Cybersecurity Risk Assessment in Advanced Metering Infrastructure

Mostafa Shokry Abd El Salam, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A.M. Khalaf

Research output: Chapter in Book/Report/Conference proceedingChapter


One of the current Internet of Things (IoT) systems emerging nowadays is the advanced metering infrastructure (AMI) system. The AMI system was intended to gather the electricity consumption customer’s data on electricity use before transmitting it to the electricity service providers (ESP) for processing, storage, and analysis. The AMI system faces new security challenges because of the integration of information and communication technology (ICT) with the conventional electric power grid. One precaution that can be utilized to raise the AMI system’s security level is the risk assessment process. The risk assessment procedure is one measure that may be used to increase the security level of the AMI system. Our main contribution to this chapter is an evaluation of the present cybersecurity risks to the AMI system. By evaluating security risks, it is possible to identify the crucial assets that need to be protected and any potential vulnerabilities, threat probabilities, and ramifications. The risk matrix for the potential dangers is also set up to evaluate them and select the best risk management strategy. Nine risk scenarios have been discovered in this study concerning each AMI layer and component. The likelihood, impact, and risk degree for each scenario are also determined. A sample of a mitigation approach is put out to bring the risk level down to manageable.

Original languageEnglish
Title of host publicationInternet of Things Security and Privacy
Subtitle of host publicationPractical and Management Perspectives
PublisherCRC Press
Number of pages23
ISBN (Electronic)9781003810186
ISBN (Print)9781032057712
Publication statusPublished - Dec 6 2023

ASJC Scopus subject areas

  • Engineering(all)


Dive into the research topics of 'Cybersecurity Risk Assessment in Advanced Metering Infrastructure'. Together they form a unique fingerprint.

Cite this