Work item:
|
X.1332 (ex X.sgsec-3)
|
Subject/title:
|
Security guidelines for smart metering service in smart grids
|
Status:
|
Approved on 2020-03-26 [Issued from previous study period]
|
Approval process:
|
TAP
|
Type of work item:
|
Recommendation
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
-
|
Liaison:
|
IEC TC57 WG13, IEC TC57 WG15, ITU-T SG15, IETF
|
Supporting members:
|
-
|
Summary:
|
Smart metering service is widely deployed in many countries in order to make electricity grid efficient and reliable by gathering/providing electricity usage information from/to customers. Based on the information, they can estimate the customers' electricity demands, and they can shift the demand or make customers use their own electricity by providing information on electricity usage to customers.
However, there are various kinds of threats that cause the malfunction of the smart metering service. Invalid metering information can lead erroneous decision on demand management, and abusing of load control function can result in customers' economic and physical damage. In addition, when the 3rd party service providers can use the metering information, personally identifiable information (PII) protection issue should be considered.
Smart metering service has been started in many countries including developed and developing countries. However, since they don't have enough security measures, customers protest against smart meter installation in many countries.
Recommendation ITU-T X.sgsec-3 provides security guidelines for smart metering services, so that the service providers can implement security measures properly in order to assure the security of the service. It will analyse the general model of smart metering service from the perspective of service level. Based on the general model, this Recommendation will discuss security threats and attack method against smart metering services, and it will identify security requirements and capabilities to mitigate these risks. In addition, this Recommendation will introduce useful security standards that can be considered when service provider implements the security capabilities.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2016-09-12 15:06:54
|
Last update:
2020-04-16 16:36:12
|