X.500 Standard status
X.509 Related activities
How to be involved
Tutorial section 1
Tutorial section 2
X.509 at work
This page is under development
There are almost an indefinite number of threats against the Smart Grid. Here we will not regard all the classical ones, like unreliable employees. In the following are listed some threats. The list is currently quite preliminary, but will be expanded as time allows.
Smart meters, photovoltaic inverters, etc. are placed in consumer areas to which there is very easy access. Such devices are difficult to protected physically and can easily be made the entry point for all kinds of viruses, e.g., Trojan horses. The network serving consumer units should be separated as far as possible from the network serving the more critical units.
The many devices and their communication channels, there are many possibilities for configuration errors.
The generation and distribution of public-key certificates may be error prune. The same is the case for trust anchor information.
There is much literature on different types of traditional DoS attacks. All these types have to be considered when analysing Smart Grid security. Listing of such attack types may be added in the future with comments on how they relate to Smart Grid, but currently only the types of attacks that are specific for Smart Grid are considered.
As discussed in Message digest, an insecure hash algorithm may result in a collision attack.