summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjaseg <git@jaseg.de>2022-06-08 16:55:26 +0200
committerjaseg <git@jaseg.de>2022-06-08 16:55:26 +0200
commit45972013f6419e34dbf2735a2b23d13afd0f0371 (patch)
treeb67722899763ed9bc9c4b306213cecd6f0976068
parented459a6fea252d8dc3c74812c2593d89726de8c9 (diff)
downloadmaster-thesis-45972013f6419e34dbf2735a2b23d13afd0f0371.tar.gz
master-thesis-45972013f6419e34dbf2735a2b23d13afd0f0371.tar.bz2
master-thesis-45972013f6419e34dbf2735a2b23d13afd0f0371.zip
Paper: WIP
-rw-r--r--notebooks/fig_out/freq_meas_trace_24h.pdfbin29378 -> 29378 bytes
-rw-r--r--notebooks/fig_out/freq_meas_trace_2h_1.pdfbin36704 -> 36704 bytes
-rw-r--r--notebooks/fig_out/freq_meas_trace_2h_2.pdfbin37043 -> 76520 bytes
-rw-r--r--paper/Makefile10
-rw-r--r--paper/safety-reset-paper.tex141
-rw-r--r--paper/safety-reset.bib1768
6 files changed, 80 insertions, 1839 deletions
diff --git a/notebooks/fig_out/freq_meas_trace_24h.pdf b/notebooks/fig_out/freq_meas_trace_24h.pdf
index 880ecbd..ae9d79a 100644
--- a/notebooks/fig_out/freq_meas_trace_24h.pdf
+++ b/notebooks/fig_out/freq_meas_trace_24h.pdf
Binary files differ
diff --git a/notebooks/fig_out/freq_meas_trace_2h_1.pdf b/notebooks/fig_out/freq_meas_trace_2h_1.pdf
index 9d25020..9be1bc9 100644
--- a/notebooks/fig_out/freq_meas_trace_2h_1.pdf
+++ b/notebooks/fig_out/freq_meas_trace_2h_1.pdf
Binary files differ
diff --git a/notebooks/fig_out/freq_meas_trace_2h_2.pdf b/notebooks/fig_out/freq_meas_trace_2h_2.pdf
index 77143a7..7ac5438 100644
--- a/notebooks/fig_out/freq_meas_trace_2h_2.pdf
+++ b/notebooks/fig_out/freq_meas_trace_2h_2.pdf
Binary files differ
diff --git a/paper/Makefile b/paper/Makefile
index 1d417d4..a391dfb 100644
--- a/paper/Makefile
+++ b/paper/Makefile
@@ -14,17 +14,17 @@ VERSION_STRING := $(shell git describe --tags --long --dirty)
all: ${main_tex}.pdf
-%.pdf: %.tex safety-reset.bib version.tex
+%.pdf: %.tex safety-reset-paper.bib version.tex
pdflatex -shell-escape $<
- biber $*
+ bibtex $*
pdflatex -shell-escape $<
.PHONY: once
-once: safety-reset-paper.tex safety-reset.bib version.tex
- biber safety-reset-paper
+once: safety-reset-paper.tex safety-reset-paper.bib version.tex
+ bibtex safety-reset-paper
pdflatex -shell-escape $<
-version.tex: ${main_tex}.tex safety-reset.bib
+version.tex: ${main_tex}.tex safety-reset-paper.bib
echo "${VERSION_STRING}" > $@
resources/%.pdf: $(LAB_PATH)/%.ipynb
diff --git a/paper/safety-reset-paper.tex b/paper/safety-reset-paper.tex
index be7d40e..fe8097d 100644
--- a/paper/safety-reset-paper.tex
+++ b/paper/safety-reset-paper.tex
@@ -1,16 +1,6 @@
\documentclass[letterpaper,twocolumn,10pt]{article}
\usepackage{usenix}
-\usepackage[T1]{fontenc}
-\usepackage[
- backend=biber,
- style=numeric,
- natbib=true,
- url=false,
- doi=true,
- eprint=false
- ]{biblatex}
-\addbibresource{safety-reset.bib}
\usepackage{amssymb,amsmath}
\usepackage{eurosym}
\usepackage{wasysym}
@@ -35,8 +25,8 @@
% https://eepublicdownloads.entsoe.eu/clean-documents/pre2015/publications/entsoe/Operation_Handbook/Policy_1_Appendix%20_final.pdf
\date{}
-\title{Ripples in the Pond: Transmitting Information through Grid Frequency Modulation}
-\author{Jan Sebastian Götte \and Liran Katzir \and Björn Scheuermann}
+\title{\large\bf Ripples in the Pond:\\Transmitting Information through Grid Frequency Modulation}
+\author{{\rm Jan Sebastian Götte}\\TU Darmstadt \and {\rm Liran Katzir}\\Tel Aviv University\and {\rm Björn Scheuermann}\\TU Darmstadt}
%\institute{TU Darmstadt\\ Communication Networks Lab\\ \email{safetyreset@jaseg.de}
%\and Tel Aviv University\\ Faculty of Engineering\\ \email{lirankat@tau.ac.il}
%\and TU Darmstadt\\ Communication Networks Lab\\ \email{scheuermann@informatik.hu-berlin.de}}
@@ -45,29 +35,25 @@
%things'' \and Cyber-physical systems \and Hardware security \and Network Security \and Energy systems \and Signal theory}
\begin{abstract}
- Previous work has explored the scenario of an attacker compromising a large number of consumer devices, and
- modulating the power of these devices to cause large load swings at particular resonant frequencies of the
- electrical grid's control systems that ultimately cause a large-scale outage~\cite{ctap+11,wu01}. Previous work has
- focused on attacks using smart meters with integrated remote disconnect switches as first proposed
- in~\cite{anderson01}, but the same attack scenario also applies to large IoT devices such as IoT-equipped air
- conditioners or central heating systems.
-
- Prior work on mitigation of this attack scenario includes generic firmware hardening techniquies % FIXME citation
- and reducing the susceptibility of the electrical grid towards these resonant oscillation modes~\cite{entsoe01}.
- In this paper, we will complement these mitigation efforts by considering the recovery process after a successful
- attack. To transmission system operators (TSOs), the major challenge after such a Smart Meter-triggered outage is
- that the attacker will likely persist through the outage, and compromised Smart Meters will resume malicious
- activity after their power is restored. In the event of such an attack, TSOs would need a way to remotely put these
- compromised devices into a \emph{safe} mode of operation. For this purpose, we propose a remote-controllable
- \emph{Safety reest} that is designed to remain operational even during a large-scale attack.
-
- Given that public telecommunications networks including the internet, cellular networks, and LoRa base stations may
- also be disrupted during a blackout, the challenging aspect of this \emph{Safety Reset} is the communication channel
- between TSO and the smart meter. For this purpose, in this paper we propose a simple yet effective communication
- channel based on modulating grid frequency by modulating the power of a connected load or generator. Our proposed
- communciation channel (1) requires minimal infrastructure, (2) has a reach spanning the entire power grid and (3) is
- fully independent of other telecommunication networks and functions even under severe disruption of the grid. The
- resulting safety reset can be applied to any grid-connected device including smart meters and IoT devices.
+ The dependence of the electrical grid on networked control systems is steadily rising. While utilities are defending
+ their side of the grid effectively through rigorous IT security measures such as physically separated control
+ networks, the increasing number of networked devices on the consumer side such as smart meters or large
+ IoT-connected appliances such as air conditioners are much harder to secure due to their heterogeneity. We consider
+ a crisis scenario in which an attacker compromises a large number of consumer-side devices and modulates their
+ electrical to destabilize the grid and cause an electrical outage~\cite{ctap+11,wu01,zlmz+21,kgma21,smp18,hcb19}.
+
+ In this paper propose a broadcast channel based on the modulation of grid frequency through which utility operators
+ can issue commands to devices at the consumer premises both during an attack for mitigation and in its wake to aid
+ recovery. Our proposed grid frequency modulation (GFM) channel is independent of other telecommunication networks.
+ It is resilient towards localized blackouts and it is operational immediately as soon as power is restored.
+
+ Based on our GFM broadcast channel we propose a ``safety reset'' system to mitigate an ongoing attack by disabling a
+ device's network interfaces and restting its control functions. It can also be used in the wake of an attack to aid
+ recovery by shutting down non-essential loads to reduce strain on the grid.
+
+ To validate our proposed design, we conducted simulations based on measured grid frequency behavior. Based on these
+ simulations, we performed an experimental validation on simulated grid voltage waveforms using a smart meter
+ equipped with a prototype safety reset system based on an inexpensive commodity microcontroller.
\end{abstract}
\section{Introduction}
@@ -79,12 +65,15 @@ their interactions have not yet received much attention.
In this paper, we consider the previously proposed scenario where a large number of compromised consumer devices is used
alone or in conjunction with an attack on the grid's central SCADA systems to destabilize the grid by rapidly modulating
-the total connected load~\cite{ctap+11,wu01}. Previous work considered compromised smart meters with integrated remote
-disconnect switches as likely candidates for such an attack, but the same attack can also be performed using compromised
-IoT devices. Such attacks are hard to mitigate, and existing literature focuses on hardening device firmware to prevent
+the total connected load~\cite{ctap+11,wu01,zlmz+21,kgma21,smp18,hcb19}. Several devices have been identified as likely
+targets for such an attack including smart meters with integrated remote disconnect switches~\cite{ctap+11,anderson01},
+large IoT-connected appliances~\cite{smp18,hcb19,chl20,olkd20} and electric vehicle
+chargers~\cite{kgma21,zlmz+21,olkd20}. Such attacks are hard to mitigate, and existing literature focuses on hardening
+grid control systems~\cite{kgma21,lzlw+20,lam21,zlmz+21} and device firmware\cite{mpdm+10,smp18,zb20,yomu+20} to prevent
compromise. Despite the infeasibility of perfect firmware security, there is little research on \emph{post-compromise}
-mitigation approaches. A core issue with post-attack mitigation is that the devices normal network connection may not
-work due to the attack and as such an out-of-band communication channel is necessary.
+mitigation approaches. A core issue with post-attack mitigation is that network connections such as internet and
+cellular networks between the utility and devices on consumer premises may not work due to the attack. Thus, mitigation
+strategies that involve devices on the consumer premises will need an out-of-band communication channel.
We propose a \emph{safety reset} controller that is controlled through a novel, resilient, grid-wide powerline
communication technique. Our safety reset controller can be fitted into any Smart Meter or IoT device. Its purpose is to
@@ -92,14 +81,31 @@ await an out-of-band command to put the device into a safe state (e.g. \emph{rel
interrupts attacker control over the device. The safety reset controller is separated from the system's main application
controller and does not have any conventional network connections to reduce attack surface and cost.
-We propose a resilient grid-wide broadcast channel based on modulating grid frequency. This channel can be operated by
-transmission system operators (TSOs) even during black-start recovery procedures and in this situation bridges the gap
-between the TSO's private network and the consumer devices. To demonstrate our proposed channel, we have implemented a
-system that transmits error-corrected and cryptographically secured commands.
-
-Our approach differs from traditional Powerline Communication (PLC) systems in that it reaches every device within one
-synchronous area as the signal is embedded into the fundamental grid frequency. Traditional PLC uses a superimposed
-voltage, which is quickly attenuated across long distances.
+To facilitate resilient communication between the grid operator and the safety reset controller, we propose a grid-wide
+broadcast channel based on grid frequency modulation (GFM). This channel can be operated by transmission system
+operators (TSOs) even during black-start recovery procedures and it bridges the gap between the TSO's private control
+network and consumer devices that can not economically be equipped with other resilient communication techniques such as
+satellite transceivers. To demonstrate our proposed channel, we have implemented a system that transmits error-corrected
+and cryptographically secured commands through an emulated grid frequency-modulated voltage waveform to an off-the-shelf
+smart meter equipped with a prototype safety reset controller based on a small off-the-shelf microcontroller.
+
+The frequency behavior of the electrical grid can be analyzed by examining the grid as a large collection of mechanical
+oscillators coupled through the grid via the electromotive force~\cite{rogers01,wcje+12}. The generators and motors that
+are electromagnetically coupled through the grid's transmission lines and transformers run synchronously with each
+other, with only minor localized variations in their rotation angle. The dynamic behavior of grid frequency is a direct
+product of this electromechanical coupling: With increasing load, frequency drops because shafts move slower under
+higher torque, and consequentially with decreasing load frequency rises. Industrial control systems keep frequency close
+to its nominal value over time spans of minutes or hours, but at shorter time frames the combined inertia of all
+grid-connected generators and motors is what regulates frequency.
+
+Grid frequency modulation works by quickly modulating the power of a large, grid-connected load or generator. When this
+modulation is at low amplitude and high frequency, it is below the thresholds set for the grid's automated control
+systems and monitoring systems and it will directly affect frequency according to the grid's inertia. GFM differs from
+traditional Powerline Communication (PLC) systems in that it reaches every device within one synchronous area as the
+signal is embedded into the fundamental grid frequency. Traditional PLC uses a superimposed voltage, which is quickly
+attenuated across long distances. Practically speaking, using GFM a single large transmitter can cover an entire
+synchronous area, while in traditional PLC hundreds or thousands of smaller transmitters would be necessary. Unlike
+traditional PLC, any large industrial load that allows for fast computer control can act as a GFM transmitter.
\begin{figure}
\centering
@@ -109,17 +115,18 @@ voltage, which is quickly attenuated across long distances.
\label{fig_intro_flowchart}
\end{figure}
-Figure~\ref{fig_intro_flowchart} shows an overview of our concept. Two scenarios for its application are before or
-during a cyberattack, to stop an attack on the electrical grid in its tracks, and after an attack while power is being
-restored to prevent a repeated attack. In both scenarios, our concept is independent of telecommunication networks (such
-as the internet or cellular networks) as well as broadcast systems (such as cable television or terrestrial broadcast
-radio) while requiring only inexpensive signal processing hardware and no external antennas (such as are needed for
-satellite communication). A grid frequency-based system can function as long as power is still available, or as soon as
-power is restored after the attack. One powerful function this allows is ``flushing out`` an attacker from compromised
-smart meters after an attack, before restoring smart meter internet connectivity.
+Figure~\ref{fig_intro_flowchart} shows an overview of our concept, where a large aluminium smelter has been temporarily
+re-purposed as a GFM transmitter. Two scenarios for its application are before or during a cyberattack, to stop an
+attack on the electrical grid in its tracks, and after an attack while power is being restored to prevent a repeated
+attack. In both scenarios, our concept is independent of telecommunication networks (such as the internet or cellular
+networks) as well as broadcast systems (such as cable television or terrestrial broadcast radio) while requiring only
+inexpensive signal processing hardware and no external antennas (such as are needed for satellite communication). A grid
+frequency-based system can function as long as power is still available, or as soon as power is restored after the
+attack. One powerful function this allows is ``flushing out`` an attacker from compromised smart meters after an attack,
+before restoring smart meter internet connectivity.
Using simulations we have determined that control of a $\SI{25}{\mega\watt}$ load such as a large aluminium smelter,
-load bank or photovoltaic farm would allow for the transmission of a crytographically secured \emph{reset} signal within
+load bank or photovoltaic farm would allow for the transmission of a crytographically secured safety reset signal within
$15$ minutes. We have designed and constructed a proof-of-concept prototype receiver that demonstrates the feasibility
of decoding such signals on a resource-constrained microcontroller.
@@ -172,9 +179,10 @@ restore the grid to its normal state.
\subsection{Contents}
Starting from a high level architecture, we have carried out simulations of our concept's performance under real-world
-conditions. Based on these simulations we implemented an end-to-end prototype of our proposed safety reset controller as
-part of a realistic smart meter demonstrator. Finally, we experimentally validated our results and we will conclude with
-an outline of further steps towards a practical implementation.
+conditions using measured grid frequency data. Based on these simulations we implemented an end-to-end prototype of our
+proposed safety reset controller as part of a realistic smart meter demonstrator. Finally, we experimentally validated
+our results based on a simulated mains voltage signal and we will conclude with an outline of further steps towards a
+practical implementation.
This work contains the following contributions:
\begin{enumerate}[topsep=4pt]
@@ -494,14 +502,14 @@ from $\SI{0.2}{\hertz}$ to $\SI{2}{\hertz}$.
\begin{figure}
\centering
- \includegraphics[width=0.4\textwidth]{../notebooks/fig_out/dsss_gold_nbits_overview}
+ \includegraphics[width=0.45\textwidth]{../notebooks/fig_out/dsss_gold_nbits_overview}
\caption{Symbol Error Rate as a function of modulation amplitude for Gold sequences of several lengths.}
\label{fig_ser_nbits}
\end{figure}
\begin{figure}
\centering
- \hspace*{-1cm}\includegraphics[width=1.2\textwidth]{../notebooks/fig_out/dsss_thf_amplitude_5678}
+ \hspace*{-1cm}\includegraphics[width=0.5\textwidth]{../notebooks/fig_out/dsss_thf_amplitude_5678}
\caption{SER vs.\ Amplitude and detection threshold. Detection threshold is set as a factor of background noise
level.}
\label{fig_ser_thf}
@@ -509,7 +517,7 @@ from $\SI{0.2}{\hertz}$ to $\SI{2}{\hertz}$.
\begin{figure}
\centering
- \hspace*{-1cm}\includegraphics[width=1.2\textwidth]{../notebooks/fig_out/chip_duration_sensitivity_6}
+ \hspace*{-1cm}\includegraphics[width=0.5\textwidth]{../notebooks/fig_out/chip_duration_sensitivity_6}
\vspace*{-1cm}
\caption{SER vs.\ DSSS chip duration.}
\label{fig_ser_chip}
@@ -542,7 +550,7 @@ need for computationally expensive public key cryptography inside the smart mete
\begin{figure}
\centering
- \includegraphics[width=0.6\textwidth]{prototype.jpg}
+ \includegraphics[width=0.45\textwidth]{prototype.jpg}
\caption{The completed prototype setup. The board on the left is the safety reset microcontroller. It is connected
to the smart meter in the middle through an adapter board. The top left contains a USB hub with debug interfaces to
the reset microcontroller. The cables on the bottom left are the debug USB cable and the \SI{3.5}{\milli\meter}
@@ -571,7 +579,7 @@ the meter's display after boot-up.
\begin{figure}
\centering
- \includegraphics[width=\textwidth]{prototype_schema}
+ \includegraphics[width=0.45\textwidth]{prototype_schema}
\caption{The signal processing chain of our demonstrator.}
\label{fig_demo_sig_schema}
\end{figure}
@@ -652,7 +660,8 @@ commercially viable.
Source code and EDA designs are available at the public repository listed at the end of this document.
-\printbibliography[heading=bibintoc]
+\bibliographystyle{plain}
+\bibliography{\jobname}
\center{
\center{This is version \texttt{\input{version.tex}\unskip} of this paper, generated on \today. The git repository
diff --git a/paper/safety-reset.bib b/paper/safety-reset.bib
deleted file mode 100644
index d448933..0000000
--- a/paper/safety-reset.bib
+++ /dev/null
@@ -1,1768 +0,0 @@
-@comment{x-kbibtex-encoding=utf-8}
-
-@article{pinto01,
- address = {New York, NY, USA},
- articleno = {130},
- author = {Sandro Pinto and Nuno Santos},
- doi = {10.1145/3291047},
- issn = {0360-0300},
- issue_date = {February 2019},
- journal = {ACM Comput. Surv.},
- keywords = {security; TEE; virtualization; Arm; TrustZone; survey},
- month = jan,
- number = {6},
- numpages = {36},
- publisher = {Association for Computing Machinery},
- title = {Demystifying Arm TrustZone: A Comprehensive Survey},
- url = {https://doi.org/10.1145/3291047},
- volume = {51},
- year = {2019}
-}
-
-@inproceedings{kanonov01,
- author = {Uri Kanonov and Avishai Wool},
- booktitle = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices},
- pages = {3–12},
- title = {Secure containers in Android: the Samsung KNOX case study},
- year = {2016}
-}
-
-@inproceedings{rosenberg01,
- author = {Dan Rosenberg},
- booktitle = {Black Hat conference},
- title = {Qsee trustzone kernel integer over flow vulnerability},
- year = {2014}
-}
-
-@online{bnetza1,
- author = {{German Government Bundesnetzagentur}},
- publisher = {Bundesnetzagentur},
- title = {Smart Meter},
- url = {https://web.archive.org/web/20190919100204/https://www.bundesnetzagentur.de/DE/Sachgebiete/ElektrizitaetundGas/Verbraucher/NetzanschlussUndMessung/SmartMetering/SmartMeter_node.html},
- urldate = {2019-09-19},
- year = {2019}
-}
-
-@online{bmwi1,
- author = {{Bundesamt für Sicherheit in der Informationstechnik} and {Bundesministerium für Wirtschaft und Energie}},
- month = jan,
- publisher = {Bundesministerium für Wirtschaft und Energie},
- title = {Standardisierungsstrategie zur sektorübergreifenden Digitalisierung nach dem Gesetz zur Digitalisierung der Energiewende},
- url = {https://web.archive.org/web/20190919100713/https://www.bmwi.de/Redaktion/DE/Downloads/S-T/standardisierungsstrategie.pdf},
- urldate = {2019-09-19},
- year = {2019}
-}
-
-@unpublished{bsi-tr-03109,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- month = nov,
- organization = {{Bundesamt für Sicherheit in der Informationstechnik}},
- title = {Technische Richtlinie BSI TR-03109},
- url = {https://web.archive.org/web/20190919102010/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR03109.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=3},
- urldate = {2019-09-19},
- year = {2015}
-}
-
-@unpublished{bsi-tr-03109-1,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- month = jan,
- number = {v1.0.1},
- organization = {{Bundesamt für Sicherheit in der Informationstechnik}},
- title = {TR-03109-1: Anforderungen an die Interoperabilität der Kommunikationseinheit eines intelligenten Messsystems},
- url = {https://web.archive.org/web/20190919102217/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR03109-1.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=3},
- urldate = {2019-09-19},
- year = {2019}
-}
-
-@unpublished{bsi-tr-03109-6,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- month = nov,
- number = {v1.0},
- organization = {{Bundesamt für Sicherheit in der Informationstechnik}},
- title = {TR-03109-6: Smart Meter Gateway Administration},
- url = {https://web.archive.org/web/20190919102651/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-6-Smart_Meter_Gateway_Administration.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=4},
- urldate = {2019-09-19},
- year = {2015}
-}
-
-@unpublished{bsi-tr-03109-4,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- month = aug,
- number = {v1.2.1},
- organization = {{Bundesamt für Sicherheit in der Informationstechnik}},
- title = {TR-03109-4: Public Key Infrastruktur für Smart Meter Gateways},
- url = {https://web.archive.org/web/20190919102649/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-4_PKI.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=3},
- urldate = {2019-09-19},
- year = {2017}
-}
-
-@unpublished{bsi-tr-03109-2,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- month = dec,
- number = {v1.1},
- organization = {{Bundesamt für Sicherheit in der Informationstechnik}},
- title = {TR-03109-2: Smart Meter Gateway - Anforderungen an die Funktionalität und Interoperabilität des Sicherheitsmoduls},
- url = {https://web.archive.org/web/20190919102644/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-2-Anforderungen_an_die_Funktionalitaet.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=3},
- urldate = {2019-09-19},
- year = {2014}
-}
-
-@unpublished{bsi-tr-03109-3,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- month = apr,
- organization = {{Bundesamt für Sicherheit in der Informationstechnik}},
- title = {TR-03109-3: Kryptographische Vorgaben für die Infrastruktur von intelligenten Messsystemen},
- url = {https://web.archive.org/web/20190919102648/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-3_Kryptographische_Vorgaben.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=1},
- urldate = {2019-09-19},
- year = {2014}
-}
-
-@unpublished{bsi-tr-03109-1-I,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = mar,
- organization = {{Bundesamt für Sicherheit in der Informationstechnik}},
- title = {TR-03109-1 Anlage I: CMS-Datenformat für die Inhaltsdatenverschlüsselung und -signatur},
- url = {https://web.archive.org/web/20190919104234/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-1\_Anlage\_CMS.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2\_cid351?\_\_blob=publicationFile\&v=2},
- urldate = {2019-09-19},
- year = {2013}
-}
-
-@unpublished{bsi-tr-03109-1-II,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = mar,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-1 Anlage II: COSEM/HTTP Webservices},
- url = {https://web.archive.org/web/20190919104234/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-1\_Anlage\_CMS.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2\_cid351?\_\_blob=publicationFile\&v=2},
- urldate = {2019-09-19},
- year = {2012}
-}
-
-@unpublished{bsi-tr-03109-1-IIIb,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = mar,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-1 Anlage III: Feinspezifikation "Drahtlose LMN-Schnittstelle" Teil b: "OMS Technical Report Security"},
- url = {https://web.archive.org/web/20190919110101/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-1_Anlage_Feinspezifikation_Drahtlose_LMN-Schnittstelle-Teil2.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=2},
- urldate = {2019-09-19},
- year = {2013}
-}
-
-@unpublished{bsi-tr-03109-1-IIIa,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = mar,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-1 Anlage III: Feinspezifikation "Drahtlose LMN-Schnittstelle" Teil a: "OMS Specification Volume 2, Primary Communication"},
- url = {https://web.archive.org/web/20190919110054/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-1_Anlage_Feinspezifikation_Drahtlose_LMN-Schnittstelle.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=2},
- urldate = {2019-09-19},
- year = {2013}
-}
-
-@unpublished{bsi-tr-03109-1-IVa,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = mar,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-1 Anlage IV: Feinspezifikation "Drahtgebundene LMN-Schnittstelle" Teil a: "HDLC für LMN"},
- url = {https://web.archive.org/web/20190919110101/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-1_Anlage_Feinspezifikation_Drahtlose_LMN-Schnittstelle-Teil2.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=2},
- urldate = {2019-09-19},
- year = {2013}
-}
-
-@unpublished{bsi-tr-03109-1-IVb,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = mar,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-1 Anlage IV: Feinspezifikation "Drahtgebundene LMN-Schnittstelle" Teil b: "SML Smart Message Language"},
- url = {https://web.archive.org/web/20190919110756/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-1\_Anlage\_Feinspezifikation\_Drahtgebundene\_LMN-Schnittstelle\_Teilb.pdf jsessionid=BD197BE4CB44C76EE7945640B8703844.2\_cid351?\_\_blob=publicationFile\&v=2},
- urldate = {2019-09-19},
- year = {2013}
-}
-
-@unpublished{bsi-tr-03109-1-VI,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = mar,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-1 Anlage VI: Betriebsprozesse},
- url = {https://web.archive.org/web/20190919111203/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-1_Anlage_Betriebsprozesse.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=1},
- urldate = {2019-09-19},
- year = {2013}
-}
-
-@unpublished{bsi-tr-03109-1-VII,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = jan,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-1 Anlage VII: Interoperabilitätsmodell und Geräteprofile für Smart-Meter- Gateways},
- url = {https://web.archive.org/web/20190919111350/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-1_Anlage_Interop-Modell-Geraeteprofile.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=2},
- urldate = {2019-09-19},
- year = {2019}
-}
-
-@unpublished{bsi-tr-03109-2-a,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.1},
- month = dec,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-2 Anhang A: Smart Meter Gateway Sicherheitsmodul Use Cases},
- url = {https://web.archive.org/web/20190919111540/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-2-Sicherheitsmodul_Use_Cases.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=2},
- urldate = {2019-09-19},
- year = {2014}
-}
-
-@unpublished{bsi-tr-03109-2-b,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {v1.0},
- month = jun,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-2 Anhang B: Smart Meter Mini-HSM Anforderungen an die Funktionalität und Interoperabilität des Sicherheitsmoduls},
- url = {https://web.archive.org/web/20190919111832/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-2_Anhang_B_Smart_Meter_Mini_HSM.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=3},
- urldate = {2019-09-19},
- year = {2017}
-}
-
-@unpublished{bsi-tr-03116-3,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03116 Kryptographische Vorgaben für Projekte der Bundesregierung},
- month = jan,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03116-3: Intelligente Messsysteme},
- url = {https://web.archive.org/web/20190919112052/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03116/BSI-TR-03116-3.pdf; jsessionid=CB56FC0D3137C5624CA697AB9E57671F.1_cid360?__blob=publicationFile&v=9},
- urldate = {2019-09-19},
- year = {2019}
-}
-
-@unpublished{bsi-tr-03109-ts-1,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- booktitle = {Technische Richtlinie BSI TR-03109},
- edition = {00.91},
- month = jan,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-03109-TS-1: Testkonzept zu BSI TR-03109-1},
- url = {https://web.archive.org/web/20190919112310/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03109/TR-03109-TS-1_Testkonzept.pdf; jsessionid=BD197BE4CB44C76EE7945640B8703844.2_cid351?__blob=publicationFile&v=1},
- urldate = {2019-09-19},
- year = {2015}
-}
-
-@unpublished{bsi-tr-pruefstellen,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- edition = {v1.5},
- month = jan,
- organization = {Bundesamt für Sicherheit in der Informationstechnik},
- title = {TR-Prüfstellen: Anforderungen an Antragsteller zur Anerkennung als Prüfstelle im Bereich Technischer Richtlinien},
- url = {https://web.archive.org/web/20190919112552/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/TR-Pruefstellen.pdf; jsessionid=A6B4CB8AD2C038741C656276CE874B61.2_cid369?__blob=publicationFile&v=10},
- urldate = {2019-09-19},
- year = {2019}
-}
-
-@article{mo01,
- author = {Yilin Mo and Tiffany Hyun-Jin Kim and Kenneth Brancik and Dona Dickinson and Heejo Lee and Adrian Perrig and Bruno Sinopoli},
- journaltitle = {Proceedings of the IEEE},
- month = jan,
- number = {1},
- pages = {195–209},
- publisher = {IEEE},
- title = {Cyber-Physical Security of a Smart Grid Infrastructure},
- url = {http://ieeexplore.ieee.org.sci-hub.tw/abstract/document/6016202; https://ieeexplore.ieee.org/abstract/document/6016202; https://www.researchgate.net/profile/Yilin_Mo/publication/224257991_Cyber-Physical_Security_of_a_Smart_Grid_Infrastructure/links/004635395d2f66a584000000.pdf},
- urldate = 2019-09-19,
- volume = {100},
- year = {2012}
-}
-
-@article{gungor01,
- author = {Vehbi C. Güngör and Dilan Sahin and Taskin Kocak and Concettina Buccella and Carlo Cecati and Gerhard P. Hancke and Salih Ergüt},
- journaltitle = {IEEE Transactions on Industrial Informatics},
- month = nov,
- number = {4},
- organization = {IEEE},
- pages = {529–539},
- title = {Smart Grid Technologies: Communication Technologies and Standards},
- url = {https://www.researchgate.net/profile/Salih_Ergut/publication/224257498_Smart_Grid_Technologies_Communication_Technologies_and_Standards/links/56ccb4e508ae85c8233bc062/Smart-Grid-Technologies-Communication-Technologies-and-Standards.pdf},
- volume = {7},
- year = {2011}
-}
-
-@article{yan01,
- author = {Ye Yan and Yi Qian and Hamid Sharif and David Tipper},
- doi = {10.1109/SURV.2012.021312.00034},
- journaltitle = {IEEE Communications Surveys \& Tutorials},
- organization = {IEEE},
- title = {A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges},
- url = {http://d-scholarship.pitt.edu/12508/1/Smart_Grid_Infrastructure_Final.pdf},
- year = {2012}
-}
-
-@article{kabalci01,
- author = {Yasin Kabalci},
- doi = {10.1016/j.rser.2015.12.114},
- journaltitle = {Renewable and Sustainable Energy Reviews},
- pages = {302–318},
- publisher = {Elsevier},
- title = {A survey on smart metering and smart grid communication},
- url = {https://www.researchgate.net/profile/Yasin_Kabalci/publication/289504234_A_survey_on_smart_metering_and_smart_grid_communication/links/5a6105aaaca272a1581745c1/A-survey-on-smart-metering-and-smart-grid-communication.pdf},
- volume = {57},
- year = {2016}
-}
-
-@article{zhou01,
- author = {Bin Zhou and Wentao Li and Ka Wing Chan and Yijia Cao and Yonghong Kuang and Xi Liu and Xiong Wang},
- journaltitle = {Renewable and Sustainable Energy Reviews},
- pages = {30–40},
- publisher = {Elsevier},
- title = {Smart home energy management systems: Concept, configurations, and scheduling strategies},
- url = {http://www.sciencedirect.com.sci-hub.tw/science/article/abs/pii/S1364032116002823},
- volume = {61},
- x-color = {#009966},
- year = {2016}
-}
-
-@article{lloret01,
- author = {Jaime Lloret and Jesus Tomas and Alejandro Canovas and Lorena Parra},
- date = {2016},
- journaltitle = {IEEE Communications Magazine},
- organization = {IEEE},
- pages = {50–57},
- title = {An Integrated IoT Architecture for Smart Metering},
- urldate = {2019-09-19},
- volume = {54},
- x-color = {#7a783b},
- year = {2016}
-}
-
-@article{sharma01,
- author = {Konark Sharma and Lalit Mohan Saini},
- doi = {10.1016/j.rser.2015.04.170},
- journaltitle = {Renewable and Sustainable Energy Reviews},
- pages = {720–735},
- publisher = {Elsevier},
- title = {Performance analysis of smart metering for smart grid: An overview},
- url = {http://www.sciencedirect.com.sci-hub.tw/science/article/abs/pii/S1364032115004402},
- urldate = 2019-09-19,
- volume = {49},
- x-color = {#7a783b},
- year = {2015}
-}
-
-@article{leiva01,
- author = {Javier Leiva and Alfonso Palacios and José A. Aguado},
- journaltitle = {Renewable and Sustainable Energy Reviews},
- pages = {227–233},
- publisher = {Elsevier},
- title = {Smart metering trends, implications and necessities: A policy review},
- url = {http://kchbi.chtf.stuba.sk/upload_new/file/Miro/Proc%20problemy%20odovzdane%20zadania/Cyprichov%C3%A1/SmartMetering.pdf; http://dx.doi.org/10.1016/j.rser.2015.11.002},
- urldate = 2019-09-19,
- volume = {55},
- x-color = {#009966},
- year = {2016}
-}
-
-@article{lopez01,
- author = {G. Lopez and J.I. Moreno and H. Amarís and F. Salazar},
- doi = {10.1016/j.epsr.2014.05.006},
- journaltitle = {Electric Power Systems Research},
- publisher = {Elsevier},
- title = {Paving the road toward Smart Grids through large-scale advanced metering infrastructures},
- url = {http://www.sciencedirect.com.sci-hub.tw/science/article/abs/pii/S0378779614001862},
- urldate = 2019-09-19,
- x-color = {#009966},
- year = {2014}
-}
-
-@article{alahakoon01,
- author = {Damminda Alahakoon and Xinghuo Yu},
- doi = {10.1109/TII.2015.2414355},
- journaltitle = {IEEE Transactions on Industrial Informatics},
- organization = {IEEE},
- title = {Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey},
- url = {http://ieeexplore.ieee.org.sci-hub.tw/abstract/document/7063262},
- urldate = 2019-09-19,
- x-color = {#009966},
- year = {2015}
-}
-
-@book{borlase01,
- editor = {Stuart Borlase},
- isbn = {978-1-4987-9955-3},
- publisher = {CRC Press},
- series = {Electric Power and Energy Engineering},
- title = {Smart Grids: Advanced Technologies and Solutions},
- url = {http://libgen.is/book/index.php?md5=54E49C790BF4ABE66857D6A86E60A196},
- urldate = 2019-09-19,
- x-color = {#cc3300},
- year = {2017}
-}
-
-@article{amin01,
- author = {Saurabh Amin and Galina A. Schwartz and Alvaro A. Cárdenas and S. Shankar Sastry},
- doi = {10.1109/MCS.2014.2364711},
- journaltitle = {IEEE Control Systems Magazine},
- month = feb,
- organization = {IEEE},
- part = {1},
- title = {Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks},
- url = {https://cloudfront.escholarship.org/dist/prd/content/qt3658w184/qt3658w184.pdf},
- urldate = 2019-09-19,
- volume = {35},
- x-color = {#7a783b},
- year = {2015}
-}
-
-@article{mahmood01,
- author = {Anzar Mahmood and Nadeem Javaid and Sohail Razzaq},
- doi = {10.1016/j.rser.2014.08.036},
- journaltitle = {Renewable and Sustainable Energy Reviews},
- pages = {248–260},
- publisher = {Elsevier},
- title = {A review of wireless communications for smart grid},
- url = {http://www.sciencedirect.com.sci-hub.tw/science/article/abs/pii/S1364032114007126},
- urldate = 2019-09-19,
- volume = {41},
- x-color = {#7a783b},
- year = {2015}
-}
-
-@online{bsi01,
- author = {{Bundesamt für Sicherheit in der Informationstechnik}},
- edition = {v1.0},
- month = jan,
- organization = {{Bundesamt für Sicherheit in der Informationstechnik}},
- title = {Marktanalyse zur Feststellung der technischen Möglichkeit zum Einbau intelligenter Messsysteme nach § 30 MsbG},
- url = {https://web.archive.org/web/20190919124052/https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/Marktanalysen/Marktanalyse_nach_Para_30_MsbG.pdf?__blob=publicationFile&v=8},
- urldate = {2019-09-19},
- x-color = {#009966},
- year = {2019}
-}
-
-@inproceedings{czechowski01,
- author = {R. {Czechowski} and A. M. {Kosek}},
- booktitle = {2016 Joint Workshop on Cyber- Physical Security and Resilience in Smart Grids (CPSR-SG)},
- date = {2016},
- doi = {10.1109/CPSRSG.2016.7684098},
- keywords = {power consumption; power engineering computing; power system measurement; power system security; security of data; smart meters; energy theft techniques; power energy consumption; electric energy distribution; electricity theft detection; energy consumers; cyber security; smart metering; low voltage network; Energy consumption; Security; Energy measurement; Companies; Power systems; Wheels; Smart Grid; energy theft; cyber-physical security; digital data flow; energy hacking},
- month = {April},
- organization = {IEEE},
- pages = {1–7},
- title = {The most frequent energy theft techniques and hazards in present power energy consumption},
- url = {https://project-sparks.eu/wp-content/uploads/2016/04/czechowski-cpsr-sg-paper-four.pdf},
- x-color = {#009966},
- year = {2016}
-}
-
-@unpublished{st-db3636,
- author = {{ST Microelectronics}},
- edition = {r1},
- month = {jun},
- organization = {ST Microelectronics},
- subtitle = {Security module of a smart meter gateway as defined by the BSI},
- title = {STSAFE-J100-BS Data brief},
- url = {https://www.st.com/resource/en/data_brief/stsafe-j100-bs.pdf},
- urldate = {2019-09-20},
- x-color = {#009966},
- year = {2018}
-}
-
-@online{dalheimer01,
- author = {Mathias Dalheimer},
- date = {2014},
- eventtitle = {Gulaschprogrammiernacht 2014},
- title = {Smart Meter-Einführung Deutschland},
- url = {https://entropia.de/images/2/2c/GPN14-SmartMeterEinf%C3%BChrung.pdf}
-}
-
-@online{heise01,
- author = {Leo Becker},
- date = {2019-09-27},
- editor = {{Heise Online}},
- title = {checkm8: Boot-Exploit soll neuere iPhones knacken},
- url = {https://www.heise.de/mac-and-i/meldung/checkm8-Boot-Exploit-soll-neuere-iPhones-knacken-4542075.html}
-}
-
-@article{wu01,
- author = {Yongdong Wu and Zhuo Wei and Jian Weng and Xin Li and Robert H. Deng},
- doi = {10.1109/TSG.2017.2661307},
- journaltitle = {IEEE Transactions on Smart Grid},
- month = {Sep},
- number = {5},
- pages = {4490–4502},
- title = {Resonance Attacks on Load Frequency Control of Smart Grids},
- volume = {9},
- x-color = {#cc3300},
- year = {2018}
-}
-
-@unpublished{entsoe01,
- author = {{ENTSO-E System Protection Dynamics and WG}},
- month = mar,
- title = {Oscillation Event 03.12.2017},
- url = {https://docstore.entsoe.eu/Documents/SOC%20documents/Regional_Groups_Continental_Europe/OSCILLATION_REPORT_SPD.pdf},
- year = {2018}
-}
-
-@article{leveson01,
- author = {Nancy G. Leveson and Clark S. Turner},
- journaltitle = {IEEE Computer},
- month = jul,
- number = {7},
- pages = {18–41},
- title = {An Investigation of the Therac-25 Accidents},
- url = {https://doi.org/10.1109/MC.1993.274940; https://web.archive.org/web/20041128024227/http://www.cs.umd.edu/class/spring2003/cmsc838p/Misc/therac.pdf},
- volume = {26},
- year = {1993}
-}
-
-@article{lamport01,
- author = {Leslie Lamport and Robert Shostak and Marshall Pease},
- journaltitle = {ACM Transactions on Programming Languages and Systems},
- month = jul,
- number = {3},
- pages = {382–401},
- publisher = {ACM},
- title = {The Byzantine Generals Problem},
- url = {https://www.microsoft.com/en-us/research/publication/byzantine-generals-problem/?from=http%3A%2F%2Fresearch.microsoft.com%2Fen-us%2Fum%2Fpeople%2Flamport%2Fpubs%2Fbyz.pdf; https://doi.org/10.1145%2F357172.357176},
- volume = {4},
- year = {1982}
-}
-
-@inbook{blaze01,
- author = {Matt Blaze and Joan Feigenbaum and John Ioannidis and Angelos D Keromytis},
- booktitle = {Secure Internet Programming},
- date = {1999},
- pages = {185–210},
- publisher = {Springer},
- title = {The role of trust management in distributed systems security},
- year = {1999}
-}
-
-@article{lee01,
- author = {Robert M. Lee and Michael J. Assante and Tim Conway},
- journal = {Electricity Information Sharing and Analysis Center (E-ISAC)},
- title = {Analysis of the cyber attack on the Ukrainian power grid},
- year = {2016}
-}
-
-@article{sun01,
- author = {Chih-Che Sun and Adam Hahn and Chen-Ching Liu},
- journal = {International Journal of Electrical Power \& Energy Systems},
- pages = {45–56},
- publisher = {Elsevier},
- title = {Cyber security of a power grid: State-of-the-art},
- volume = {99},
- year = {2018}
-}
-
-@inproceedings{zheng01,
- author = {Jixuan Zheng and David Wenzhong Gao and Li Lin},
- booktitle = {2013 IEEE Green Technologies Conference (GreenTech)},
- organization = {IEEE},
- pages = {57–64},
- title = {Smart meters in smart grid: An overview},
- year = {2013}
-}
-
-@unpublished{cenelec01,
- author = {{The CEN/CENELEC/ETSI Joint Working Group Standards Smart on for Grids}},
- month = may,
- organization = {CEN/CENELEC/ETSI},
- title = {Final report of the CEN/CENELEC/ETSI Joint Working Group on Standards for Smart Grids},
- year = {2011}
-}
-
-@unpublished{pariente01,
- author = {Dillon Pariente and Emmanuel Ledinot},
- journal = {Formal Verification of Object-Oriented Software},
- pages = {205–219},
- publisher = {KIT University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association},
- title = {Formal verification of industrial C code using Frama-C: a case study},
- year = {2010}
-}
-
-@inbook{rogers01,
- author = {Graham Rogers},
- publisher = {Kluwer},
- title = {Power System Oscillations},
- year = {2000}
-}
-
-@inproceedings{grebe01,
- author = {E. Grebe and J. Kabouris and S. López Barba and W. Sattinger and W. Winter},
- doi = {10.1109/PES.2010.5589932},
- journaltitle = {IEEE PES General Meeting},
- month = aug,
- publisher = {IEEE},
- title = {Low Frequency Oscillations in the Interconnected System of Continental Europe},
- year = {2010}
-}
-
-@article{mcdaniel01,
- author = {McDaniel Patrick and McLaughlin Stephen},
- journaltitle = {Secure Systems},
- month = may,
- organization = {IEEE},
- title = {Security and Privacy Challenges in the Smart Grid},
- year = {2009}
-}
-
-@article{schafer01,
- author = {Benjamin Schäfer and Moritz Matthiae and Marc Timme and Dirk Witthaut},
- doi = {10.1088/1367-2630/17/1/015002},
- journaltitle = {New Journal of Physics},
- month = jan,
- publisher = {IOP/DPG},
- title = {Decentral Smart Grid Control},
- volume = {17},
- year = {2015}
-}
-
-@article{kosut01,
- author = {Oliver Kosut and Liyan Jia and Robert J. Thomas and Lang Tong},
- journaltitle = {IEEE Transactions on Smart Grid},
- month = nov,
- number = {4},
- pages = {645–658},
- publisher = {IEEE},
- title = {Malicious Data Attacks on the Smart Grid},
- volume = {2},
- year = {2011}
-}
-
-@online{schneier01,
- author = {Bruce Schneier},
- journaltitle = {Crypto-Gram May 15 2002},
- month = may,
- publisher = {Counterplane Internet Security},
- title = {Secrecy, Security, and Obscurity},
- url = {https://www.schneier.com/crypto-gram/archives/2002/0515.html},
- year = {2002}
-}
-
-@article{kim01,
- author = {Jinsub Kim and Lang Tong},
- doi = {10.1109/JSAC.2013.130712},
- journaltitle = {IEEE Journal on Selected Areas in Communications},
- month = jul,
- number = {7},
- publisher = {IEEE},
- title = {On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures},
- volume = {31},
- year = {2013}
-}
-
-@inproceedings{fraunholz01,
- author = {Daniel Fraunholz and Simon {Duque Anton} and Hans Dieter Schotten},
- journaltitle = {2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)},
- month = nov,
- publisher = {IEEE},
- title = {Introducing GAMfIS: A Generic Attacker Model for Information Security},
- url = {https://doi.org/10.23919/SOFTCOM.2017.8115550},
- year = {2017}
-}
-
-@online{nytimes01,
- author = {Andrew E. Kramer},
- date = {Dec 30 2016},
- journaltitle = {The New York Times New York edition, Section A, Page 1},
- publisher = {The New York Times},
- title = {How the Kremlin Recruited an Army of Specialists for Cyberwar},
- year = {2016}
-}
-
-@article{perez01,
- author = {Noelia Uribe-Pérez and Luis Hernández and David de la Vega and Itziar Angulo},
- comment = {Questionable publisher but seems good-quality, well-researched. Maybe not published elsewhere since it's just an industry/legislative review article?},
- doi = {10.3390/app6030068},
- journaltitle = {Applied Sciences},
- month = feb,
- number = {3},
- organization = {MDPI},
- pages = {68},
- title = {State of the Art and Trends Review of Smart Metering in Electricity Grids},
- volume = {6},
- x-color = {#cc3300},
- year = {2016}
-}
-
-@article{urtasun01,
- author = {Andoni Urtasun and Pablo Sanchis and David Barricarte and Luis Marroyo},
- comment = {has lots of self-citations by urtasun},
- journaltitle = {Renewable Energy},
- month = jan,
- pages = {325–336},
- publisher = {Elsevier},
- title = {Energy management strategy for a battery-diesel stand-alone system with distributed PV generation based on grid frequency modulation},
- url = {http://dx.doi.org/10.1016/j.renene.2013.12.020},
- volume = {66},
- year = {2014}
-}
-
-@article{dzung01,
- author = {Dacfey Dzung and Inigo Berganza and Alberto Sendin},
- date = {2011},
- doi = {10.1109/ISPLC.2011.5764444},
- journaltitle = {2011 IEEE International Symposium on Power Line Communications and Its Applications},
- title = {Evolution of powerline communications for smart distribution: From Ripple Control to OFDM},
- url = {https://www.researchgate.net/profile/Inigo_Berganza/publication/224236306_Evolution_of_powerline_communications_for_smart_distribution_From_ripple_control_to_OFDM/links/5c658800299bf1d14cc74cbd/Evolution-of-powerline-communications-for-smart-distribution-From-ripple-control-to-OFDM.pdf}
-}
-
-@online{hovi01,
- author = {Jochen Fritz and Alexander Hovi},
- date = {2020},
- journaltitle = {Rundsteuertechnik: Übertragung von Steuersignalen über das Energieversorgungsnetz},
- title = {Transkommando-System},
- url = {http://www.rundsteuerung.de/entwicklung/transkommando.html}
-}
-
-@book{kundur01,
- address = {New York, NY u.a.},
- author = {Prabha Kundur},
- isbn = {007035958X},
- keywords = {Elektrizitätsversorgungsnetz},
- language = {eng},
- publisher = {McGraw-Hill},
- series = {The EPRI power system engineering series},
- title = {Power system stability and control},
- year = {1994}
-}
-
-@book{goiser01,
- author = {Alois M. J. Goiser},
- date = {1998},
- isbn = {3-211-83080-4},
- publisher = {Springer},
- title = {Handbuch der Spread-Spectrum Technik}
-}
-
-@unpublished{lamport02,
- author = {Leslie Lamport},
- date = {19},
- institution = {Technical Report CSL-98, SRI International},
- title = {Constructing digital signatures from a one-way function},
- year = {1979}
-}
-
-@inproceedings{buchmann01,
- author = {Johannes Buchmann and Erik Dahmen and Sarah Ereth and Andreas Hülsing and Markus Rückert},
- booktitle = {International Conference on Cryptology in Africa},
- date = {2011},
- organization = {Springer},
- pages = {363–378},
- title = {On the security of the Winternitz one-time signature scheme},
- year = {2011}
-}
-
-@inproceedings{merkle01,
- author = {Ralph C Merkle},
- booktitle = {Conference on the Theory and Application of Cryptology},
- organization = {Springer},
- pages = {218–238},
- title = {A certified digital signature},
- year = {1989}
-}
-
-@inbook{dods01,
- author = {Chris Dods and Nigel P Smart and Martijn Stam},
- booktitle = {Post-Quantum Cryptography},
- date = {2009},
- doi = {10.1007/978-3-540-88702-7_3},
- editor = {D. J. Bernstein and J. Buchmann and E. Dahmen},
- isbn = {978-3-540-88701-0},
- organization = {Springer},
- pages = {96–115},
- publisher = {Springer},
- title = {Hash based digital signature schemes},
- year = {2005}
-}
-
-@unpublished{gasior01,
- author = {M Gasior and JL Gonzalez},
- institution = {CERN-AB-Note-2004-021},
- title = {Improving FFT frequency measurement resolution by parabolic and gaussian interpolation},
- year = {2004}
-}
-
-@inproceedings{giudice01,
- author = {Antonio {Del Giudice} and Giorgio Graditi and Antonio Pietrosanto and Vincenzo Paciello},
- booktitle = {2015 IEEE International Workshop on Measurements \& Networking (M\&N)},
- organization = {IEEE},
- pages = {1–6},
- title = {Power quality in smart distribution grids},
- year = {2015}
-}
-
-@article{virtanen01,
- adsurl = {https://rdcu.be/b08Wh},
- author = {Pauli {Virtanen} and Ralf {Gommers} and Travis E. {Oliphant} and Matt {Haberland} and Tyler {Reddy} and David {Cournapeau} and Evgeni {Burovski} and Pearu {Peterson} and Warren {Weckesser} and Jonathan {Bright} and Stéfan J. {van der Walt} and Matthew {Brett} and Joshua {Wilson} and K. {Jarrod Millman} and Nikolay {Mayorov} and Andrew R.~J. {Nelson} and Eric {Jones} and Robert {Kern} and Eric {Larson} and CJ {Carey} and İlhan {Polat} and Yu {Feng} and Eric W. {Moore} and Jake {Vand erPlas} and Denis {Laxalde} and Josef {Perktold} and Robert {Cimrman} and Ian {Henriksen} and E.~A. {Quintero} and Charles R {Harris} and Anne M. {Archibald} and Antônio H. {Ribeiro} and Fabian {Pedregosa} and Paul {van Mulbregt} and SciPy 1. 0 {Contributors}},
- doi = {10.1038/s41592-019-0686-2},
- journal = {Nature Methods},
- pages = {261–272},
- title = {SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python},
- volume = {17},
- year = {2020}
-}
-
-@article{derviskadic01,
- author = {Asja Derviškadić and Paolo Romano and Mario Paolone},
- journal = {IEEE Transactions on Instrumentation and Measurement},
- number = {3},
- pages = {547–558},
- publisher = {IEEE},
- title = {Iterative-interpolated DFT for synchrophasor estimation: A single algorithm for P-and M-class compliant PMUs},
- volume = {67},
- year = {2017}
-}
-
-@article{narduzzi01,
- author = {Claudio Narduzzi and Matteo Bertocco and Guglielmo Frigo and Giada Giorgi},
- journal = {IEEE Transactions on Instrumentation and Measurement},
- number = {8},
- pages = {1825–1835},
- publisher = {IEEE},
- title = {Fast-TFM—Multifrequency phasor measurement for distribution networks},
- volume = {67},
- year = {2018}
-}
-
-@article{cheshire01,
- author = {Stuart Cheshire and Mary Baker},
- bibsource = {dblp computer science bibliography, https://dblp.org},
- biburl = {https://dblp.org/rec/journals/ton/CheshireB99.bib},
- doi = {10.1109/90.769765},
- journal = {{IEEE/ACM} Trans. Netw.},
- number = {2},
- pages = {159–172},
- title = {Consistent overhead Byte stuffing},
- volume = {7},
- year = {1999}
-}
-
-@inproceedings{kluyver01,
- author = {Thomas Kluyver and Benjamin Ragan{-}Kelley and Fernando Pérez and Brian E. Granger and Matthias Bussonnier and Jonathan Frederic and Kyle Kelley and Jessica B. Hamrick and Jason Grout and Sylvain Corlay and Paul Ivanov and Damián Avila and Safia Abdalla and Carol Willing and et al.},
- bibsource = {dblp computer science bibliography, https://dblp.org},
- biburl = {https://dblp.org/rec/conf/elpub/KluyverRPGBFKHG16.bib},
- booktitle = {Positioning and Power in Academic Publishing: Players, Agents and Agendas, 20th International Conference on Electronic Publishing, Göttingen, Germany, June 7-9, 2016},
- doi = {10.3233/978-1-61499-649-1-87},
- editor = {Fernando Loizides and Birgit Schmidt},
- pages = {87–90},
- publisher = {{IOS} Press},
- title = {Jupyter Notebooks - a publishing format for reproducible computational workflows},
- year = {2016}
-}
-
-@article{perrin01,
- author = {Trevor Perrin},
- journal = {URL http://noiseprotocol. org/noise. pdf},
- title = {The Noise protocol framework, 2015},
- year = {2016}
-}
-
-@thesis{gasior02,
- author = {Marek Gasior},
- title = {Improving frequency resolution of discrete spectra: algorithms of three-node interpolation},
- url = {https://cds.cern.ch/record/1346070},
- year = {2006}
-}
-
-@unpublished{entsoe02,
- author = {UCTE/ENTSO-E},
- chapter = {Policy 1: Load-Frequency Control-Final Version (approved by SC on 19 March 2009)},
- date = {2009},
- publisher = {UCTE/ENTSO-E},
- title = {Operation Handbook},
- year = {2009}
-}
-
-@unpublished{entsoe03,
- author = {{ENTSO-E Working Group Incident Classification Scale Under System Operations Committee}},
- date = {2014},
- institution = {ENTSO-E},
- title = {Incidents Classification Methodology}
-}
-
-@unpublished{entsoe04,
- author = {UCTE/ENTSO-E},
- chapter = {Appendix 1: Load-Frequency Control and Performance},
- date = {2004},
- publisher = {UCTE/ENTSO-E},
- title = {Operation Handbook},
- year = {2009}
-}
-
-@inbook{eisma01,
- author = {David Eisma and Pretesh Patel},
- booktitle = {Essential Readings in Light Metals, Volume 2, Aluminum Reduction Technology},
- date = {2016},
- editor = {Geoff Bearne and Marc Dupuis and Gary Tarcy},
- pages = {683–688},
- title = {Challenges in Power Modulation}
-}
-
-@inbook{depree01,
- author = {N. Depree and R. Düssel and P. Patel and T. Reek},
- booktitle = {Light Metals 2016},
- date = {2016},
- doi = {10.1007/978-3-319-48251-4_96},
- editor = {E. Williams},
- pages = {571–576},
- title = {The Virtual Battery — Operating an Aluminium Smelter with Flexible Energy Input}
-}
-
-@inproceedings{duessel01,
- author = {Roman Düssel},
- booktitle = {Proceedings of the 36th International ICSOBA Conference},
- date = {2018},
- journaltitle = {Proceedings of the 36th International ICSOBA Conference},
- title = {Paradigm Shift in the Indication of a Stable Cell during Power Modulation}
-}
-
-@unpublished{ec01,
- author = {Christian Egenhofer and Felice Simonelli and Andrea Renda and Antonella Zarra and William Schmitt and Aurélie Faure and Eleaonor Drabik and Vasileios Rizos and Thomas Hähl and Michèle Koper and Angelica Afanador and Marian Bons},
- date = {2018},
- doi = {10.2873/937326},
- institution = {European Commission, Directorate-General for Internal Market, Industry, Entrepreneurship and SMEs},
- title = {Composition and Drivers of Energy Prices and Costs: Case Studies in Selected Energy Intensive Industries – 2018},
- url = {https://op.europa.eu/en/publication-detail/-/publication/424dac0a-ec77-11e8-b690-01aa75ed71a1/language-en}
-}
-
-@unpublished{oye01,
- author = {Harald A. Øye},
- date = {2012},
- eventtitle = {27th International Aluminium Conference Metal Bulletin Events},
- institution = {27th International Aluminium Conference Metal Bulletin Events},
- title = {Power Failure, Temporary Pot Shut-Down, Restart and Repair}
-}
-
-@unpublished{ayoub01,
- author = {Mohammed W. Ayoub and Francis V. P. Robinson},
- date = {2013},
- doi = {10.1109/IEEEGCC.2013.6705851},
- institution = {{Dubai Aluminium}},
- title = {A comparative study between diode and thyristor based AC to DC converters for aluminium smelting process},
- url = {https://purehost.bath.ac.uk/ws/files/134381670/a_comparative_study_between_diode_and_thyristor_based_AC_to_DC_converters_for_aluminium_smelting_process.pdf}
-}
-
-@unpublished{wright01,
- author = {Paul S. Wright},
- date = {2019},
- doi = {10.5281/zenodo.3559798},
- institution = {UK National Physical Laboratory},
- title = {Library of ROCOF Test Waveforms – Pseudo Code, V1.0, May 2019.}
-}
-
-@unpublished{hp01,
- date = {1997},
- institution = {Hewlett Packard},
- title = {Application Note 200-2: Fundamentals of Quartz Oscillators}
-}
-
-@online{netze01,
- author = {Adrian Cramer},
- date = {2015},
- organization = {{NETZE Bad Langensalza GmbH}},
- title = {Bedienhandbuch "Smart Meter"},
- url = {https://www.nbl-badlangensalza.de/fileadmin/Netze/Dokumente/Benutzerhandbuch_NBL-Smart_Meter_V.1.0_.pdf}
-}
-
-@book{steinbach01,
- date = {2018},
- editor = {Armin Steinbach and Michael Weise},
- isbn = {9783110555882},
- publisher = {De Gruyter},
- title = {MsbG : Kommentar zum Messstellenbetriebsgesetz}
-}
-
-@online{bmwe01,
- date = {2019},
- institution = {Bundesministeriums für Wirtschaft und Energie},
- title = {Gutachten Digitalisierung der Energiewende},
- url = {https://www.bmwi.de/Redaktion/DE/Publikationen/Studien/digitalisierung-der-energiewende-thema-1.pdf?__blob=publicationFile&v=4}
-}
-
-@unpublished{easymeter01,
- author = {{EasyMeter GmbH}},
- date = {2020},
- title = {Datenblatt Moderne Messeinrichtung Q3A Drehstromzähler}
-}
-
-@unpublished{honeywell01,
- author = {{Honeywell Smart Energy}},
- date = {2017},
- title = {Datasheet Honeywell REX2 smart meter},
- url = {https://www.elstersolutions.com/assets/products/products_elster_files/SEADSNAEN001017REX2.pdf}
-}
-
-@online{ifixit01,
- author = {Miro Djuric},
- date = {2011},
- organization = {iFixit},
- title = {Elster REX2 Smart Meter Teardown},
- url = {https://www.ifixit.com/News/14306/elster-rex2-smart-meter-teardown},
- urldate = {2020-05-06}
-}
-
-@unpublished{ec02,
- author = {Frédéric Tounquet and Clément Alaton},
- date = {2019},
- institution = {European Commission, Directorate-General for Energy, Directorate B - Internal Energy Market},
- title = {Benchmarking smart meteringdeployment in the EU-28},
- type = {resreport}
-}
-
-@online{destatis01,
- date = {2020-03-06},
- editor = {Statistisches Bundesamt DeStatis},
- title = {Erzeugung - Bilanz - Monatsbericht über die Elektrizitätsversorgung},
- url = {https://www.destatis.de/DE/Themen/Branchen-Unternehmen/Energie/Erzeugung/Tabellen/bilanz-elektrizitaetsversorgung.html},
- urldate = {2020-05-07}
-}
-
-@book{nelles01,
- author = {Dieter Nelles and Christian Tuttas},
- date = {1998},
- doi = {10.1007/978-3-663-09902-4},
- isbn = {978-3-663-09902-4},
- title = {Elektrische Energietechnik},
- year = {1998}
-}
-
-@book{crastan01,
- author = {Valentin Crastan},
- date = {2015},
- doi = {10.1007/978-3-662-45985-0},
- title = {Elektrische Energieversorgung 1},
- year = {2015}
-}
-
-@book{crastan03,
- author = {Valentin Crastan},
- date = {2012},
- doi = {10.1007/978-3-642-20100-4},
- isbn = {978-3-642-20099-1},
- title = {Elektrische Energieversorgung 3}
-}
-
-@unpublished{simon01,
- date = {1997},
- doi = {10.1007/978-3-322-85061-4},
- editor = {Liviu Constantinescu-Simon},
- title = {Handbuch Elektrische Energietechnik},
- year = {1997}
-}
-
-@online{kamstrup01,
- author = {{Kamstrup A/S}},
- title = {STS prepayment meter},
- url = {https://www.kamstrup.com/en-en/electricity-solutions/smart-electricity-meters/sts-prepayment-meter},
- urldate = {2020-05-11}
-}
-
-@online{itron01,
- author = {{Itron Inc}},
- date = {2012},
- title = {Benutzerhandbuch Smart Meter EM 214},
- url = {https://www.ewh.de/fileadmin/user_upload/Stromnetz/Zaehlerstaende/Produktbeschreibung_ITRON_EM214.pdf},
- urldate = {2020-05-11}
-}
-
-@online{hager01,
- author = {{Hager Group}},
- date = {2017},
- title = {Hager Smart Meter EHZ363 Betriebsanleitung},
- url = {https://bnnetze.de/downloads/kunden/netzkunden/messstellenbetrieb-und-messung/funktionalitaet/hager-ehz363-betriebsanleitung.pdf},
- urldate = {2020-05-11}
-}
-
-@unpublished{vseaes01,
- date = {2010},
- institution = {{Verband Schweizerischer Elektrizitätsunternehmen VSE}},
- title = {Branchenempfehlung Strommarkt Schweiz Handbuch Smart Metering CH},
- url = {https://web.archive.org/web/20130418034458if_/http://www.strom.ch:80/uploads/media/HBSM-CH_1018d_2010.pdf},
- urldate = {2020-05-12}
-}
-
-@article{geelen01,
- author = {Daphne Geelen and Ruth Mugge and Sacha Silvester and Annemieke Bulters},
- date = {2019},
- doi = {10.1007/s12053-019-09777-z},
- issue = {12},
- journaltitle = {Energy Efficiency},
- title = {The use of apps to promote energy saving: a study of smartmeter–related feedback in the Netherlands}
-}
-
-@online{bmwi03,
- author = {{Bundesministerium für Wirtschaft und Energie} and {Ernst and Young}},
- date = {2013},
- title = {Kosten-Nutzen-Analyse für einen flächendeckenden Einsatz intelligenter Zähler},
- url = {https://www.bmwi.de/Redaktion/DE/Publikationen/Studien/kosten-nutzen-analyse-fuer-flaechendeckenden-einsatz-intelligenterzaehler.pdf},
- urldate = {2020-05-12}
-}
-
-@inproceedings{rodden01,
- author = {Tom A. Rodden and Joel E. Fischer and Nadia Pantidi and Khaled Bachour and Stuart Moran},
- booktitle = {Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13},
- date = {2013},
- doi = {10.1145/2470654},
- title = {At Home with Agents: Exploring Attitudes Towards Future Smart Energy Infrastructures},
- year = {2013}
-}
-
-@inproceedings{pierce01,
- author = {James Pierce and Eric Paulos},
- booktitle = {CHI 2012},
- date = {2012},
- doi = {10.1145/2207676.2207771},
- subtitle = {interaction, energy, and emerging energy systems},
- title = {Beyond Energy Monitors: Interaction, Energy, and Emerging Energy Systems},
- year = {2012}
-}
-
-@article{lupton01,
- author = {Deborah Lupton},
- date = {2016},
- doi = {10.1080/03085147.2016.1143726},
- issn = {0308-5147},
- journaltitle = {Economy and Society},
- pages = {101–122},
- title = {The diverse domains of quantified selves: self-tracking modes and dataveillance},
- volume = {45},
- year = {2016}
-}
-
-@inproceedings{costanza01,
- author = {Enrico Costanza and Joel E. Fischer and James A. Colley and Tom Rodden and Sarvapali D. Ramchurn and Nicholas R. Jennings},
- booktitle = {CHI 2014, One of a CHInd},
- date = {2014},
- doi = {10.1145/2556288.2557167},
- subtitle = {a field trial of a future smart energy system in the home},
- title = {Doing the Laundry with Agents: a Field Trial of a Future SmartEnergy System in the Home},
- year = {2014}
-}
-
-@article{fell01,
- author = {Michael J. Fell and David Shipworth and Gesche M. Huebner and Clifford A. Elwell},
- date = {2015},
- doi = {10.1016/j.erss.2015.08.023},
- issn = {2214-6296},
- journaltitle = {Energy Research and Social Science},
- pages = {72–84},
- title = {Public acceptability of domestic demand-side response in Great Britain: The role of automation and direct load control},
- volume = {9},
- year = {2015}
-}
-
-@online{silabs01,
- author = {Vivek Mohan and {Silicon Labs}},
- date = {2015},
- title = {An Introduction to Wireless M-Bus},
- url = {http://pages.silabs.com/rs/634-SLU-379/images/introduction-to-wireless-mbus.pdf}
-}
-
-@article{belega01,
- author = {Daniel Belega and Dario Petri},
- date = {2013},
- doi = {10.1109/tim.2012.2236777},
- issn = {0018-9456},
- issue = {5},
- journaltitle = {IEEE Transactions on Instrumentation and Measurement},
- pages = {942–953},
- title = {Accuracy Analysis of the Multicycle Synchrophasor Estimator Provided by the Interpolated DFT Algorithm},
- volume = {62},
- year = {2013}
-}
-
-@article{borkowski01,
- author = {Jozef Borkowski and Dariusz Kania and Janusz Mroczka},
- date = {2014},
- doi = {10.1109/tie.2014.2316225},
- issn = {0278-0046},
- issue = {12},
- journaltitle = {IEEE Transactions on Industrial Electronics},
- pages = {7026–7034},
- title = {Interpolated-DFT-Based Fast and Accurate Frequency Estimation for the Control of Power},
- volume = {61},
- year = {2014}
-}
-
-@unpublished{semerow01,
- author = {Anatoli Semerow and Sebastian Hohn and Matthias Luther and Walter Sattinger and Hans Abildgaard and Agustin Diaz Garcia and Giorgio Giannuzzi},
- date = {2015},
- doi = {10.1109/ptc.2015.7232578},
- institution = {{University of Erlangen-Nuremberg} and ENTSO-E},
- title = {Dynamic Study Model for the interconnected power system of Continental Europe in different simulation tools},
- year = {2015}
-}
-
-@online{entsoe05,
- author = {ENTSO-E},
- date = {2019},
- title = {ENTSO-E Initial Dynamic Model of Continental Europe},
- url = {https://www.entsoe.eu/publications/system-operations-reports/#entso-e-initial-dynamic-model-of-continental-europe},
- urldate = {2020-05-14}
-}
-
-@inbook{brown01,
- author = {Marilyn A. Brown and Shan Zhou},
- booktitle = {Advances in Energy Systems: The Large-scale Renewable Energy Integration Challenge},
- comment = {Extremely obvious industry pandering.},
- date = {2019},
- doi = {10.1002/9781119508311},
- edition = {First Ed.},
- publisher = {Wiley},
- subtitle = {The Large-scale Renewable Energy Integration Challenge},
- title = {Smart‐Grid Policies: An International Review},
- year = {2019}
-}
-
-@online{kamstrup01-2,
- author = {{Kamstrup A/S}},
- date = {2018},
- title = {STS prepayment meter},
- url = {https://www.kamstrup.com/en-en/electricity-solutions/smart-electricity-meters/sts-prepayment-meter},
- urldate = {2020-05-18}
-}
-
-@book{sato01,
- author = {Takuro Sato and Daniel M. Kammen and Bin Duan and Martin Macuha and Zhenyu Zhou and Jun Wu and Muhammad Tariq and Solomon Abebe Asfaw},
- date = {2015},
- publisher = {Wiley},
- subtitle = {Specifications, Requirements and Technologies},
- title = {Smart Grid Standards}
-}
-
-@unpublished{ec03,
- date = {2014},
- institution = {European Commission},
- title = {Single Market Progress Report: Country Profiles – Italy},
- type = {resreport},
- url = {https://ec.europa.eu/energy/sites/ener/files/documents/2014_countryreports_italy.pdf},
- urldate = {2020-05-18}
-}
-
-@unpublished{usitc01,
- author = {Lisa Alejandro and Caitlin Blair and Laura Bloodgood and Mahnaz Khan and Martha Lawless and Daniel Meehan and Patrick Schneider and Karl Tsuji},
- date = {2014},
- institution = {U.S. International Trade Commission},
- subtitle = {Government Policies Driving Strong Growth},
- title = {Global Market for Smart Electricity Meters},
- type = {resreport},
- url = {https://www.usitc.gov/publications/332/id-037smart_meters_final.pdf},
- urldate = {2020-05-18}
-}
-
-@unpublished{toshiba01,
- author = {Mitsuhide Ishima and Kiyoyuki Terai and Yoshihiro Ogita},
- date = {2018},
- institution = {Toshiba Energy Systems and Solutions},
- issue = {4},
- journaltitle = {Toshiba Review},
- pages = {46–50},
- title = {Construction and Operation of Communication System for Smart Meter System of TEPCO Power Grid, Inc.},
- url = {https://www.toshiba.co.jp/tech/review/2018/04/73_04pdf/f02.pdf},
- urldate = {2020-05-18},
- volume = {73}
-}
-
-@unpublished{ukgov01,
- author = {{UK Department for Business, Energy and Industrial Strategy}},
- date = {2018},
- institution = {UK Department for Business, Energy and Industrial Strategy},
- title = {Smart Metering Implementation Programme Progress Report for 2018},
- url = {https://www.gov.uk/government/publications/smart-metering-implementation-programme-progress-report-2018},
- urldate = {2020-05-18}
-}
-
-@unpublished{ukgov02,
- author = {{UK Department of Energy and Climate Change}},
- date = {2014},
- title = {Smart Metering Implementation Programme: Smart Metering Equipment Technical Specifications},
- url = {https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/381535/SMIP_E2E_SMETS2.pdf},
- urldate = {2020-05-18},
- version = {1.58}
-}
-
-@unpublished{ukgov03,
- author = {{UK Department for Business, Energy and Industrial Strategy}},
- date = {2016},
- institution = {UK Department for Business, Energy and Industrial Strategy},
- title = {Smart Meter Rollout Cost-Benefit Analysis Part I},
- url = {https://ec.europa.eu/growth/tools-databases/tris/cs/index.cfm/search/?trisaction=search.detail&year=2017&num=350&iLang=EN},
- urldate = {2020-05-18}
-}
-
-@thesis{mahlknecht01,
- author = {Peter Mahlknecht},
- date = {2014},
- institution = {Technische Universität Wien},
- title = {Diplomarbeit Sicherheitsmodul für ein Smart Metering Gateway},
- url = {https://publik.tuwien.ac.at/files/PubDat_233035.pdf},
- urldate = {2020-05-18}
-}
-
-@online{delaw01,
- date = {2019-03-14},
- title = {Stromgrundversorgungsverordnung StromGVV § 19 Unterbrechung der Versorgung},
- url = {http://www.gesetze-im-internet.de/stromgvv/__19.html},
- urldate = {2020-05-18}
-}
-
-@article{cuijpers01,
- author = {Colette Cuijpers and Bert-Jaap Koops},
- date = {2012},
- doi = {10.1007/978-94-007-5170-5_12},
- journalsubtitle = {Coming of age},
- journaltitle = {European data protection},
- pages = {269–293},
- title = {Smart metering and privacy in Europe: lessons from the Dutch case}
-}
-
-@online{ec04,
- date = {2012},
- editor = {{The European Commission}},
- title = {The Energy Efficiency Directive},
- url = {https://ec.europa.eu/energy/topics/energy-efficiency/targets-directive-and-rules/energy-efficiency-directive_en},
- urldate = {2020-05-18}
-}
-
-@article{aubel01,
- author = {Pol Van Aubel and Erik Poll},
- date = {2019},
- doi = {10.1016/j.ijepes.2019.01.001},
- issn = {0142-0615},
- journaltitle = {International Journal of Electrical Power and Energy Systems},
- pages = {719–725},
- title = {Smart metering in the Netherlands: what, how and why},
- volume = {109}
-}
-
-@unpublished{dsmrp3,
- date = {2014},
- institution = {Netbeheer Nederland WG DSMR},
- title = {Dutch Smart Meter Requirements P3 Companion Standard},
- url = {https://www.netbeheernederland.nl/_upload/Files/Slimme_meter_15_1f3c5c9b2c.pdf},
- urldate = {2020-05-18},
- version = {4.0.7}
-}
-
-@unpublished{dsmrp1,
- date = {2016},
- institution = {Netbeheer Nederland WG DSMR},
- title = {Dutch Smart Meter Requirements P1 Companion Standard},
- url = {https://smarty.creos.net/wp-content/uploads/DutchSmartMeterRequirements.pdf},
- urldate = {2020-05-18},
- version = {5.0.2}
-}
-
-@inproceedings{anderson01,
- author = {Ross Anderson and Shailendra Fuloria},
- booktitle = {2010 First IEEE International Conference on Smart Grid Communications},
- date = {2010},
- doi = {10.1109/SMARTGRID.2010.5622026},
- location = {Gaithersburg, MD},
- pages = {96–101},
- title = {Who controls the off switch?},
- url = {https://www.cl.cam.ac.uk/~rja14/Papers/meters-offswitch.pdf},
- urldate = {2020-05-18}
-}
-
-@book{abdallah01,
- address = {Cham},
- author = {Asmaa Abdallah},
- editor = {Xuemin Shen},
- isbn = {9783319936772},
- pagetotal = {1 Online-Ressource (XIV, 126 p. 30 illus., 23 illus. in color)},
- ppn_gvk = {1028034970},
- publisher = {Springer International Publishing},
- series = {SpringerBriefs in Electrical and Computer Engineering},
- title = {Security and Privacy in Smart Grid},
- url = {http://dx.doi.org/10.1007/978-3-319-93677-2},
- year = {2018}
-}
-
-@inbook{kaplan01,
- author = {Abraham Kaplan},
- booktitle = {The Conduct of Inquiry: Methodology for Behavioral Science},
- date = {1964},
- isbn = {9781412836296},
- location = {San Francisco},
- pages = {28},
- publisher = {Chandler Publishing Co.},
- title = {The Law of the Instrument},
- url = {https://books.google.com/books?id=OYe6fsXSP3IC&pg=PA28}
-}
-
-@book{merz01,
- address = {Berlin [u.a.]},
- author = {Hermann Merz and Thomas Hansemann and Christof Hübner},
- isbn = {9783540888284},
- pagetotal = {X, 282},
- ppn_gvk = {584030762},
- publisher = {Springer},
- series = {Springer series on signals and communication technology},
- subtitle = {Communication systems with EIB/KNX, LON, and BACnet},
- title = {Building automation},
- year = {2009}
-}
-
-@article{markham01,
- address = {New York, NY},
- author = {Andrés Molina-Markham and Prashant Shenoy and Kevin Fu and Emmanuel Cecchet and David Irwin},
- date = {2010},
- isbn = {9781450304580},
- journaltitle = {Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building},
- note = {Title from The ACM Digital Library},
- pagetotal = {Online-Ressource (93 pages)},
- ppn_gvk = {772463654},
- publisher = {ACM},
- title = {Private Memoirs of a Smart Meter},
- url = {https://dl.acm.org/doi/pdf/10.1145/1878431.1878446},
- year = {2010}
-}
-
-@article{greveler01,
- author = {Ulrich Greveler and Peter Glösekötter and Benjamin Justus and Dennis Loehr},
- date = {2012},
- journaltitle = {Computers, Privacy and Data Protection},
- title = {Multimedia Content Identification Through SmartMeter Power Usage Profiles}
-}
-
-@book{zuboff01,
- author = {Shoshana Zuboff},
- date = {2019},
- title = {The Age of Surveillance Capitalism}
-}
-
-@online{bmwi04,
- author = {{Bundesministerium für Wirtschaft und Energie}},
- date = {2020-04-14},
- title = {Häufig gestellte Fragen rund um Smart Meter},
- url = {https://www.bmwi.de/Redaktion/DE/FAQ/Smart-Meter/faq-smart-meter.html},
- urldate = {2020-05-20}
-}
-
-@inbook{stuber01,
- author = {Michael Stuber},
- booktitle = {Smart Grid Handbook},
- date = {2016},
- doi = {10.1002/9781118755471.sgd036},
- pages = {1–14},
- title = {Standards, Security, and Smart Meters}
-}
-
-@thesis{weith01,
- author = {Loren Weith},
- date = {2014},
- institution = {Department of Mathematics and Computer Science, Eindhoven University of Technology},
- title = {DLMS / COSEM Protocol Security Evaluation},
- type = {mathesis},
- url = {https://pure.tue.nl/ws/files/46962657/773263-1.pdf},
- urldate = {2020-05-20}
-}
-
-@book{salus01,
- author = {Peter H. Salus},
- date = {1994},
- isbn = {0201547775, 9780201547771},
- publisher = {Addison-Wesley},
- title = {A Quarter Century of UNIX},
- year = {1994}
-}
-
-@article{khurana01,
- author = {Himanshu Khurana and Mark Hadley and Ning Lu and Deborah A. Frincke},
- date = {2010},
- doi = {10.1109/msp.2010.49},
- issn = {1540-7993},
- journaltitle = {IEEE Security and Privacy Magazine},
- pages = {81–85},
- title = {Smart-grid security issues},
- volume = {8},
- year = {2010}
-}
-
-@online{heise02,
- author = {Stefan Krempl},
- date = {2019-12-29},
- editor = {{Heise Online}},
- publisher = {{Heise Online}},
- title = {36C3: Schwere Sicherheitslücken in Kraftwerken},
- url = {https://www.heise.de/newsticker/meldung/36C3-Schwere-Sicherheitsluecken-in-Kraftwerken-4624529.html},
- urldate = {2020-05-22}
-}
-
-@article{kerckhoff01,
- author = {Auguste Kerckhoff},
- date = {1883},
- journaltitle = {Journal des sciences militaires},
- pages = {5–38},
- title = {La cryptographie militaire},
- volume = {IX}
-}
-
-@online{kerckhoff02,
- author = {Fabien Petitcolas},
- date = {2020},
- language = {English},
- title = {Kerckhoffs' principles from “La cryptographie militaire”},
- url = {https://www.petitcolas.net/kerckhoffs/index.html},
- urldate = {2020-05-25}
-}
-
-@book{mackay01,
- address = {Cambridge [u.a.]},
- author = {David J. C. MacKay},
- date = {2005},
- edition = {Repr. with corr.},
- isbn = {0521642981},
- note = {Literaturverz. S. 613 - 619},
- pagetotal = {XII, 628},
- ppn_gvk = {50543234X},
- publisher = {Univ. Press},
- title = {Information theory, inference, and learning algorithms},
- year = {2005}
-}
-
-@book{anderson02,
- author = {Ross J. Anderson},
- date = {2020},
- edition = {3rd},
- note = {Preview of upcoming edition},
- publisher = {Wiley},
- subtitle = {A guide to building dependable distributed systems},
- title = {Security engineering},
- url = {https://www.cl.cam.ac.uk/~rja14/book.html},
- urldate = {2020-05-25}
-}
-
-@article{anderson03,
- author = {R. J. {Anderson} and S. J. {Bezuidenhoudt}},
- doi = {10.1109/32.502222},
- journal = {IEEE Transactions on Software Engineering},
- number = {5},
- pages = {294–301},
- title = {On the reliability of electronic payment systems},
- volume = {22},
- year = {1996}
-}
-
-@unpublished{ukgov04,
- author = {{UK Department for Business Energy and Industrial Strategy}},
- date = {2019},
- title = {Smart Meter Statistics Quarterly Report to end March 2019},
- url = {https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/804767/2019_Q1_Smart_Meters_Report.pdf},
- urldate = {2020-05-26}
-}
-
-@unpublished{bnetza02,
- author = {{German Government Bundesnetzagentur}},
- date = {2018},
- title = {Monitoring Report 2018},
- url = {https://www.bundesnetzagentur.de/SharedDocs/Downloads/EN/BNetzA/PressSection/ReportsPublications/2019/MonitoringReport2019.pdf},
- urldate = {2020-05-26}
-}
-
-@article{borkar01,
- author = {Shekhar Borkar},
- date = {2005},
- journal = {Ieee Micro},
- journaltitle = {IEEE Micro},
- number = {6},
- pages = {10–16},
- publisher = {IEEE},
- title = {Designing reliable systems from unreliable components: the challenges of transistor variability and degradation},
- volume = {25},
- year = {2005}
-}
-
-@article{hahn01,
- author = {Adam Hahn and Manimaran Govindarasu},
- date = {2011},
- doi = {10.1109/TSG.2011.2163829},
- journaltitle = {IEEE Transactions on Smart Grid},
- pages = {835–843},
- title = {Cyber Attack Exposure Evaluation Framework for the Smart Grid}
-}
-
-@inproceedings{temple01,
- author = {William G. Temple and Binbin Chen and Nils Ole Tippenhauer},
- booktitle = {2013 IEEE International Conference on Smart Grid Communications},
- date = {2013},
- doi = {10.1109/SmartGridComm.2013.6688001},
- journaltitle = {2013 IEEE International Conference on Smart Grid Communications},
- title = {Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack}
-}
-
-@inproceedings{cleveland01,
- author = {Frances M. Cleveland},
- booktitle = {2008 IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century},
- date = {2008},
- organization = {IEEE},
- pages = {1–5},
- title = {Cyber security issues for advanced metering infrasttructure (AMI)},
- year = {2008}
-}
-
-@online{heise03,
- author = {Martin Holland},
- date = {2018-03-19},
- editor = {{Heise Online}},
- title = {Cambridge Analytica: Mehrere Untersuchungen angekündigt, mögliche Billionenstrafe für Facebook},
- url = {https://www.heise.de/newsticker/meldung/Cambridge-Analytica-Mehrere-Untersuchungen-angekuendigt-moegliche-Billionenstrafe-fuer-Facebook-3998151.html}
-}
-
-@online{bigclive01,
- author = {bigclivedotcom},
- date = {2018-10-26},
- title = {Inside a smart meter, and the REAL problem with them.},
- url = {https://www.youtube.com/watch?v=G32NYQpvy8Q},
- urldate = {2020-06-03}
-}
-
-@online{eevblog01,
- author = {Dave Jones},
- date = {2013-01-08},
- title = {EEVblog 409 - EDMI - Smart Meter Teardown},
- url = {https://www.youtube.com/watch?v=dm-yZ1N3xmc},
- urldate = {2020-06-03}
-}
-
-@online{ti01,
- author = {{National Semiconductor}},
- date = {2006},
- title = {Clock Conditioner Owner’s Manual},
- url = {http://www.ti.com/lit/ug/snaa103/snaa103.pdf?ts=1591194443306}
-}
-
-@inproceedings{georgiev01,
- author = {Martin Georgiev and Subodh Iyengar and Suman Jana and Rishita Anubhai and Dan Boneh and Vitaly Shmatikov},
- booktitle = {ACM Conference on Computer and Communications Security},
- date = {2012},
- journaltitle = {CCS’12},
- pages = {38–49},
- title = {The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software}
-}
-
-@article{anderson04,
- author = {Ross Anderson and Francesco Bergadano and Bruno Crispo and Jong-Hyeon Lee and Charalampos Manifavas and Roger Needham},
- date = {1998},
- doi = {10.1145/302350.302353},
- journaltitle = {ACM SIGOPS Operating Systems Review},
- title = {A New Family of Authentication Protocols}
-}
-
-@inproceedings{haller01,
- author = {Neil M. Haller},
- booktitle = {Symposium on Network and Distributed System Security},
- date = {1994},
- pages = {151–157},
- title = {The S/KEY One-Time Password System}
-}
-
-@techreport{rfc1760,
- author = {Neil M. Haller},
- date = {1995},
- doi = {10.17487/RFC1760},
- howpublished = {Internet Requests for Comments},
- institution = {RFC Editor},
- number = {1760},
- publisher = {RFC Editor},
- title = {The S/KEY One-Time Password System},
- type = {RFC},
- url = {https://tools.ietf.org/html/rfc1760},
- urldate = {2020-06-08},
- year = {1995}
-}
-
-@inproceedings{perrig01,
- author = {Adrian Perrig and Ran Canetti and J. D. Tygar and Dawn Song},
- booktitle = {Proceeding 2000 IEEE Symposium on Security and Privacy. S{\&}P 2000},
- date = {2000},
- doi = {10.1109/SECPRI.2000.848446},
- isbn = {0-7695-0665-8},
- publisher = {IEEE},
- title = {Efficient Authentication and Signing of Multicast Streams over Lossy Channels}
-}
-
-@article{diffie01,
- author = {Whitfield Diffie and Martin Hellman},
- date = {2976},
- journal = {IEEE transactions on Information Theory},
- journaltitle = {IEEE transactions on Information Theory},
- number = {6},
- pages = {644–654},
- publisher = {IEEE},
- title = {New directions in cryptography},
- volume = {22},
- year = {1976}
-}
-
-@online{ec05,
- author = {Ignacio Fernández Hernández},
- date = {2019},
- editor = {European Commission},
- title = {Increasing Digital Tachograph Resilience: Galileo Open Service Navigation Message Authentication},
- url = {https://ec.europa.eu/transparency/regexpert/?do=groupDetail.groupMeetingDoc&docid=36951},
- urldate = {2020-06-08}
-}
-
-@unpublished{landisgyr01,
- author = {{Landis+Gyr Group AG}},
- date = {2020-05-28},
- title = {Landis+Gyr Annual Report 2019},
- url = {https://www.landisgyr.com/webfoo/wp-content/uploads/2020/05/Landis_Gyr_Vol_1_Annual_Report_2019_EN.pdf},
- urldate = {2020-06-29}
-}
-
-@unpublished{landisgyr02,
- author = {{Landis+Gyr Group AG}},
- date = {2020-05-06},
- title = {Landis+Gyr Financial Report 2019}
-}
-
-@article{shannon01,
- author = {Claude E. {Shannon}},
- journal = {Proceedings of the IEEE},
- number = {2},
- pages = {447–457},
- title = {Communication In The Presence Of Noise},
- volume = {86},
- year = {1998}
-}
-
-@comment{jabref-meta: databaseType:biblatex;}
-
-@techreport{2017,
- title = {Analysis of CE Inter-Area Oscillations of 1st December 2016},
- url = {https://eepublicdownloads.entsoe.eu/clean-documents/SOC%20documents/Regional_Groups_Continental_Europe/2017/CE_inter-area_oscillations_Dec_1st_2016_PUBLIC_V7.pdf},
- year = {2017}
-}
-
-@proceedings{ctap+11,
- author = {Mihai Costache and Valentin Tudor and Magnus Almgren and Marina Papatriantafilou and Christopher Saunders},
- booktitle = {2011 Seventh European Conference on Computer Network Defense},
- month = {dec},
- publisher = {IEEE},
- title = {Remote control of smart meters: friend or foe?},
- url = {https://www.syssec-project.eu/m/page-media/3/costache-ec2nd11.pdf; https://doi.org/10.1109/EC2ND.2011.14},
- year = {2011}
-}
-