IE)
  • Institutt for informasjonssikkerhet og kommunikasjonsteknologi
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Cyber Security in Smart Meters: Vulnerability Investigation in the Home Area Network Port

Fredriksen, Isa Agnete Halmøy
Master thesis
Thumbnail
View/Open
16018_FULLTEXT.pdf (25.82Mb)
16018_COVER.pdf (1.599Mb)
URI
http://hdl.handle.net/11250/2616180
Date
2018
Metadata
Show full item record
Collections
  • Institutt for informasjonssikkerhet og kommunikasjonsteknologi [2415]
Abstract
As a part of a modernized electric power system, mechanical electricity meters are being exchanged with smart meters. The smart meters are to be equipped with a communication interface that customers may use to get a better overview of their energy consumption and control their smart electricity consuming devices. The chosen interface is the Home Area Network (HAN) port. This thesis investigates the HAN and the HAN port in search for potential vulnerabilities. Through a literature review and a stepwise vulnerability study and testing, the HAN and the HAN port are investigated for potential vulnerabilities. The steps in the vulnerability study consist of identifying the assets of the system, model the flow of the assets in the system, consider potential threats and attacks and develop multiple scenarios concerning these. With respect to a limited number of attack scenarios, the thesis identifies potential vulnerabilities. The investigation has not been exhaustive, thus there might be other potential vulnerabilities. The literature review revealed that the smart meters are being rolled out before the security solution to protect HAN port data is ready. This last remark has been discussed as a potential vulnerability in the sense that it is implemented after the rollout, and not included from an early stage.
Publisher
NTNU

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit
 

 

Browse

ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDocument TypesJournalsThis CollectionBy Issue DateAuthorsTitlesSubjectsDocument TypesJournals

My Account

Login

Statistics

View Usage Statistics

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit