Security guidelines for smart metering services in smart grids |
|
Smart metering services have been widely deployed worldwide to make electricity grids more efficient and reliable by gathering/providing electricity usage information from/to customers, respectively. This information can be used to estimate customers' electricity demands, and the estimation can be used to shift demand or to change customers' electricity consumption behaviour by providing electricity usage information to them. However, smart metering services can malfunction because of various threats. For example, invalid metering information can lead to erroneous demand management decisions, and abusing load control functions can cause economic and physical damage to customers. Recommendation ITU-T X.1332 provides security guidelines for smart metering services to enable service providers to implement appropriate security measures to ensure the security of their service. This Recommendation identifies security threats and attack methods against smart metering services, and specifies security requirements and capabilities to mitigate these threats and attacks accordingly. |
|
Citation: |
https://handle.itu.int/11.1002/1000/14086 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1330-X.1339: Smart grid security |
Approval date: |
2020-03-26 |
Provisional name: | X.sgsec-3 |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1332 (03/2020)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|