02.06.2014 Views

Smart Meters - Public Service Commission

Smart Meters - Public Service Commission

Smart Meters - Public Service Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Smart</strong> meters are a crucial component of the smart grid. The devices are designed to<br />

collect energy consumption data from homes and transmit it back to power distribution<br />

companies for billing, network and demand management purpose. The technology also<br />

lets consumer view their energy usage patterns in near real time to help them better<br />

manage home energy use.<br />

Utility companies around the country are in the process of installing millions of smart<br />

meters in homes to better manage energy consumption, respond to demand better and<br />

eventually offer tiered rating plans based on a consumer's energy use habits.<br />

The problem is that there are no publicly available tools for testing the security controls<br />

of these systems, McIntyre said. Poorly configured and poorly protected smart meters<br />

can allow attackers to take control of the system and manipulate the data that they<br />

collect and transmit, he said.<br />

"They can read and modify any data, they can reset usage tables, they could change<br />

the rate type," and commit other types of fraud, he said.<br />

Most meters provide low-level access to the device, mid-level administrative access<br />

and super-user privileged access to the device, he said. Without the proper tools there<br />

is no way that utility companies and others can verify the strength of the access control<br />

and authentication mechanisms the device maker might have put in place for<br />

controlling access, he said.<br />

McIntyre downplayed concerns about tools such as Termineter giving malicious<br />

hackers easy access to something they can use to attack smart meters. The same sort<br />

of open source tools that were used to build Terimenter is available to anybody that<br />

wants it so there's no telling if similar tools haven't already been built by malicious<br />

attackers, he said.<br />

The tool as it exists today also requires the attacker to have a fairly good understanding<br />

of how smart meters work. To get it to communicate with a smart meter, users need to<br />

get physical access to the device he said.<br />

Meanwhile, according to a description of InGuardian's presentation at Black Hat next<br />

week, the company will show how criminals can gather information and authentication<br />

credentials from smart meters. The company will also show how a smart meter's IR<br />

port can be used to interact with the device.<br />

Jaikumar Vijayan covers data security and privacy issues, financial services security<br />

and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or<br />

subscribe to Jaikumar's RSS feed . His e-mail address<br />

isjvijayan@computerworld.com.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!