ITU's 160 anniversary

Committed to connecting the world

  •  
Girls in ICT day 2025

ITU-T work programme

[2017-2020] : [SG17] : [Q6/17]

[Declared patent(s)]  - [Publication]

Work item: X.1332 (ex X.sgsec-3)
Subject/title: Security guidelines for smart metering service in smart grids
Status: Approved on 2020-03-26 [Issued from previous study period]
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: -
Liaison: IEC TC57 WG13, IEC TC57 WG15, ITU-T SG15, IETF
Supporting members: -
Summary: Smart metering service is widely deployed in many countries in order to make electricity grid efficient and reliable by gathering/providing electricity usage information from/to customers. Based on the information, they can estimate the customers' electricity demands, and they can shift the demand or make customers use their own electricity by providing information on electricity usage to customers. However, there are various kinds of threats that cause the malfunction of the smart metering service. Invalid metering information can lead erroneous decision on demand management, and abusing of load control function can result in customers' economic and physical damage. In addition, when the 3rd party service providers can use the metering information, personally identifiable information (PII) protection issue should be considered. Smart metering service has been started in many countries including developed and developing countries. However, since they don't have enough security measures, customers protest against smart meter installation in many countries. Recommendation ITU-T X.sgsec-3 provides security guidelines for smart metering services, so that the service providers can implement security measures properly in order to assure the security of the service. It will analyse the general model of smart metering service from the perspective of service level. Based on the general model, this Recommendation will discuss security threats and attack method against smart metering services, and it will identify security requirements and capabilities to mitigate these risks. In addition, this Recommendation will introduce useful security standards that can be considered when service provider implements the security capabilities.
Comment: -
Reference(s):
[R 46 ]
  Historic references:
Contact(s):
Gunhee Lee, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2016-09-12 15:06:54
Last update: 2020-04-16 16:36:12