{"version":"1.0","provider_name":"CyberSEA","provider_url":"https:\/\/carleton.ca\/cybersea","author_name":"Jason Jaskolka","author_url":"https:\/\/carleton.ca\/cybersea\/author\/jasonjaskolka\/","title":"New Publication: Secure Deployment of Smart Meters - CyberSEA","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qKRgR32U43\"><a href=\"https:\/\/carleton.ca\/cybersea\/2026\/new-publication-secure-deployment-of-smart-meters\/\">New Publication: Secure Deployment of Smart Meters<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/carleton.ca\/cybersea\/2026\/new-publication-secure-deployment-of-smart-meters\/embed\/#?secret=qKRgR32U43\" width=\"600\" height=\"338\" title=\"&#8220;New Publication: Secure Deployment of Smart Meters&#8221; &#8212; CyberSEA\" data-secret=\"qKRgR32U43\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/carleton.ca\/cybersea\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Link-Publications-800x600.png","thumbnail_width":800,"thumbnail_height":600,"description":"Check out our latest article &#8220;Secure Deployment of Smart Meters&#8221; which is available open access in IET Generation, Transmission &amp; Distribution. This paper presents a\u00a0security-focused approach to the initialization and secure installation of smart meters compliant with the DLMS (Device Language Message Specification) standard. First, a\u00a0systematic cybersecurity risk analysis is conducted to identify potential threats [&hellip;]"}