T&M
How to secure the smart meter
Keywords:smart grid meters sensors
This is article tackles different techniques to increase the security of the endpoints in the smart grid—meters and sensors that are dispersed far away from the watchful eyes of the utilities. Conventional attacks such as physical and logical attacks on the smart meter will be considered, as well as more coordinated attacks that might infiltrate the supply chain, causing utilities to deploy compromised meters. The technology to address these attacks exists today, has been used successfully for years in the financial payment-processing industry, and can readily be applied to the smart grid.
View the PDF document for more information.
Originally published by Maxim Integrated Products at www.maxim-ic.com as "Securing the Smart Meter".
Related Articles | Editor's Choice |
Comment on "How to secure the smart meter"
Visitor(To avoid code verification, simply login or register with us. It is fast and free!)
Top Ranked Articles
Webinars
Visit Asia Webinars to learn about the latest in technology and get practical design tips.
Search EE Times India