Authors :
Bavisi Keval Nitin
Volume/Issue :
Volume 7 - 2022, Issue 12 - December
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3CuKYeK
DOI :
https://doi.org/10.5281/zenodo.7511298
Abstract :
Traditional metering systems are beginning to
be obsolete now as we move towards a smarter and more
efficient way of metering which is known as Advanced
Metering Infrastructure or AMI.
AMI brings with it many advantages which includes
Remote monitoring of the data, it also provides the facility
of instant reading i.e Reading on Demand. But despite all
the advantages it does have loopholes that might be used
to tamper with the AMI infrastructure and hence disrupt
the normal working of the devices hence, security of the
AMI becomes an essential part hence the infrastructure
must be given the latest security and hence it becomes a
topic of research. As, the AMI infrastructure as a whole
becomes a soft target by the hackers and attackers for
launching various kinds of attacks it becomes necessary
to provide the infrastructure a thorough security.
Traditional metering systems are beginning to
be obsolete now as we move towards a smarter and more
efficient way of metering which is known as Advanced
Metering Infrastructure or AMI.
AMI brings with it many advantages which includes
Remote monitoring of the data, it also provides the facility
of instant reading i.e Reading on Demand. But despite all
the advantages it does have loopholes that might be used
to tamper with the AMI infrastructure and hence disrupt
the normal working of the devices hence, security of the
AMI becomes an essential part hence the infrastructure
must be given the latest security and hence it becomes a
topic of research. As, the AMI infrastructure as a whole
becomes a soft target by the hackers and attackers for
launching various kinds of attacks it becomes necessary
to provide the infrastructure a thorough security.