Blog
About

135
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures

      , ,

      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

      17 - 18 September 2015

      intrusion detection system, smart meter, advanced metering infrastructure

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In this paper we describe a novel approach to model smart meter networks aimed at analyzing security related aspects of such networks. The model is realized as a multi-agent based simulation. This allows for detailed analysis of network behaviour on different layers. The layers realized in the simulation are a protocol layer for syntactic analysis of the protocol, a data layer for semantic analysis of the commands transmitted, and an information layer where metering data is interpreted. The ultimate goal of the project is the design and proof-of-concept implementation of an innovative Intrusion Detection System specifically apt for smart meter networks. The simulation described in this paper together with data from real world field tests will be used to deduce formal rules describing regular behaviour of the network which then will be the input for the IDS.

          Related collections

          Most cited references 10

          • Record: found
          • Abstract: not found
          • Article: not found

          Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              AMI threats, intrusion detection requirements and deployment recommendations

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2015
                September 2015
                : 99-102
                Affiliations
                University of Applied Sciences

                St. Pölten
                Article
                10.14236/ewic/ICS2015.12
                © Lang-Muhr et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
                ICS-CSR
                3
                Germany
                17 - 18 September 2015
                Electronic Workshops in Computing (eWiC)
                Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article