{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:37:06Z","timestamp":1729647426785,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/etfa.2018.8502507","type":"proceedings-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T03:20:08Z","timestamp":1542338408000},"page":"861-868","source":"Crossref","is-referenced-by-count":0,"title":["Security and Privacy Implementations within the AnyPLACE Energy Management Solution"],"prefix":"10.1109","author":[{"given":"Christian","family":"Kudera","sequence":"first","affiliation":[]},{"given":"Viktor","family":"Ullmann","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Kammerstetter","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Design and Implementation of a Negative Voltage Fault Injection Attack Prototype","author":"kudera","year":"2018","journal-title":"2018 IEEE International Workshop on Physical Attacks and Inspection of Electronics (PAINE)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1953-0053041-6"},{"journal-title":"Netbeheer Nederland Requirements Catalog","article-title":"Dutch smart meter requirements v4.2.2","year":"2014","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66553-5_10"},{"journal-title":"Federal Office for Information Security Protection Profile","article-title":"Protection profile for the gateway of a smart metering system","year":"2014","key":"ref31"},{"journal-title":"Osterreichs Energie Requirements Catalog","article-title":"End-to-end security for smart metering","year":"2018","key":"ref30"},{"key":"ref37","article-title":"Internet of things (iot) security best practices","author":"corser","year":"2017","journal-title":"IEEE Internet Initiative White Paper"},{"journal-title":"International Standards Organization for Standardization","article-title":"Application security","year":"2011","key":"ref36"},{"journal-title":"National Institute of Standards and Technology Standard","article-title":"Recommendation for key management, part 1: General","year":"2016","key":"ref35"},{"journal-title":"National Institute of Standards and Technology Standard","article-title":"Security requirements for cryptographic modules","year":"2001","key":"ref34"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1145\/996566.996771","article-title":"Security as a new dimension in embedded system design","author":"kocher","year":"2004","journal-title":"Proceedings of the 41st Annual Design Automation Conference Ser DAC '04"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41224-0_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CompEng.2012.6242962"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2015.7232966"},{"key":"ref15","article-title":"Practical secure hardware design for embedded systems","author":"grand","year":"2004","journal-title":"Proc 2004 Embedded Systems Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733496"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2017.7981062"},{"key":"ref18","first-page":"1","article-title":"Automation and user interaction schemes for home energy management - a combined approach","author":"rua","year":"2016","journal-title":"2016 IEEE 21st Conference on Emerging Technologies Factory Automation (ETFA)"},{"journal-title":"International Electrotechnical Commission Standard","article-title":"Power systems management and associated information exchange - data and communications security","year":"0","key":"ref19"},{"journal-title":"CEN CENELEC ETSI Tech Rep","article-title":"Privacy and security approach &#x2013; part i","year":"2013","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2013.222"},{"journal-title":"European Network and Information Security Agency Technical Report","article-title":"Smart grid security recommendations","year":"2012","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.52"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/932181"},{"journal-title":"Official Journal of the European Union","article-title":"Regulation (eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec","year":"2016","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400447"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref7","first-page":"29","article-title":"Privacy-friendly load scheduling of deferrable and interruptible domestic appliances in smart grids,&#x201D; Computer Communications","volume":"58","author":"rottondi","year":"2015","journal-title":"special Issue on Networking and Communications for Smart Cities"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.134"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICE2T.2017.8215952"},{"journal-title":"COM\/2014\/0356 final","article-title":"Benchmarking smart metering deployment in the eu-27 with a focus on electricity","year":"2014","key":"ref1"},{"journal-title":"International Electrotechnical Commission Standard","article-title":"Electricity metering data exchange - the dlms\/cosem suite","year":"0","key":"ref20"},{"journal-title":"National Institute of Standards and Technology Standard","article-title":"Guidelines for smart grid cybersecurity","year":"2014","key":"ref22"},{"journal-title":"Smart Grid Interoperability Series of Standards Standard","article-title":"Guide for smart grid interoperability of energy technology and information technology operation with the electric power system (eps), and end-use applications, and loads","year":"2011","key":"ref21"},{"journal-title":"Official Journal of the European Union","article-title":"Directive 2012\/27\/eu of the european parliament and of the council of 25 october 2012 on energy efficiency, amending directives 2009\/125\/ec and 2010\/30\/eu and repealing directives 2004\/8\/ec and 2006\/32\/ec","year":"2012","key":"ref24"},{"journal-title":"Official Journal of the European Union","article-title":"Directive 2009\/72\/ec of the european parliament and of the council of 13 july 2009 concerning common rules for the internal market in electricity and repealing directive 2003\/54\/ec","year":"2009","key":"ref23"},{"journal-title":"Official Journal of the European Union","article-title":"Directive 95\/46\/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"1995","key":"ref26"},{"journal-title":"Official Journal of the European Union","article-title":"Commission recommendation of 9 march 2012 on preparations for the roll-out of smart metering systems","year":"2012","key":"ref25"}],"event":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2018,9,4]]},"location":"Turin","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488382\/8502441\/08502507.pdf?arnumber=8502507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T04:44:15Z","timestamp":1694061855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8502507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/etfa.2018.8502507","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}