top of page

Security Consideration

 

  • Authenticated access: 

All components in the SGS/CSC AMI network viz smart meter, data concentrator, head end system can support user management with distinct role based access with distinct security levels and passwords. The access rights and security levels for each user will be judiciously planned during the project design phase.  

 

  • Data encryption: 

Cyber security using cryptographic algorithm is already adopted in critical communications of Information Technology Systems.

 

  • Securing the security: 

Experience has taught us that mere adoption of authentication/ encryption is not sufficient. The success of this mechanism relies on security suite and its judicious use.

 

  • Event logging and reporting: 

Every component in CSC's AMR/ AMI Systems are supporting event logging and reporting facility. An event is any abnormal or important activity within the component.

 

  • Utility back office security: 

The utility back office application shall have user management with roll based access and secure http connection for web based configuration, if at all implemented. Similarly audit trail in utility head end system will log all user driven activities.

Low Voltage PowerLine Network

 

Residential

 

Electricity

 

 

Commercial

 

Electricity

 

 

Utility

 

GAS

 

 

 

Utility

 

WATER

 

 

CONCENTRATOR

GPRS, PSTN, WiFi

UTILITY CONTRO STATION

Smart Electricity Meter
Concentrator
Head End System HES

CSC's HES Management Software (SGSoft™) For Smart Grid Network Products : Security

 

 

bottom of page