{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:40:02Z","timestamp":1745368802897,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_10","type":"book-chapter","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T03:55:47Z","timestamp":1354247747000},"page":"108-122","source":"Crossref","is-referenced-by-count":3,"title":["A Secure Architecture for Smart Meter Systems"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Angermeier","sequence":"first","affiliation":[]},{"given":"Konstantin","family":"B\u00f6ttinger","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Ibing","sequence":"additional","affiliation":[]},{"given":"Dieter","family":"Schuster","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Stumpf","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Wacker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"AMI-SEC Task Force: AMI System Security Requirements v1.01 (December 2008)"},{"key":"10_CR2","unstructured":"Federal Energy Regulatory Commission: Assessment of Demand Response and Advanced Metering (December 2008)"},{"key":"10_CR3","unstructured":"Carpenter, M., Goodspeed, T., Singletary, B., Skoudis, E., Wright, J.: Advanced Metering Infrastructure Attack Methodology v1.0 (January 2009)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Ericsson, G.: Cyber security and power system communication \u2013 essential parts of a smart grid infrastructure. IEEE Trans. Power Delivery 25(3) (July 2010)","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security and Privacy 7(3) (2009)","DOI":"10.1109\/MSP.2009.76"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 107\u2013116. ACM (2010)","DOI":"10.1145\/1920261.1920277"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-14379-3_15","volume-title":"Critical Information Infrastructures Security","author":"S. McLaughlin","year":"2010","unstructured":"McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy Theft in the Advanced Metering Infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol.\u00a06027, pp. 176\u2013187. Springer, Heidelberg (2010)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"LeMay, M., Gross, G., Gunter, C., Garg, S.: Unified architecture for large-scale attested metering. In: Hawaiian Int. Conf. System Sciences (January 2007)","DOI":"10.1109\/HICSS.2007.586"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","volume-title":"Privacy Enhancing Technologies","author":"M. Jawurek","year":"2011","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-In Privacy for Smart Metering Billing. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 192\u2013210. Springer, Heidelberg (2011)"},{"key":"10_CR10","unstructured":"BSI: Protection profile for the gateway of a smart metering system v01.01.01 (final draft) (August 2011)"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-00224-3_19","volume-title":"Wireless Sensor Networks","author":"W. Hu","year":"2009","unstructured":"Hu, W., Corke, P., Shih, W.C., Overs, L.: secFleck: A Public Key Technology Platform for Wireless Sensor Networks. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol.\u00a05432, pp. 296\u2013311. Springer, Heidelberg (2009)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-73275-4_15","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"C. Krau\u00df","year":"2007","unstructured":"Krau\u00df, C., Stumpf, F., Eckert, C.: Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 203\u2013217. Springer, Heidelberg (2007)"},{"issue":"3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P. McDaniel","year":"2009","unstructured":"McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy\u00a07(3), 75\u201377 (2009)","journal-title":"IEEE Security & Privacy"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSP.2009.165","volume":"7","author":"N. Lawson","year":"2009","unstructured":"Lawson, N.: Side-channel attacks on cryptographic software. IEEE Security and Privacy\u00a07, 65\u201368 (2009)","journal-title":"IEEE Security and Privacy"},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/2.585157","volume":"30","author":"M. Hsueh","year":"1997","unstructured":"Hsueh, M., Tsai, T., Iyer, R.: Fault injection techniques and tools. IEEE Computer\u00a030(4), 75\u201382 (1997)","journal-title":"IEEE Computer"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: Attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, vol.\u00a02, p. 1119 (2000)","DOI":"10.1109\/DISCEX.2000.821514"},{"key":"10_CR17","unstructured":"Shacham, H., Buchanan, E., Roemer, R., Savage, S.: Return-oriented programming: Exploits without code injection. In: Black Hat USA Briefings (August 2008)"},{"key":"10_CR18","unstructured":"beagleboard.org: BeagleBoard System Reference Manual Rev C4 (December 2009)"},{"key":"10_CR19","unstructured":"Sun Microsystems: The Java Card 3 Platform (August 2008)"},{"key":"10_CR20","unstructured":"Sun Microsystems: Java Card Platform Specification, Version 3.0, Connected Edition (March 2008)"},{"key":"10_CR21","unstructured":"Samsung Electronics: Security Target Lite of S3FS9CI 32-bit RISC Microcontroller For S-SIM, Version 1.0 (June 2008)"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:18:16Z","timestamp":1745367496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}