Abstract
One of the current Internet of Things (IoT) systems emerging nowadays is the advanced metering infrastructure (AMI) system. The AMI system was intended to gather the electricity consumption customer’s data on electricity use before transmitting it to the electricity service providers (ESP) for processing, storage, and analysis. The AMI system faces new security challenges because of the integration of information and communication technology (ICT) with the conventional electric power grid. One precaution that can be utilized to raise the AMI system’s security level is the risk assessment process. The risk assessment procedure is one measure that may be used to increase the security level of the AMI system. Our main contribution to this chapter is an evaluation of the present cybersecurity risks to the AMI system. By evaluating security risks, it is possible to identify the crucial assets that need to be protected and any potential vulnerabilities, threat probabilities, and ramifications. The risk matrix for the potential dangers is also set up to evaluate them and select the best risk management strategy. Nine risk scenarios have been discovered in this study concerning each AMI layer and component. The likelihood, impact, and risk degree for each scenario are also determined. A sample of a mitigation approach is put out to bring the risk level down to manageable.
| Original language | English |
|---|---|
| Title of host publication | Internet of Things Security and Privacy |
| Subtitle of host publication | Practical and Management Perspectives |
| Publisher | CRC Press |
| Pages | 1-23 |
| Number of pages | 23 |
| ISBN (Electronic) | 9781003810186 |
| ISBN (Print) | 9781032057712 |
| DOIs | |
| Publication status | Published - Dec 6 2023 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
ASJC Scopus subject areas
- General Engineering
Fingerprint
Dive into the research topics of 'Cybersecurity Risk Assessment in Advanced Metering Infrastructure'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS